Security Advisory Important: kernel security update

Advisory: RHSA-2017:0324-1
Type: Security Advisory
Severity: Important
Issued on: 2017-02-24
Last updated on: 2017-02-24
Affected Products: Red Hat Enterprise Linux Server AUS (v. 6.6)
Red Hat Enterprise Linux Server TUS (v. 6.6)
CVEs (cve.mitre.org): CVE-2017-6074

Details

An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced
Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.

The kernel packages contain the Linux kernel, the core of any Linux operating
system.

Security Fix(es):

* A use-after-free flaw was found in the way the Linux kernel's Datagram
Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer)
resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set
on the socket. A local, unprivileged user could use this flaw to alter the
kernel memory, allowing them to escalate their privileges on the system.
(CVE-2017-6074, Important)

Red Hat would like to thank Andrey Konovalov (Google) for reporting this issue.


Solution

For details on how to apply this update, which includes the changes described in
this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Updated packages

Red Hat Enterprise Linux Server AUS (v. 6.6)

SRPMS:
kernel-2.6.32-504.57.1.el6.src.rpm
File outdated by:  RHSA-2017:1488
    MD5: 26d8e4c0653ccec5f5b3e485dc3c2a87
SHA-256: 36ba9d17955aac0123c129f471ad9a1b5f77b31e1e3a613da86fdbb49d9e8bc2
 
x86_64:
kernel-2.6.32-504.57.1.el6.x86_64.rpm
File outdated by:  RHSA-2017:1488
    MD5: 2969f9a099b12bbd7c2029b34a571951
SHA-256: a6c1db207fcb4cbf8b3f657924fb8623534b909e51c932c17da74059b0d29a4d
kernel-abi-whitelists-2.6.32-504.57.1.el6.noarch.rpm
File outdated by:  RHSA-2017:1488
    MD5: 714d4aaaa7e2cfe814269948fa154e78
SHA-256: 8bc57ccc2fe67a08c72e5f63616955872c3957487efa6f0262e4baac98db4df3
kernel-debug-2.6.32-504.57.1.el6.x86_64.rpm
File outdated by:  RHSA-2017:1488
    MD5: a6e0efac8193f07377d5a08bd6451760
SHA-256: 926e0ff90f94f7d8eeb8132708be6423d095d8705d37872ac382ff75cd4eb320
kernel-debug-debuginfo-2.6.32-504.57.1.el6.x86_64.rpm
File outdated by:  RHSA-2017:1488
    MD5: bb29f2c4c963455f5f7ceecc2a69113c
SHA-256: f04187294d446d5e98da732ed58398592fa74ac66a1aad009f77773772c411a0
kernel-debug-devel-2.6.32-504.57.1.el6.x86_64.rpm
File outdated by:  RHSA-2017:1488
    MD5: 4228e3ce77f22781f4adf8aa4943ed2c
SHA-256: c765181f4af1fb995b7f8366754478b42758d35cdecd66bf8864c8d156dc501f
kernel-debuginfo-2.6.32-504.57.1.el6.x86_64.rpm
File outdated by:  RHSA-2017:1488
    MD5: 7cd9fe28e722be2f251910b154283eea
SHA-256: 02c63f00037a62216f92293c7fc83614f88ece3afc5b5ace680aef4c9c771d6b
kernel-debuginfo-common-x86_64-2.6.32-504.57.1.el6.x86_64.rpm
File outdated by:  RHSA-2017:1488
    MD5: a8f8808eb7489f6890abf1cd5ba4819f
SHA-256: b8c6d2173f13a25f9da56c9b1da6ca7781c31ba16216ec8a223b7a678e0d8f75
kernel-devel-2.6.32-504.57.1.el6.x86_64.rpm
File outdated by:  RHSA-2017:1488
    MD5: 8ed919132642f9512edc2ad1b19009c7
SHA-256: 3f3d80207a807274aadc7a35fcdcbea947dfe1c837ccec94d38657af4934d086
kernel-doc-2.6.32-504.57.1.el6.noarch.rpm
File outdated by:  RHSA-2017:1488
    MD5: 2a10bc6d3a8731fa2a11fa0635e37a51
SHA-256: 0925b22a5dc9054bb0a992cb33e1cc9e1b4bf16d075c35369afc576211de7b93
kernel-firmware-2.6.32-504.57.1.el6.noarch.rpm
File outdated by:  RHSA-2017:1488
    MD5: c57463ab79bd59cb8e3bb5db93caaab7
SHA-256: 7472925334b47588ae1508252b062d67788a0965dd514b2ec1663f073b9226a3
kernel-headers-2.6.32-504.57.1.el6.x86_64.rpm
File outdated by:  RHSA-2017:1488
    MD5: 745f130cc7d3c61fc5df9e3b3cf744db
SHA-256: 83e97cd35e45834dc0b8dee13b5381bae248d7541699505533b9cfcb4ade654f
perf-2.6.32-504.57.1.el6.x86_64.rpm
File outdated by:  RHSA-2017:1488
    MD5: 594e57cced0a2ddc22cc6351a0445c55
SHA-256: 7125ef4b22259389faa48da717526e68cd1a764b47dbb05173d0bf695380d4df
perf-debuginfo-2.6.32-504.57.1.el6.x86_64.rpm
File outdated by:  RHSA-2017:1488
    MD5: 3184bc1d26f15c669dafd838b36f7d8a
SHA-256: f9c445db8c834ac285f2562c1dae7c17b2395e38f0d5db2d27b59f15989e69a0
python-perf-2.6.32-504.57.1.el6.x86_64.rpm
File outdated by:  RHSA-2017:1488
    MD5: 2c7d6e07696b899d234a2035759d700e
SHA-256: 9fd0ce9dceaa06f44d73b95a82ae29816de429ecbdeb330b5b620b30377a45cd
python-perf-debuginfo-2.6.32-504.57.1.el6.x86_64.rpm
File outdated by:  RHSA-2017:1488
    MD5: 862fba8d0414adbeb09592e2354051a5
SHA-256: 814506923a494685c86f0ddbb0850601e620002712a95a299df08c7a10521e22
 
Red Hat Enterprise Linux Server TUS (v. 6.6)

SRPMS:
kernel-2.6.32-504.57.1.el6.src.rpm
File outdated by:  RHSA-2017:1488
    MD5: 26d8e4c0653ccec5f5b3e485dc3c2a87
SHA-256: 36ba9d17955aac0123c129f471ad9a1b5f77b31e1e3a613da86fdbb49d9e8bc2
 
x86_64:
kernel-2.6.32-504.57.1.el6.x86_64.rpm
File outdated by:  RHSA-2017:1488
    MD5: 2969f9a099b12bbd7c2029b34a571951
SHA-256: a6c1db207fcb4cbf8b3f657924fb8623534b909e51c932c17da74059b0d29a4d
kernel-abi-whitelists-2.6.32-504.57.1.el6.noarch.rpm
File outdated by:  RHSA-2017:1488
    MD5: 714d4aaaa7e2cfe814269948fa154e78
SHA-256: 8bc57ccc2fe67a08c72e5f63616955872c3957487efa6f0262e4baac98db4df3
kernel-debug-2.6.32-504.57.1.el6.x86_64.rpm
File outdated by:  RHSA-2017:1488
    MD5: a6e0efac8193f07377d5a08bd6451760
SHA-256: 926e0ff90f94f7d8eeb8132708be6423d095d8705d37872ac382ff75cd4eb320
kernel-debug-debuginfo-2.6.32-504.57.1.el6.x86_64.rpm
File outdated by:  RHSA-2017:1488
    MD5: bb29f2c4c963455f5f7ceecc2a69113c
SHA-256: f04187294d446d5e98da732ed58398592fa74ac66a1aad009f77773772c411a0
kernel-debug-devel-2.6.32-504.57.1.el6.x86_64.rpm
File outdated by:  RHSA-2017:1488
    MD5: 4228e3ce77f22781f4adf8aa4943ed2c
SHA-256: c765181f4af1fb995b7f8366754478b42758d35cdecd66bf8864c8d156dc501f
kernel-debuginfo-2.6.32-504.57.1.el6.x86_64.rpm
File outdated by:  RHSA-2017:1488
    MD5: 7cd9fe28e722be2f251910b154283eea
SHA-256: 02c63f00037a62216f92293c7fc83614f88ece3afc5b5ace680aef4c9c771d6b
kernel-debuginfo-common-x86_64-2.6.32-504.57.1.el6.x86_64.rpm
File outdated by:  RHSA-2017:1488
    MD5: a8f8808eb7489f6890abf1cd5ba4819f
SHA-256: b8c6d2173f13a25f9da56c9b1da6ca7781c31ba16216ec8a223b7a678e0d8f75
kernel-devel-2.6.32-504.57.1.el6.x86_64.rpm
File outdated by:  RHSA-2017:1488
    MD5: 8ed919132642f9512edc2ad1b19009c7
SHA-256: 3f3d80207a807274aadc7a35fcdcbea947dfe1c837ccec94d38657af4934d086
kernel-doc-2.6.32-504.57.1.el6.noarch.rpm
File outdated by:  RHSA-2017:1488
    MD5: 2a10bc6d3a8731fa2a11fa0635e37a51
SHA-256: 0925b22a5dc9054bb0a992cb33e1cc9e1b4bf16d075c35369afc576211de7b93
kernel-firmware-2.6.32-504.57.1.el6.noarch.rpm
File outdated by:  RHSA-2017:1488
    MD5: c57463ab79bd59cb8e3bb5db93caaab7
SHA-256: 7472925334b47588ae1508252b062d67788a0965dd514b2ec1663f073b9226a3
kernel-headers-2.6.32-504.57.1.el6.x86_64.rpm
File outdated by:  RHSA-2017:1488
    MD5: 745f130cc7d3c61fc5df9e3b3cf744db
SHA-256: 83e97cd35e45834dc0b8dee13b5381bae248d7541699505533b9cfcb4ade654f
perf-2.6.32-504.57.1.el6.x86_64.rpm
File outdated by:  RHSA-2017:1488
    MD5: 594e57cced0a2ddc22cc6351a0445c55
SHA-256: 7125ef4b22259389faa48da717526e68cd1a764b47dbb05173d0bf695380d4df
perf-debuginfo-2.6.32-504.57.1.el6.x86_64.rpm
File outdated by:  RHSA-2017:1488
    MD5: 3184bc1d26f15c669dafd838b36f7d8a
SHA-256: f9c445db8c834ac285f2562c1dae7c17b2395e38f0d5db2d27b59f15989e69a0
python-perf-2.6.32-504.57.1.el6.x86_64.rpm
File outdated by:  RHSA-2017:1488
    MD5: 2c7d6e07696b899d234a2035759d700e
SHA-256: 9fd0ce9dceaa06f44d73b95a82ae29816de429ecbdeb330b5b620b30377a45cd
python-perf-debuginfo-2.6.32-504.57.1.el6.x86_64.rpm
File outdated by:  RHSA-2017:1488
    MD5: 862fba8d0414adbeb09592e2354051a5
SHA-256: 814506923a494685c86f0ddbb0850601e620002712a95a299df08c7a10521e22
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1423071 - CVE-2017-6074 kernel: use after free in dccp protocol


References


Keywords

reboot_suggested


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/