Hide Forgot
crypto/ahash.c in the Linux kernel allows attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue. Initial discussion: https://www.spinics.net/lists/linux-crypto/msg25101.html http://marc.info/?t=149181406700001&r=1&w=2 http://marc.info/?t=149181666400002&r=1&w=2 Proposed patch: http://marc.info/?l=linux-crypto-vger&m=149181655623850&w=2 Upstream patch: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef0579b64e93188710d48667cb5e014926af9f1b
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1441095]
Statement: This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG-2 as the code where the flaw was found is not present in these products.