First published: Thu Feb 23 2017(Updated: )
A flaw was found in the Linux kernels handling of packets with the URG flag. Applications using the splice() and tcp_splice_read() functionality can allow a remote attacker to force the kernel to enter a condition in which it can loop indefinitely. Upstream patch: <a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ccf7abb93af09ad0868ae9033d1ca8108bdaec82">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ccf7abb93af09ad0868ae9033d1ca8108bdaec82</a> References: <a href="https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.11">https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.11</a> <a href="http://seclists.org/oss-sec/2017/q1/491">http://seclists.org/oss-sec/2017/q1/491</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Linux Kernel | <=4.9.10 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2017-6214.
CVE-2017-6214 has a severity level of high.
CVE-2017-6214 allows remote attackers to cause a denial of service in the Linux kernel by exploiting a vulnerability in the tcp_splice_read function of net/ipv4/tcp.c.
Linux kernel versions before 4.9.11 are affected by CVE-2017-6214.
To fix the CVE-2017-6214 vulnerability, update your Linux kernel to version 4.9.11 or later.