It was found that the Linux kernel's IPv6 implementation mishandles socket option data. A local attacker can abuse concurrent access to the socket options to escalate their privileges, or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call. Upstream patch: https://github.com/torvalds/linux/commit/45f6fad84cc305103b28d73482b344d7f5b76f39
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1364972]
This was fixed in upstream 4.4 kernels. All Fedora releases are currently shipping newer kernels than this which contain the listed fix.
Statement: This issue affects Red Hat Enterprise Linux 6 and 7 kernels. This issue was fixed in a version 6 prior to this issue being raised. As this issue is rated as important, it has been scheduled to be fixed in a future version of Red Hat Enterprise Linux 7.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:2574 https://rhn.redhat.com/errata/RHSA-2016-2574.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:2584 https://rhn.redhat.com/errata/RHSA-2016-2584.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.2 Extended Update Support Via RHSA-2016:2695 https://rhn.redhat.com/errata/RHSA-2016-2695.html