7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.025 Low
EPSS
Percentile
90.0%
CentOS Errata and Security Advisory CESA-2017:0323
The kernel packages contain the Linux kernel, the core of any Linux operating
system.
Security Fix(es):
A use-after-free flaw was found in the way the Linux kernel’s Datagram
Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer)
resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set
on the socket. A local, unprivileged user could use this flaw to alter the
kernel memory, allowing them to escalate their privileges on the system.
(CVE-2017-6074, Important)
It was found that the Linux kernel’s Datagram Congestion Control Protocol
(DCCP) implementation used the IPv4-only inet_sk_rebuild_header() function for
both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A
remote attacker could use this flaw to crash the system. (CVE-2017-2634,
Moderate)
Important: This update disables the DCCP kernel module at load time by using the
kernel module blacklist method. The module is disabled in an attempt to reduce
further exposure to additional issues. Please see Red Hat Bugzilla (BZ#1425177)
for additional information.
Red Hat would like to thank Andrey Konovalov (Google) for reporting
CVE-2017-6074. The CVE-2017-2634 issue was discovered by Wade Mealing (Red Hat
Product Security).
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2017-February/084455.html
Affected packages:
kernel
kernel-PAE
kernel-PAE-devel
kernel-debug
kernel-debug-devel
kernel-devel
kernel-doc
kernel-headers
kernel-xen
kernel-xen-devel
Upstream details at:
https://access.redhat.com/errata/RHSA-2017:0323
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 5 | i686 | kernel | < 2.6.18-419.el5 | kernel-2.6.18-419.el5.i686.rpm |
CentOS | 5 | i686 | kernel-debug | < 2.6.18-419.el5 | kernel-debug-2.6.18-419.el5.i686.rpm |
CentOS | 5 | i686 | kernel-debug-devel | < 2.6.18-419.el5 | kernel-debug-devel-2.6.18-419.el5.i686.rpm |
CentOS | 5 | i686 | kernel-devel | < 2.6.18-419.el5 | kernel-devel-2.6.18-419.el5.i686.rpm |
CentOS | 5 | noarch | kernel-doc | < 2.6.18-419.el5 | kernel-doc-2.6.18-419.el5.noarch.rpm |
CentOS | 5 | i386 | kernel-headers | < 2.6.18-419.el5 | kernel-headers-2.6.18-419.el5.i386.rpm |
CentOS | 5 | i686 | kernel-pae | < 2.6.18-419.el5 | kernel-PAE-2.6.18-419.el5.i686.rpm |
CentOS | 5 | i686 | kernel-pae-devel | < 2.6.18-419.el5 | kernel-PAE-devel-2.6.18-419.el5.i686.rpm |
CentOS | 5 | i686 | kernel-xen | < 2.6.18-419.el5 | kernel-xen-2.6.18-419.el5.i686.rpm |
CentOS | 5 | i686 | kernel-xen-devel | < 2.6.18-419.el5 | kernel-xen-devel-2.6.18-419.el5.i686.rpm |
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.025 Low
EPSS
Percentile
90.0%