Hide Forgot
Linux kernel built with the networking support(CONFIG_NET) is vulnerable to an infinite loop issue. It could occur while receiving(recvmsg(2), recvfrom(2)) data over UDP channel, with an incorrect checksum value. An unprivileged user could use this flaw to cause DoS(CVE-2015-5364) to a remote system via specially crafted UDP packets. The CVE-2015-5366 issue is also a DoS, but is limited only to the affected application and not the entire system. Upstream patch: --------------- -> https://git.kernel.org/linus/beb39db59d14990e401e235faf66a6b9b31240b0 Reference: ---------- -> http://seclists.org/oss-sec/2015/q3/10
CVE was assigned in http://seclists.org/oss-sec/2015/q3/10
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1239033]
Statement:
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2015:1623 https://rhn.redhat.com/errata/RHSA-2015-1623.html
Hi guys, Does this problem affect RHEL4? Best regards, Dapeng
This issue has been addressed in the following products: MRG for RHEL-6 v.2 Via RHSA-2015:1787 https://rhn.redhat.com/errata/RHSA-2015-1787.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:1788 https://rhn.redhat.com/errata/RHSA-2015-1788.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 5 Via RHSA-2016:0045 https://rhn.redhat.com/errata/RHSA-2016-0045.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 6.4 Advanced Update Support Via RHSA-2016:1096 https://rhn.redhat.com/errata/RHSA-2016-1096.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 6.6 Extended Update Support Via RHSA-2016:1100 https://rhn.redhat.com/errata/RHSA-2016-1100.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 6.5 Advanced Update Support Via RHSA-2016:1225 https://access.redhat.com/errata/RHSA-2016:1225