-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: kernel security update
Advisory ID:       RHSA-2020:3836-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:3836
Issue date:        2020-09-24
CVE Names:         CVE-2017-2647 
====================================================================
1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 6.6
Advanced Update Support.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Server AUS (v. 6.6) - noarch, x86_64
Red Hat Enterprise Linux Server Optional AUS (v. 6.6) - x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* kernel: Null pointer dereference in search_keyring (CVE-2017-2647)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1428353 - CVE-2017-2647 kernel: Null pointer dereference in search_keyring

6. Package List:

Red Hat Enterprise Linux Server AUS (v. 6.6):

Source:
kernel-2.6.32-504.84.1.el6.src.rpm

noarch:
kernel-abi-whitelists-2.6.32-504.84.1.el6.noarch.rpm
kernel-doc-2.6.32-504.84.1.el6.noarch.rpm
kernel-firmware-2.6.32-504.84.1.el6.noarch.rpm

x86_64:
kernel-2.6.32-504.84.1.el6.x86_64.rpm
kernel-debug-2.6.32-504.84.1.el6.x86_64.rpm
kernel-debug-debuginfo-2.6.32-504.84.1.el6.x86_64.rpm
kernel-debug-devel-2.6.32-504.84.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-504.84.1.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-504.84.1.el6.x86_64.rpm
kernel-devel-2.6.32-504.84.1.el6.x86_64.rpm
kernel-headers-2.6.32-504.84.1.el6.x86_64.rpm
perf-2.6.32-504.84.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-504.84.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-504.84.1.el6.x86_64.rpm

Red Hat Enterprise Linux Server Optional AUS (v. 6.6):

x86_64:
kernel-debug-debuginfo-2.6.32-504.84.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-504.84.1.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-504.84.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-504.84.1.el6.x86_64.rpm
python-perf-2.6.32-504.84.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-504.84.1.el6.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2017-2647
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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pcfN
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2020-3836:01 Important: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support

Summary

The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Null pointer dereference in search_keyring (CVE-2017-2647)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.

References

https://access.redhat.com/security/cve/CVE-2017-2647 https://access.redhat.com/security/updates/classification/#important

Package List

Red Hat Enterprise Linux Server AUS (v. 6.6):
Source: kernel-2.6.32-504.84.1.el6.src.rpm
noarch: kernel-abi-whitelists-2.6.32-504.84.1.el6.noarch.rpm kernel-doc-2.6.32-504.84.1.el6.noarch.rpm kernel-firmware-2.6.32-504.84.1.el6.noarch.rpm
x86_64: kernel-2.6.32-504.84.1.el6.x86_64.rpm kernel-debug-2.6.32-504.84.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-504.84.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-504.84.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.84.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-504.84.1.el6.x86_64.rpm kernel-devel-2.6.32-504.84.1.el6.x86_64.rpm kernel-headers-2.6.32-504.84.1.el6.x86_64.rpm perf-2.6.32-504.84.1.el6.x86_64.rpm perf-debuginfo-2.6.32-504.84.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.84.1.el6.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 6.6):
x86_64: kernel-debug-debuginfo-2.6.32-504.84.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.84.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-504.84.1.el6.x86_64.rpm perf-debuginfo-2.6.32-504.84.1.el6.x86_64.rpm python-perf-2.6.32-504.84.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.84.1.el6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2020:3836-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3836
Issued Date: : 2020-09-24
CVE Names: CVE-2017-2647

Topic

An update for kernel is now available for Red Hat Enterprise Linux 6.6Advanced Update Support.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux Server AUS (v. 6.6) - noarch, x86_64

Red Hat Enterprise Linux Server Optional AUS (v. 6.6) - x86_64


Bugs Fixed

1428353 - CVE-2017-2647 kernel: Null pointer dereference in search_keyring


Related News