First published: Mon Apr 10 2017(Updated: )
crypto/ahash.c in the Linux kernel through 4.10.9 allows attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=3.15<3.16.44 | |
Linux Linux kernel | >=3.17<3.18.50 | |
Linux Linux kernel | >=3.19<4.1.40 | |
Linux Linux kernel | >=4.2<4.4.63 | |
Linux Linux kernel | >=4.5<4.9.24 | |
Linux Linux kernel | >=4.10<4.10.12 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2017-7618.
The vulnerability allows attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue.
The Linux kernel versions through 4.10.9 are affected by this vulnerability.
To fix this vulnerability, update your Linux kernel to version 4.11 or higher.
You can find more information about this vulnerability on the following links: [SecurityFocus](http://www.securityfocus.com/bid/97534), [Marc.info](http://marc.info/?l=linux-crypto-vger&m=149181655623850&w=2), [HPE Support](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03800en_us).