Infinite loop in Linux kernel - CVE-2017-6214
Published: May 23, 2017 / Updated: May 31, 2017
Vulnerability identifier: #VU6651
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2017-6214
CWE-ID: CWE-835
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel
Linux kernel
Detailed vulnerability description
The vulnerability allows a remote attacker to perform denial of service (DoS) attack.
The vulnerability exists due to an error in tcp_splice_read() function in net/ipv4/tcp.c in Linux kernel before 4.9.11. A remote attacker can send a specially crafted TCP packet with the URG flag and trigger infinite loop.
Successful exploitation of the vulnerability may allow an attacker to perform denial of service (DoS) attack.
The vulnerability exists due to an error in tcp_splice_read() function in net/ipv4/tcp.c in Linux kernel before 4.9.11. A remote attacker can send a specially crafted TCP packet with the URG flag and trigger infinite loop.
Successful exploitation of the vulnerability may allow an attacker to perform denial of service (DoS) attack.
How to mitigate CVE-2017-6214
Update your kernel to version 4.9.11.