Hide Forgot
Linux kernel built with the IPv4 networking support(CONFIG_NET) is vulnerable to a DoS flaw. It could occur while using TCP Fast open option when initiating a network connection. This issue is a regression caused by upstream commit '355a901e6cf1', when it was back-ported to older 3.10.y - 3.16.y branches. An unprivileged local user could use this flaw to crash the system resulting in DoS. Upstream fix: ------------- -> http://www.spinics.net/lists/netdev/msg325602.html References: ----------- -> http://www.openwall.com/lists/oss-security/2015/04/18/2 -> https://bugs.debian.org/782515
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1213955]
Statement: This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2.