A flaw was found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use this flaw to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality.
Find out more about CVE-2015-5364 from the MITRE CVE dictionary dictionary and NIST NVD.
Base Score | 7.1 |
---|---|
Base Metrics | AV:N/AC:M/Au:N/C:N/I:N/A:C |
Access Vector | Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Complete |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 5 (kernel) | RHSA-2016:0045 | 2016-01-19 |
Red Hat Enterprise Linux 6 (kernel) | RHSA-2015:1623 | 2015-08-13 |
Red Hat Enterprise Linux 7 (kernel) | RHSA-2015:1778 | 2015-09-15 |
Red Hat MRG Grid for RHEL 6 Server v.2 (kernel-rt) | RHSA-2015:1787 | 2015-09-15 |
Red Hat Enterprise Linux Extended Update Support 6.6 (kernel) | RHSA-2016:1100 | 2016-05-24 |
Red Hat Enterprise Linux Advanced Update Support 6.4 (kernel) | RHSA-2016:1096 | 2016-05-23 |
Red Hat Enterprise Linux for Real Time for NFV (v. 7) (kernel-rt) | RHSA-2015:1788 | 2015-09-15 |
Red Hat Enterprise Linux Advanced Update Support 6.5 (kernel) | RHSA-2016:1225 | 2016-06-14 |