First published: Thu Aug 31 2017(Updated: )
Divide-by-zero vulnerability was found in __tcp_select_window function which can result into kernel panic causing local denial-of-service if panic_on_oops is enabled. References: <a href="http://seclists.org/oss-sec/2017/q3/389">http://seclists.org/oss-sec/2017/q3/389</a> <a href="https://marc.info/?l=linux-netdev&m=150415901823078">https://marc.info/?l=linux-netdev&m=150415901823078</a> <a href="https://www.mail-archive.com/netdev@vger.kernel.org/msg186255.html">https://www.mail-archive.com/netdev@vger.kernel.org/msg186255.html</a> <a href="https://groups.google.com/forum/#!topic/syzkaller/e4SrsEBEziQ">https://groups.google.com/forum/#!topic/syzkaller/e4SrsEBEziQ</a> Upstream patch: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=499350a5a6e7512d9ed369ed63a4244b6536f4f8">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=499350a5a6e7512d9ed369ed63a4244b6536f4f8</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=4.11.12 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14106 is a vulnerability that allows local users to cause a denial of service by triggering a disconnect within a certain tcp_recvmsg code path.
Linux kernel versions before 4.12 are affected by CVE-2017-14106.
CVE-2017-14106 has a medium severity with a CVSS score of 4.
To fix CVE-2017-14106, update your Linux kernel to version 4.12 or later.
You can find more information about CVE-2017-14106 at the following references: [1] [2] [3].