SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Linux)  >   Linux Kernel Vendors:   kernel.org
(CentOS Issues Fix) Linux Kernel UDP Processing Flaw Lets Remote Users Deny Service
SecurityTracker Alert ID:  1033588
SecurityTracker URL:  http://securitytracker.com/id/1033588
CVE Reference:   CVE-2015-5364, CVE-2015-5366   (Links to External Site)
Date:  Sep 16 2015
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): CentOS 7
Description:   Two vulnerabilities were reported in the Linux Kernel. A remote user can cause denial of service conditions on the target system.

A remote user can send a flood of UDP packets with specially crafted checksums to cause the target application to hang [CVE-2015-5364].

A remote user can send a flood of UDP packets with specially crafted checksums to cause the target application to stop reading packets [CVE-2015-5366].

Impact:   A remote user can cause the target application to hang.

A remote user can cause the target application to stop reading packets.

Solution:   CentOS has issued a fix.

x86_64:
2b6db9618f5eadc5e387ef7bbb92921016889e4ff475a7d7e58f6ee839b4fee4 kernel-3.10.0-229.14.1.el7.x86_64.rpm
2953bc79d19f33b7c8d3619cc6e4e6674d875b5ad7fc697dd67bdc3a1e8be534 kernel-abi-whitelists-3.10.0-229.14.1.el7.noarch.rpm
f9061a5ae18f4e1144bbcab75aa796b9f03fc222dacbc6bbf32763892316674b kernel-debug-3.10.0-229.14.1.el7.x86_64.rpm
a6408241bb37c5211d17aef1877a3a4deaf17dcfc563f0f71a9feb933fda0bde kernel-debug-devel-3.10.0-229.14.1.el7.x86_64.rpm
ebcc89d2c1f6f905af463e43a378ef7ee8268c8384db22d84a92a3ef9f7494d6 kernel-devel-3.10.0-229.14.1.el7.x86_64.rpm
798f9c01a29374e0514150977172a3b963dd3f2b12bcd570df4a6c3bc3436c27 kernel-doc-3.10.0-229.14.1.el7.noarch.rpm
2990dccdb92ba07e02678a986920de27955dfd91917a47832689764228fc6a8f kernel-headers-3.10.0-229.14.1.el7.x86_64.rpm
3352f73904aefd474e2f7c156671b6420411d843a215b86e7d479fd17b4ddb42 kernel-tools-3.10.0-229.14.1.el7.x86_64.rpm
c0f054af75c2238dcc2e76a2f80f41590efc964d28bb5e37f54d69dadd152867 kernel-tools-libs-3.10.0-229.14.1.el7.x86_64.rpm
293a5f0c016913ed8c8b45d7f4970c5b76f67b5fb98c1f653d78c07c606ee0a9 kernel-tools-libs-devel-3.10.0-229.14.1.el7.x86_64.rpm
6249ecbfad2add537457d487214f18bb01da91b11fea4681e4ec64ee563ae84a perf-3.10.0-229.14.1.el7.x86_64.rpm
a4903553384638544c330b3a3aacef7638b1082cc9e356e13823a5c705208f4c python-perf-3.10.0-229.14.1.el7.x86_64.rpm

Source:
8bb6f681b9f547cce81793c286d5f40f79062b55e9e6eeb2db53d87a338f7465 kernel-3.10.0-229.14.1.el7.src.rpm

Cause:   State error

Message History:   This archive entry is a follow-up to the message listed below.
Jul 7 2015 Linux Kernel UDP Processing Flaw Lets Remote Users Deny Service



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC