Vulnerability Description
crypto/ahash.c in the Linux kernel through 4.10.9 allows attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 3.15, < 3.16.44 |
Related Weaknesses (CWE)
References
- http://marc.info/?l=linux-crypto-vger&m=149181655623850&w=2Third Party Advisory
- http://www.securityfocus.com/bid/97534Third Party AdvisoryVDB Entry
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpeThird Party Advisory
- http://marc.info/?l=linux-crypto-vger&m=149181655623850&w=2Third Party Advisory
- http://www.securityfocus.com/bid/97534Third Party AdvisoryVDB Entry
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpeThird Party Advisory
FAQ
What is CVE-2017-7618?
CVE-2017-7618 is a vulnerability with a CVSS score of 7.5 (HIGH). crypto/ahash.c in the Linux kernel through 4.10.9 allows attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue.
How severe is CVE-2017-7618?
CVE-2017-7618 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-7618?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.