First published: Wed Feb 08 2017(Updated: )
It was reported that with Linux kernel, earlier than version v4.10-rc8, an application may trigger a BUG_ON in sctp_wait_for_sndbuf if the socket tx buffer is full, a thread is waiting on it to queue more data, and meanwhile another thread peels off the association being used by the first thread. References: <a href="https://lkml.org/lkml/2017/1/30/238">https://lkml.org/lkml/2017/1/30/238</a> <a href="http://seclists.org/oss-sec/2017/q1/432">http://seclists.org/oss-sec/2017/q1/432</a> Upstream patch: <a href="https://github.com/torvalds/linux/commit/2dcab598484185dea7ec22219c76dcdd59e3cb90">https://github.com/torvalds/linux/commit/2dcab598484185dea7ec22219c76dcdd59e3cb90</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=4.9.11 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5986 is a vulnerability in the Linux kernel that allows local users to cause a denial of service by triggering a race condition in the sctp_wait_for_sndbuf function.
CVE-2017-5986 has a severity level of medium.
To fix CVE-2017-5986, update your Linux kernel to version 4.9.11 or higher.
You can find more information about CVE-2017-5986 at the following references: [https://lkml.org/lkml/2017/1/30/238](https://lkml.org/lkml/2017/1/30/238), [http://seclists.org/oss-sec/2017/q1/432](http://seclists.org/oss-sec/2017/q1/432), [https://github.com/torvalds/linux/commit/2dcab598484185dea7ec22219c76dcdd59e3cb90](https://github.com/torvalds/linux/commit/2dcab598484185dea7ec22219c76dcdd59e3cb90).
CVE-2017-5986 has a Common Weakness Enumeration (CWE) of 362.