Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-6828

Опубликовано: 15 авг. 2016
Источник: redhat
CVSS3: 4.4
CVSS2: 3.6

Описание

The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.

A use-after-free vulnerability was found in tcp_xmit_retransmit_queue and other tcp_* functions. This condition could allow an attacker to send an incorrect selective acknowledgment to existing connections, possibly resetting a connection.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelAffected
Red Hat Enterprise Linux 6kernelFixedRHSA-2017:003610.01.2017
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2017:009117.01.2017
Red Hat Enterprise Linux 7kernelFixedRHSA-2017:008617.01.2017
Red Hat Enterprise MRG 2kernel-rtFixedRHSA-2017:011317.01.2017

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=1367091kernel: Use after free in tcp_xmit_retransmit_queue

4.4 Medium

CVSS3

3.6 Low

CVSS2

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 8 лет назад

The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.

CVSS3: 5.5
nvd
больше 8 лет назад

The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.

CVSS3: 5.5
debian
больше 8 лет назад

The tcp_check_send_head function in include/net/tcp.h in the Linux ker ...

CVSS3: 5.5
github
около 3 лет назад

The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.

oracle-oval
больше 8 лет назад

ELSA-2017-0086: kernel security, bug fix, and enhancement update (IMPORTANT)

4.4 Medium

CVSS3

3.6 Low

CVSS2

Уязвимость CVE-2016-6828