A vulnerability in Linux Kernel, that can be exploited by people with malicious intent to cause a Denial of Service, has been patched.
PUBLISH DATE: 06-09-2018
An error within the “cipso_v4_optptr()” function (net/ipv4/cipso_ipv4.c) of the Linux Kernel can be exploited to trigger an infinite loop. This leads to a Denial of Service, withholding an organization’s availability. The vulnerability has been patched in a recent update.
A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. An attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c by remotely sending a crafted network package. This leads to a denial-of-service.
An attacker needs to set up a certain non-default configuration of LSM (Linux Security Module) and NetLabel on a system in order to leverage this flaw. All the kernels with the cipso_v4_optptr() function which have not backported the upstream commit 40413955ee26 are vulnerable.
This attack is launched via network and may put an organization’s availability at stake if Denial of Service is successful. To combat this vulnerability, updates have been released by the vendor.
The vulnerability is reported in versions prior to 4.4.154 and prior to 4.9.125 along with some others.
• The Linux Kernel 4.4.x
• Linux Kernel 4.9.x
• Linux Kernel 4.0.5
• Linux Kernel 4.13
Update to version 4.4.154 or 4.9.125.