A flaw was found in the kernels implementation of raw_sendmsg allowing a
local attacker to panic the kernel or possible leak kernel addresses. A
local attacker with the privilege of creating raw sockets, can abuse a
possible race condition when setting the socket option to allow the kernel
to automatically create ip header values.
An upstream patch:
Created kernel tracking bugs for this issue:
Affects: fedora-all [bug 1526933]
This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 as they do not contain the upstream commit (c008ba5bdc9f) that allows this issue to be exploited.
This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 for ARM and Red Hat Enterprise Linux for Power LE.
Future Linux kernel updates for the respective releases may address this issue.
What is Red Hat Enterprise Linux 7 for ARM 64,
Red Hat Enterprise Linux 7 for Power 9 LE
The kernel package as shipped with Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE is an updated kernel intended to support new architectures not available at the time of Red Hat Enterprise Linux 7 original shipping. The new kernel version is based on an upstream Linux kernel version 4.11. The offering is distributed with other updated packages, but most of the userspace is the standard Red Hat Enterprise Linux 7 Server RPM files.
For more information please refer to:
This issue has been addressed in the following products:
Red Hat Enterprise Linux 7
Via RHSA-2018:0502 https://access.redhat.com/errata/RHSA-2018:0502