The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.
                
            References
                    Configurations
                    History
                    No history.
Information
                Published : 2016-10-16 21:59
Updated : 2025-04-12 10:46
NVD link : CVE-2016-6828
Mitre link : CVE-2016-6828
CVE.ORG link : CVE-2016-6828
JSON object : View
Products Affected
                linux
- linux_kernel
 
CWE
                
                    
                        
                        CWE-416
                        
            Use After Free
