Описание
The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.
Ссылки
- Issue TrackingPatch
- Release NotesThird Party Advisory
- ExploitThird Party Advisory
- Issue TrackingThird Party Advisory
- Issue TrackingPatch
- Issue TrackingPatch
- Release NotesThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
EPSS
5.5 Medium
CVSS3
4.9 Medium
CVSS2
Дефекты
Связанные уязвимости
The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.
The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.
The tcp_check_send_head function in include/net/tcp.h in the Linux ker ...
The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.
ELSA-2017-0086: kernel security, bug fix, and enhancement update (IMPORTANT)
EPSS
5.5 Medium
CVSS3
4.9 Medium
CVSS2