CVE-2015-5364

CVSS v2.0 7.8 (High)
78% Progress
EPSS 22.67 % (97th)
22.67% Progress
Affected Products 4
Advisories 31

The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet flood.

Weaknesses
CWE-399
Resource Management Errors
Related CVEs
CVE Status
PUBLISHED
CNA
Debian GNU/Linux
Published Date
2015-08-31 10:59:12
(9 years ago)
Updated Date
2023-02-02 19:17:59
(19 months ago)

Affected Products

Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Linux Kernel prior 3.2.70 version cpe:2.3:o:linux:linux_kernel < 3.2.70
  Linux Kernel from 3.3 version and prior 3.4.109 version cpe:2.3:o:linux:linux_kernel >= 3.3 < 3.4.109
  Linux Kernel from 3.5 version and prior 3.10.81 version cpe:2.3:o:linux:linux_kernel >= 3.5 < 3.10.81
  Linux Kernel from 3.11 version and prior 3.12.44 version cpe:2.3:o:linux:linux_kernel >= 3.11 < 3.12.44
  Linux Kernel from 3.13 version and prior 3.14.45 version cpe:2.3:o:linux:linux_kernel >= 3.13 < 3.14.45
  Linux Kernel from 3.15 version and prior 3.16.35 version cpe:2.3:o:linux:linux_kernel >= 3.15 < 3.16.35
  Linux Kernel from 3.17 version and prior 3.18.17 version cpe:2.3:o:linux:linux_kernel >= 3.17 < 3.18.17
  Linux Kernel from 3.19 version and prior 4.0.6 version cpe:2.3:o:linux:linux_kernel >= 3.19 < 4.0.6

Configuration #2

    CPE23 From Up To
  Redhat Enterprise Linux Server Aus 6.5 cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5

Configuration #3

    CPE23 From Up To
  Debian Linux 7.0 cpe:2.3:o:debian:debian_linux:7.0
  Debian Linux 8.0 cpe:2.3:o:debian:debian_linux:8.0

Configuration #4

    CPE23 From Up To
  Canonical Ubuntu Linux 12.04 cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-
  Canonical Ubuntu Linux 14.04 cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm
  Canonical Ubuntu Linux 15.04 cpe:2.3:o:canonical:ubuntu_linux:15.04
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...