Hide Forgot
A flaw was found in the kernels implementation of raw_sendmsg allowing a local attacker to panic the kernel or possible leak kernel addresses. A local attacker with the privilege of creating raw sockets, can abuse a possible race condition when setting the socket option to allow the kernel to automatically create ip header values. References: http://seclists.org/oss-sec/2017/q4/401 https://patchwork.ozlabs.org/patch/846641/ An upstream patch: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8f659a03a0ba9289b9aeb9b4470e6fb263d6f483
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1526933]
Statement: This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 as they do not contain the upstream commit (c008ba5bdc9f) that allows this issue to be exploited. This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 for ARM and Red Hat Enterprise Linux for Power LE. Future Linux kernel updates for the respective releases may address this issue.
What is Red Hat Enterprise Linux 7 for ARM 64, Red Hat Enterprise Linux 7 for Power 9 LE The kernel package as shipped with Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE is an updated kernel intended to support new architectures not available at the time of Red Hat Enterprise Linux 7 original shipping. The new kernel version is based on an upstream Linux kernel version 4.11. The offering is distributed with other updated packages, but most of the userspace is the standard Red Hat Enterprise Linux 7 Server RPM files. For more information please refer to: https://access.redhat.com/articles/3158541 https://access.redhat.com/articles/3158511
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:0502 https://access.redhat.com/errata/RHSA-2018:0502