how to check DCCP vulnerabilitity CVE-2017-60 linux


How to check vulnerabilitity CVE-2017-6074 Linux kernel privilege local escalation
check dccp is enabled in kernel


grep CONFIG_IP_DCCP /boot/config-`uname -r`

and check kernel module using lsmode if return something add dccp to black list


 lsmod | grep -i dccp

and , or check you kernel version using this script from redhat :

https://access.redhat.com/sites/default/files/cve-2017-6074.sh

Redhat prepared patch for systems :
RHSA-2017:0294 -rh7
RHSA-2017:0293 -rh6

list affected kernels:

'2.6.18-8.1.1.el5'
 '2.6.18-8.1.3.el5'
 '2.6.18-8.1.4.el5'
 '2.6.18-8.1.6.el5'
 '2.6.18-8.1.8.el5'
 '2.6.18-8.1.10.el5'
 '2.6.18-8.1.14.el5'
 '2.6.18-8.1.15.el5'
 '2.6.18-53.el5'
 '2.6.18-53.1.4.el5'
 '2.6.18-53.1.6.el5'
 '2.6.18-53.1.13.el5'
 '2.6.18-53.1.14.el5'
 '2.6.18-53.1.19.el5'
 '2.6.18-53.1.21.el5'
 '2.6.18-92.el5'
 '2.6.18-92.1.1.el5'
 '2.6.18-92.1.6.el5'
 '2.6.18-92.1.10.el5'
 '2.6.18-92.1.13.el5'
 '2.6.18-92.1.18.el5'
 '2.6.18-92.1.22.el5'
 '2.6.18-92.1.24.el5'
 '2.6.18-92.1.26.el5'
 '2.6.18-92.1.27.el5'
 '2.6.18-92.1.28.el5'
 '2.6.18-92.1.29.el5'
 '2.6.18-92.1.32.el5'
 '2.6.18-92.1.35.el5'
 '2.6.18-92.1.38.el5'
 '2.6.18-128.el5'
 '2.6.18-128.1.1.el5'
 '2.6.18-128.1.6.el5'
 '2.6.18-128.1.10.el5'
 '2.6.18-128.1.14.el5'
 '2.6.18-128.1.16.el5'
 '2.6.18-128.2.1.el5'
 '2.6.18-128.4.1.el5'
 '2.6.18-128.4.1.el5'
 '2.6.18-128.7.1.el5'
 '2.6.18-128.8.1.el5'
 '2.6.18-128.11.1.el5'
 '2.6.18-128.12.1.el5'
 '2.6.18-128.14.1.el5'
 '2.6.18-128.16.1.el5'
 '2.6.18-128.17.1.el5'
 '2.6.18-128.18.1.el5'
 '2.6.18-128.23.1.el5'
 '2.6.18-128.23.2.el5'
 '2.6.18-128.25.1.el5'
 '2.6.18-128.26.1.el5'
 '2.6.18-128.27.1.el5'
 '2.6.18-128.29.1.el5'
 '2.6.18-128.30.1.el5'
 '2.6.18-128.31.1.el5'
 '2.6.18-128.32.1.el5'
 '2.6.18-128.35.1.el5'
 '2.6.18-128.36.1.el5'
 '2.6.18-128.37.1.el5'
 '2.6.18-128.38.1.el5'
 '2.6.18-128.39.1.el5'
 '2.6.18-128.40.1.el5'
 '2.6.18-128.41.1.el5'
 '2.6.18-164.el5'
 '2.6.18-164.2.1.el5'
 '2.6.18-164.6.1.el5'
 '2.6.18-164.9.1.el5'
 '2.6.18-164.10.1.el5'
 '2.6.18-164.11.1.el5'
 '2.6.18-164.15.1.el5'
 '2.6.18-164.17.1.el5'
 '2.6.18-164.19.1.el5'
 '2.6.18-164.21.1.el5'
 '2.6.18-164.25.1.el5'
 '2.6.18-164.25.2.el5'
 '2.6.18-164.28.1.el5'
 '2.6.18-164.30.1.el5'
 '2.6.18-164.32.1.el5'
 '2.6.18-164.34.1.el5'
 '2.6.18-164.36.1.el5'
 '2.6.18-164.37.1.el5'
 '2.6.18-164.38.1.el5'
 '2.6.18-194.el5'
 '2.6.18-194.3.1.el5'
 '2.6.18-194.8.1.el5'
 '2.6.18-194.11.1.el5'
 '2.6.18-194.11.3.el5'
 '2.6.18-194.11.4.el5'
 '2.6.18-194.17.1.el5'
 '2.6.18-194.17.4.el5'
 '2.6.18-194.26.1.el5'
 '2.6.18-194.32.1.el5'
 '2.6.18-238.el5'
 '2.6.18-238.1.1.el5'
 '2.6.18-238.5.1.el5'
 '2.6.18-238.9.1.el5'
 '2.6.18-238.12.1.el5'
 '2.6.18-238.19.1.el5'
 '2.6.18-238.21.1.el5'
 '2.6.18-238.27.1.el5'
 '2.6.18-238.28.1.el5'
 '2.6.18-238.31.1.el5'
 '2.6.18-238.33.1.el5'
 '2.6.18-238.35.1.el5'
 '2.6.18-238.37.1.el5'
 '2.6.18-238.39.1.el5'
 '2.6.18-238.40.1.el5'
 '2.6.18-238.44.1.el5'
 '2.6.18-238.45.1.el5'
 '2.6.18-238.47.1.el5'
 '2.6.18-238.48.1.el5'
 '2.6.18-238.49.1.el5'
 '2.6.18-238.50.1.el5'
 '2.6.18-238.51.1.el5'
 '2.6.18-238.52.1.el5'
 '2.6.18-238.53.1.el5'
 '2.6.18-238.54.1.el5'
 '2.6.18-238.55.1.el5'
 '2.6.18-238.56.1.el5'
 '2.6.18-238.57.1.el5'
 '2.6.18-274.el5'
 '2.6.18-274.3.1.el5'
 '2.6.18-274.7.1.el5'
 '2.6.18-274.12.1.el5'
 '2.6.18-274.17.1.el5'
 '2.6.18-274.18.1.el5'
 '2.6.18-308.el5'
 '2.6.18-308.1.1.el5'
 '2.6.18-308.4.1.el5'
 '2.6.18-308.8.1.el5'
 '2.6.18-308.8.2.el5'
 '2.6.18-308.11.1.el5'
 '2.6.18-308.13.1.el5'
 '2.6.18-308.16.1.el5'
 '2.6.18-308.20.1.el5'
 '2.6.18-308.24.1.el5'
 '2.6.18-348.el5'
 '2.6.18-348.1.1.el5'
 '2.6.18-348.2.1.el5'
 '2.6.18-348.3.1.el5'
 '2.6.18-348.4.1.el5'
 '2.6.18-348.6.1.el5'
 '2.6.18-348.12.1.el5'
 '2.6.18-348.16.1.el5'
 '2.6.18-348.18.1.el5'
 '2.6.18-348.19.1.el5'
 '2.6.18-348.21.1.el5'
 '2.6.18-348.22.1.el5'
 '2.6.18-348.23.1.el5'
 '2.6.18-348.25.1.el5'
 '2.6.18-348.27.1.el5'
 '2.6.18-348.28.1.el5'
 '2.6.18-348.29.1.el5'
 '2.6.18-348.30.1.el5'
 '2.6.18-348.31.2.el5'
 '2.6.18-348.32.1.el5'
 '2.6.18-371.el5'
 '2.6.18-371.1.2.el5'
 '2.6.18-371.3.1.el5'
 '2.6.18-371.4.1.el5'
 '2.6.18-371.6.1.el5'
 '2.6.18-371.8.1.el5'
 '2.6.18-371.9.1.el5'
 '2.6.18-371.11.1.el5'
 '2.6.18-371.12.1.el5'
 '2.6.18-398.el5'
 '2.6.18-400.el5'
 '2.6.18-400.1.1.el5'
 '2.6.18-402.el5'
 '2.6.18-404.el5'
 '2.6.18-406.el5'
 '2.6.18-407.el5'
 '2.6.18-408.el5'
 '2.6.18-409.el5'
 '2.6.18-410.el5'
 '2.6.18-411.el5'
 '2.6.18-412.el5'
 '2.6.18-416.el5'
 '2.6.18-417.el5'
 '2.6.18-418.el5'
 '2.6.32-71.7.1.el6'
 '2.6.32-71.14.1.el6'
 '2.6.32-71.18.1.el6'
 '2.6.32-71.18.2.el6'
 '2.6.32-71.24.1.el6'
 '2.6.32-71.29.1.el6'
 '2.6.32-71.31.1.el6'
 '2.6.32-71.34.1.el6'
 '2.6.32-71.35.1.el6'
 '2.6.32-71.36.1.el6'
 '2.6.32-71.37.1.el6'
 '2.6.32-71.38.1.el6'
 '2.6.32-71.39.1.el6'
 '2.6.32-71.40.1.el6'
 '2.6.32-131.0.15.el6'
 '2.6.32-131.2.1.el6'
 '2.6.32-131.4.1.el6'
 '2.6.32-131.6.1.el6'
 '2.6.32-131.12.1.el6'
 '2.6.32-131.17.1.el6'
 '2.6.32-131.21.1.el6'
 '2.6.32-131.22.1.el6'
 '2.6.32-131.25.1.el6'
 '2.6.32-131.26.1.el6'
 '2.6.32-131.28.1.el6'
 '2.6.32-131.29.1.el6'
 '2.6.32-131.30.1.el6'
 '2.6.32-131.30.2.el6'
 '2.6.32-131.33.1.el6'
 '2.6.32-131.35.1.el6'
 '2.6.32-131.36.1.el6'
 '2.6.32-131.37.1.el6'
 '2.6.32-131.38.1.el6'
 '2.6.32-131.39.1.el6'
 '2.6.32-220.el6'
 '2.6.32-220.2.1.el6'
 '2.6.32-220.4.1.el6'
 '2.6.32-220.4.2.el6'
 '2.6.32-220.4.7.bgq.el6'
 '2.6.32-220.7.1.el6'
 '2.6.32-220.7.3.p7ih.el6'
 '2.6.32-220.7.4.p7ih.el6'
 '2.6.32-220.7.6.p7ih.el6'
 '2.6.32-220.7.7.p7ih.el6'
 '2.6.32-220.13.1.el6'
 '2.6.32-220.17.1.el6'
 '2.6.32-220.23.1.el6'
 '2.6.32-220.24.1.el6'
 '2.6.32-220.25.1.el6'
 '2.6.32-220.26.1.el6'
 '2.6.32-220.28.1.el6'
 '2.6.32-220.30.1.el6'
 '2.6.32-220.31.1.el6'
 '2.6.32-220.32.1.el6'
 '2.6.32-220.34.1.el6'
 '2.6.32-220.34.2.el6'
 '2.6.32-220.38.1.el6'
 '2.6.32-220.39.1.el6'
 '2.6.32-220.41.1.el6'
 '2.6.32-220.42.1.el6'
 '2.6.32-220.45.1.el6'
 '2.6.32-220.46.1.el6'
 '2.6.32-220.48.1.el6'
 '2.6.32-220.51.1.el6'
 '2.6.32-220.52.1.el6'
 '2.6.32-220.53.1.el6'
 '2.6.32-220.54.1.el6'
 '2.6.32-220.55.1.el6'
 '2.6.32-220.56.1.el6'
 '2.6.32-220.57.1.el6'
 '2.6.32-220.58.1.el6'
 '2.6.32-220.60.2.el6'
 '2.6.32-220.62.1.el6'
 '2.6.32-220.63.2.el6'
 '2.6.32-220.64.1.el6'
 '2.6.32-220.65.1.el6'
 '2.6.32-220.66.1.el6'
 '2.6.32-220.67.1.el6'
 '2.6.32-220.68.1.el6'
 '2.6.32-220.69.1.el6'
 '2.6.32-279.el6'
 '2.6.32-279.1.1.el6'
 '2.6.32-279.2.1.el6'
 '2.6.32-279.5.1.el6'
 '2.6.32-279.5.2.el6'
 '2.6.32-279.9.1.el6'
 '2.6.32-279.11.1.el6'
 '2.6.32-279.14.1.bgq.el6'
 '2.6.32-279.14.1.el6'
 '2.6.32-279.19.1.el6'
 '2.6.32-279.22.1.el6'
 '2.6.32-279.23.1.el6'
 '2.6.32-279.25.1.el6'
 '2.6.32-279.25.2.el6'
 '2.6.32-279.31.1.el6'
 '2.6.32-279.33.1.el6'
 '2.6.32-279.34.1.el6'
 '2.6.32-279.37.2.el6'
 '2.6.32-279.39.1.el6'
 '2.6.32-279.41.1.el6'
 '2.6.32-279.42.1.el6'
 '2.6.32-279.43.1.el6'
 '2.6.32-279.43.2.el6'
 '2.6.32-279.46.1.el6'
 '2.6.32-358.el6'
 '2.6.32-358.0.1.el6'
 '2.6.32-358.2.1.el6'
 '2.6.32-358.6.1.el6'
 '2.6.32-358.6.2.el6'
 '2.6.32-358.6.3.p7ih.el6'
 '2.6.32-358.11.1.bgq.el6'
 '2.6.32-358.11.1.el6'
 '2.6.32-358.14.1.el6'
 '2.6.32-358.18.1.el6'
 '2.6.32-358.23.2.el6'
 '2.6.32-358.28.1.el6'
 '2.6.32-358.32.3.el6'
 '2.6.32-358.37.1.el6'
 '2.6.32-358.41.1.el6'
 '2.6.32-358.44.1.el6'
 '2.6.32-358.46.1.el6'
 '2.6.32-358.46.2.el6'
 '2.6.32-358.48.1.el6'
 '2.6.32-358.49.1.el6'
 '2.6.32-358.51.1.el6'
 '2.6.32-358.51.2.el6'
 '2.6.32-358.55.1.el6'
 '2.6.32-358.56.1.el6'
 '2.6.32-358.59.1.el6'
 '2.6.32-358.61.1.el6'
 '2.6.32-358.62.1.el6'
 '2.6.32-358.65.1.el6'
 '2.6.32-358.67.1.el6'
 '2.6.32-358.68.1.el6'
 '2.6.32-358.69.1.el6'
 '2.6.32-358.70.1.el6'
 '2.6.32-358.71.1.el6'
 '2.6.32-358.72.1.el6'
 '2.6.32-358.73.1.el6'
 '2.6.32-358.75.1.el6'
 '2.6.32-358.76.1.el6'
 '2.6.32-358.111.1.openstack.el6'
 '2.6.32-358.114.1.openstack.el6'
 '2.6.32-358.118.1.openstack.el6'
 '2.6.32-358.123.4.openstack.el6'
 '2.6.32-431.el6'
 '2.6.32-431.1.1.bgq.el6'
 '2.6.32-431.1.2.el6'
 '2.6.32-431.3.1.el6'
 '2.6.32-431.5.1.el6'
 '2.6.32-431.11.2.el6'
 '2.6.32-431.17.1.el6'
 '2.6.32-431.20.3.el6'
 '2.6.32-431.20.5.el6'
 '2.6.32-431.23.3.el6'
 '2.6.32-431.29.2.el6'
 '2.6.32-431.37.1.el6'
 '2.6.32-431.40.1.el6'
 '2.6.32-431.40.2.el6'
 '2.6.32-431.46.2.el6'
 '2.6.32-431.50.1.el6'
 '2.6.32-431.53.2.el6'
 '2.6.32-431.56.1.el6'
 '2.6.32-431.59.1.el6'
 '2.6.32-431.61.2.el6'
 '2.6.32-431.64.1.el6'
 '2.6.32-431.66.1.el6'
 '2.6.32-431.68.1.el6'
 '2.6.32-431.69.1.el6'
 '2.6.32-431.70.1.el6'
 '2.6.32-431.71.1.el6'
 '2.6.32-431.72.1.el6'
 '2.6.32-431.73.2.el6'
 '2.6.32-431.74.1.el6'
 '2.6.32-431.75.1.el6'
 '2.6.32-431.75.1.el6'
 '2.6.32-431.76.1.el6'
 '2.6.32-431.77.1.el6'
 '2.6.32-431.77.1.el6'
 '2.6.32-504.el6'
 '2.6.32-504.1.3.el6'
 '2.6.32-504.3.3.el6'
 '2.6.32-504.8.1.el6'
 '2.6.32-504.8.2.bgq.el6'
 '2.6.32-504.12.2.el6'
 '2.6.32-504.16.2.el6'
 '2.6.32-504.23.4.el6'
 '2.6.32-504.30.3.el6'
 '2.6.32-504.30.5.p7ih.el6'
 '2.6.32-504.30.6.p7ih.el6'
 '2.6.32-504.33.2.el6'
 '2.6.32-504.36.1.el6'
 '2.6.32-504.38.1.el6'
 '2.6.32-504.40.1.el6'
 '2.6.32-504.43.1.el6'
 '2.6.32-504.46.1.el6'
 '2.6.32-504.49.1.el6'
 '2.6.32-504.50.1.el6'
 '2.6.32-504.51.1.el6'
 '2.6.32-504.52.1.el6'
 '2.6.32-504.54.1.el6'
 '2.6.32-504.55.1.el6'
 '2.6.32-504.56.1.el6'
 '2.6.32-504.56.1.el6'
 '2.6.32-573.el6'
 '2.6.32-573.1.1.el6'
 '2.6.32-573.3.1.el6'
 '2.6.32-573.4.2.bgq.el6'
 '2.6.32-573.7.1.el6'
 '2.6.32-573.8.1.el6'
 '2.6.32-573.12.1.el6'
 '2.6.32-573.18.1.el6'
 '2.6.32-573.22.1.el6'
 '2.6.32-573.26.1.el6'
 '2.6.32-573.30.1.el6'
 '2.6.32-573.32.1.el6'
 '2.6.32-573.34.1.el6'
 '2.6.32-573.35.1.el6'
 '2.6.32-573.35.2.el6'
 '2.6.32-573.37.1.el6'
 '2.6.32-573.38.1.el6'
 '2.6.32-642.el6'
 '2.6.32-642.1.1.el6'
 '2.6.32-642.3.1.el6'
 '2.6.32-642.4.2.el6'
 '2.6.32-642.6.1.el6'
 '2.6.32-642.6.2.el6'
 '2.6.32-642.11.1.el6'
 '2.6.32-642.13.1.el6'
 '2.6.32-694.el6
'3.10.0-229.rt56.141.el7'
 '3.10.0-229.1.2.rt56.141.2.el7_1'
 '3.10.0-229.4.2.rt56.141.6.el7_1'
 '3.10.0-229.7.2.rt56.141.6.el7_1'
 '3.10.0-229.11.1.rt56.141.11.el7_1'
 '3.10.0-229.14.1.rt56.141.13.el7_1'
 '3.10.0-229.20.1.rt56.141.14.el7_1'
 '3.10.0-327.rt56.204.el7'
 '3.10.0-327.4.5.rt56.206.el7_2'
 '3.10.0-327.10.1.rt56.211.el7_2'
 '3.10.0-327.13.1.rt56.216.el7_2'
 '3.10.0-327.18.2.rt56.223.el7_2'
 '3.10.0-327.22.2.rt56.230.el7_2'
 '3.10.0-327.28.2.rt56.234.el7_2'
 '3.10.0-327.28.3.rt56.235.el7'
 '3.10.0-327.36.1.rt56.237.el7'
 '3.10.0-327.36.3.rt56.238.el7'
 '3.10.0-514.rt56.420.el7'
 '3.10.0-514.2.2.rt56.424.el7'
 '3.10.0-514.6.1.rt56.429.el7'

Source
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-6074
https://rhn.redhat.com/errata/RHSA-2017-0294.html
https://access.redhat.com/security/vulnerabilities/2934281

Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s