CVE-2016-6828

The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Information

Published : 2016-10-16 14:59

Updated : 2023-02-12 15:25


NVD link : CVE-2016-6828

Mitre link : CVE-2016-6828


JSON object : View

CWE
CWE-416

Use After Free

Advertisement

dedicated server usa

Products Affected

linux

  • linux_kernel