594
edits
Changes
Created page with "== Changes == Since {{kernel link|rhel5|028stab121.1}}: * Rebase to RHEL5 kernel 2.6.18-419.el5 * A use-after-free flaw was found in the way the Linux kernel's Datagram Cong..."
== Changes ==
Since {{kernel link|rhel5|028stab121.1}}:
* Rebase to RHEL5 kernel 2.6.18-419.el5
* A use-after-free flaw was found in the way the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer) resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the
kernel memory, allowing them to escalate their privileges on the system. (CVE-2017-6074, Important)
* It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system. (CVE-2017-2634,
Moderate)
=== See also ===
* {{RHBA|2017-0274}}
* {{RHSA|2017-0323}}
* {{CVE|2017-6074}}
* {{CVE|2017-2634}}
Since {{kernel link|rhel5|028stab121.1}}:
* Rebase to RHEL5 kernel 2.6.18-419.el5
* A use-after-free flaw was found in the way the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer) resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the
kernel memory, allowing them to escalate their privileges on the system. (CVE-2017-6074, Important)
* It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system. (CVE-2017-2634,
Moderate)
=== See also ===
* {{RHBA|2017-0274}}
* {{RHSA|2017-0323}}
* {{CVE|2017-6074}}
* {{CVE|2017-2634}}