A flaw was found in the Linux kernels handling of packets with the URG flag. Applications using the splice() and tcp_splice_read() functionality can allow a remote attacker to force the kernel to enter a condition in which it can loop indefinitely. Upstream patch: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ccf7abb93af09ad0868ae9033d1ca8108bdaec82 References: https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.11 http://seclists.org/oss-sec/2017/q1/491
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1430585]
Statement: This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 as the code with the flaw is not present in the products listed. This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2. Future Linux kernel updates for the respective releases might address this issue.
As mentioned in the original comment, this was fixed in upstream 4.9.11. This update was shipped to all stable Fedora updates on February 24, 2017
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2017:1372 https://access.redhat.com/errata/RHSA-2017:1372
This issue has been addressed in the following products: Red Hat Enterprise MRG 2 Via RHSA-2017:1647 https://access.redhat.com/errata/RHSA-2017:1647
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1615 https://access.redhat.com/errata/RHSA-2017:1615
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1616 https://access.redhat.com/errata/RHSA-2017:1616