Difference between revisions of "Download/kernel/rhel5/028stab122.1/changes"

From OpenVZ Virtuozzo Containers Wiki
Jump to: navigation, search
(Created page with "== Changes == Since {{kernel link|rhel5|028stab121.1}}: * Rebase to RHEL5 kernel 2.6.18-419.el5 * A use-after-free flaw was found in the way the Linux kernel's Datagram Cong...")
 
(Changes)
Line 4: Line 4:
  
 
* Rebase to RHEL5 kernel 2.6.18-419.el5
 
* Rebase to RHEL5 kernel 2.6.18-419.el5
* A use-after-free flaw was found in the way the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer) resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the
+
* A use-after-free flaw was found in the way the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer) resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the kernel memory, allowing them to escalate their privileges on the system. (CVE-2017-6074, Important)
kernel memory, allowing them to escalate their privileges on the system. (CVE-2017-6074, Important)
 
 
* It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system. (CVE-2017-2634,
 
* It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system. (CVE-2017-2634,
 
Moderate)
 
Moderate)

Revision as of 10:31, 21 March 2017

Changes

Since 028stab121.1:

  • Rebase to RHEL5 kernel 2.6.18-419.el5
  • A use-after-free flaw was found in the way the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer) resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the kernel memory, allowing them to escalate their privileges on the system. (CVE-2017-6074, Important)
  • It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system. (CVE-2017-2634,

Moderate)

See also