Описание
The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.
A use-after-free vulnerability was found in tcp_xmit_retransmit_queue and other tcp_* functions. This condition could allow an attacker to send an incorrect selective acknowledgment to existing connections, possibly resetting a connection.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | kernel | Affected | ||
Red Hat Enterprise Linux 6 | kernel | Fixed | RHSA-2017:0036 | 10.01.2017 |
Red Hat Enterprise Linux 7 | kernel-rt | Fixed | RHSA-2017:0091 | 17.01.2017 |
Red Hat Enterprise Linux 7 | kernel | Fixed | RHSA-2017:0086 | 17.01.2017 |
Red Hat Enterprise MRG 2 | kernel-rt | Fixed | RHSA-2017:0113 | 17.01.2017 |
Показывать по
Дополнительная информация
Статус:
4.4 Medium
CVSS3
3.6 Low
CVSS2
Связанные уязвимости
The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.
The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.
The tcp_check_send_head function in include/net/tcp.h in the Linux ker ...
The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.
ELSA-2017-0086: kernel security, bug fix, and enhancement update (IMPORTANT)
4.4 Medium
CVSS3
3.6 Low
CVSS2