SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Linux)  >   Linux Kernel Vendors:   kernel.org
(CentOS Issues Fix) Linux Kernel UDP Processing Flaw Lets Remote Users Deny Service
SecurityTracker Alert ID:  1033291
SecurityTracker URL:  http://securitytracker.com/id/1033291
CVE Reference:   CVE-2015-5364, CVE-2015-5366   (Links to External Site)
Date:  Aug 14 2015
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): CentOS 6
Description:   Two vulnerabilities were reported in the Linux Kernel. A remote user can cause denial of service conditions on the target system.

A remote user can send a flood of UDP packets with specially crafted checksums to cause the target application to hang [CVE-2015-5364].

A remote user can send a flood of UDP packets with specially crafted checksums to cause the target application to stop reading packets [CVE-2015-5366].

Impact:   A remote user can cause the target application to hang.

A remote user can cause the target application to stop reading packets.

Solution:   CentOS has issued a fix.

i386:
255a337cbf42c19545379811d17b6eb51149a8fdbc5a17034f0113d6746927ea kernel-2.6.32-573.3.1.el6.i686.rpm
d1145b823e644fc293e5651444e90b40572c7b18f97e3d2d06c89b0b71f7664e kernel-abi-whitelists-2.6.32-573.3.1.el6.noarch.rpm
8d5a57e6eb50ebb621eb4cb5651e434e7842c2a2de654e08c1de081f65de832e kernel-debug-2.6.32-573.3.1.el6.i686.rpm
d65d9617865b5f8cd74b45c00b9523d85788d6457ab8fe218d411a147ee64812 kernel-debug-devel-2.6.32-573.3.1.el6.i686.rpm
091300bbcab0ac995e957ce4b39505207e1bd9e6311a394b81ed762a0f2a49c3 kernel-devel-2.6.32-573.3.1.el6.i686.rpm
75b66f3931de73f9d79664eaecf1ff0385d2396ea87191313b1a48ae7adb1109 kernel-doc-2.6.32-573.3.1.el6.noarch.rpm
4837848450059bfa3ce0fb1ad2297721b31b0d2fcc79c843eec15d92fa2c0696 kernel-firmware-2.6.32-573.3.1.el6.noarch.rpm
910b455b2916fc76980e545fd1cba29b282f7aba16dc6f8589d8acbd328b5661 kernel-headers-2.6.32-573.3.1.el6.i686.rpm
d7ee0833f6578fd6a900700f2b84f7fc39cc39fbae9624a179074954641884d2 perf-2.6.32-573.3.1.el6.i686.rpm
e7566d4fa5cd4d76ca3a8c11a84dd2339f73196b08075e3dbfcb52d842f7db77 python-perf-2.6.32-573.3.1.el6.i686.rpm

x86_64:
cc856b26c82937a01f79eee9aef582e540e23fbf21193cfa7f1e2565e21c59f5 kernel-2.6.32-573.3.1.el6.x86_64.rpm
d1145b823e644fc293e5651444e90b40572c7b18f97e3d2d06c89b0b71f7664e kernel-abi-whitelists-2.6.32-573.3.1.el6.noarch.rpm
de22da4825278d89fee5d4f30b5f0ab4d249906b264c7e1214e96ffd1136cd67 kernel-debug-2.6.32-573.3.1.el6.x86_64.rpm
d65d9617865b5f8cd74b45c00b9523d85788d6457ab8fe218d411a147ee64812 kernel-debug-devel-2.6.32-573.3.1.el6.i686.rpm
16bdae32d7e7923e57e40e7a58463ca42d7896aef2ddce8507f9fc67b4f7d334 kernel-debug-devel-2.6.32-573.3.1.el6.x86_64.rpm
df84903395045dde3d2f9f93747e1a1f35e69bf8a7ca0a159433eaf9e253a718 kernel-devel-2.6.32-573.3.1.el6.x86_64.rpm
75b66f3931de73f9d79664eaecf1ff0385d2396ea87191313b1a48ae7adb1109 kernel-doc-2.6.32-573.3.1.el6.noarch.rpm
4837848450059bfa3ce0fb1ad2297721b31b0d2fcc79c843eec15d92fa2c0696 kernel-firmware-2.6.32-573.3.1.el6.noarch.rpm
84b9082e89964fc4650d7a0df05a58132ea464c8b0bbfab95defabf040650437 kernel-headers-2.6.32-573.3.1.el6.x86_64.rpm
49d53814b0ea4fc7d6f413141dca67747b8ef3e0f17ef809e6f20b2d0e2f3bb1 perf-2.6.32-573.3.1.el6.x86_64.rpm
4c339aae0955aae515488e6b01bdbb4717b464d230b2811c14a216b5125aef9e python-perf-2.6.32-573.3.1.el6.x86_64.rpm

Source:
d01abca667b8e189a4cfed8f0fa397c8e99add7d57c491e2b9c0e70d8656a09c kernel-2.6.32-573.3.1.el6.src.rpm

Cause:   State error

Message History:   This archive entry is a follow-up to the message listed below.
Jul 7 2015 Linux Kernel UDP Processing Flaw Lets Remote Users Deny Service



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC