Difference between revisions of "Download/kernel/rhel5/028stab122.1/changes"
< Download | kernel | rhel5 | 028stab122.1
(Created page with "== Changes == Since {{kernel link|rhel5|028stab121.1}}: * Rebase to RHEL5 kernel 2.6.18-419.el5 * A use-after-free flaw was found in the way the Linux kernel's Datagram Cong...") |
(→Changes) |
||
Line 4: | Line 4: | ||
* Rebase to RHEL5 kernel 2.6.18-419.el5 | * Rebase to RHEL5 kernel 2.6.18-419.el5 | ||
− | * A use-after-free flaw was found in the way the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer) resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the | + | * A use-after-free flaw was found in the way the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer) resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the kernel memory, allowing them to escalate their privileges on the system. (CVE-2017-6074, Important) |
− | kernel memory, allowing them to escalate their privileges on the system. (CVE-2017-6074, Important) | ||
* It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system. (CVE-2017-2634, | * It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system. (CVE-2017-2634, | ||
Moderate) | Moderate) |
Revision as of 10:31, 21 March 2017
Changes
Since 028stab121.1:
- Rebase to RHEL5 kernel 2.6.18-419.el5
- A use-after-free flaw was found in the way the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer) resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the kernel memory, allowing them to escalate their privileges on the system. (CVE-2017-6074, Important)
- It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system. (CVE-2017-2634,
Moderate)