Race condition in the inet_frag_intern function in net/ipv4/inet_fragment.c in the Linux kernel through 3.13.6 allows remote attackers to cause a denial of service (use-after-free error) or possibly have unspecified other impact via a large series of fragmented ICMP Echo Request packets to a system with a heavy CPU load.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2014/03/04/4 | mailing list third party advisory patch |
http://patchwork.ozlabs.org/patch/325844/ | third party advisory patch |
https://bugzilla.redhat.com/show_bug.cgi?id=1070618 | issue tracking third party advisory patch |