Bug 1426542 (CVE-2017-6214)
Summary: | CVE-2017-6214 kernel: ipv4/tcp: Infinite loop in tcp_splice_read() | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Andrej Nemec <anemec> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | afox, alexandre.chanu, aquini, bhu, dhoward, dominik.mierzejewski, fhrbata, gansalmon, iboverma, ichavero, itamar, jforbes, jkacur, jonathan, jross, jwboyer, kernel-maint, kernel-mgr, labbott, lgoncalv, madhu.chinakonda, matt, mchehab, mcressma, nmurray, pholasek, plougher, rt-maint, rvrbovsk, slawomir, slong, williams, wmealing, yozone |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in the Linux kernel's handling of packets with the URG flag. Applications using the splice() and tcp_splice_read() functionality could allow a remote attacker to force the kernel to enter a condition in which it could loop indefinitely.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-08 03:08:07 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1430577, 1430578, 1430579, 1430580, 1430581, 1430582, 1430583, 1430584, 1430585 | ||
Bug Blocks: | 1426543 |
Description
Andrej Nemec
2017-02-24 09:00:20 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1430585] Statement: This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 as the code with the flaw is not present in the products listed. This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2. Future Linux kernel updates for the respective releases might address this issue. As mentioned in the original comment, this was fixed in upstream 4.9.11. This update was shipped to all stable Fedora updates on February 24, 2017 This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2017:1372 https://access.redhat.com/errata/RHSA-2017:1372 This issue has been addressed in the following products: Red Hat Enterprise MRG 2 Via RHSA-2017:1647 https://access.redhat.com/errata/RHSA-2017:1647 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1615 https://access.redhat.com/errata/RHSA-2017:1615 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1616 https://access.redhat.com/errata/RHSA-2017:1616 |