The IPv4 implementation in the Linux kernel before 3.18.8 does not properly consider the length of the Read-Copy Update (RCU) grace period for redirecting lookups in the absence of caching, which allows remote attackers to cause a denial of service (memory consumption or system crash) via a flood of packets.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2015-1465 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue does not affect the Linux kernels as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2.
NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.
Base Score | 7.1 |
---|---|
Base Metrics | AV:N/AC:M/Au:N/C:N/I:N/A:C |
Access Vector | Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Complete |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Package | State |
---|---|---|
Red Hat Enterprise MRG 2 | kernel | Not affected |
Red Hat Enterprise Linux Extended Update Support 7.0 | kernel | Not affected |
Red Hat Enterprise Linux 7 | kernel | Affected |
Red Hat Enterprise Linux 7 | kernel-rt | Affected |
Red Hat Enterprise Linux 6 | kernel | Not affected |
Red Hat Enterprise Linux 5 | kernel | Not affected |
Red Hat Enterprise Linux 4 | kernel | Not affected |