A divide-by-zero vulnerability was found in a way the kernel processes TCP connections. The error can occur if a connection starts another cwnd reduction phase by setting tp->prior_cwnd to the current cwnd (0) in tcp_init_cwnd_reduction(). A remote, unauthenticated attacker could use this flaw to crash the kernel (denial of service). Original bug report: https://lkml.org/lkml/2015/12/21/435 Oss-security reference: http://seclists.org/oss-sec/2016/q1/198 CVE assignment: http://seclists.org/oss-sec/2016/q1/211 Upstream fix: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8b8a321ff72c785ed5e8b4cf6eda20b35d427390
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1302673]
Statement: This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG-2 as the code with the flaw is not present in the products listed.