Difference between revisions of "Download/kernel/rhel5-testing/028stab120.1/changes"
< Download | kernel | rhel5-testing | 028stab120.1
(Created page with "== Changes == Since {{kernel link|rhel5-testing|028stab119.6}}: * A flaw was found in the way the Linux kernel's networking implementation handled UDP packets with incorrect...") |
(→Changes) |
||
Line 3: | Line 3: | ||
Since {{kernel link|rhel5-testing|028stab119.6}}: | Since {{kernel link|rhel5-testing|028stab119.6}}: | ||
− | * A flaw was found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use this flaw to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality | + | * Rebase to RHEL5 kernel 2.6.32-408.el5 |
+ | * A flaw was found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use this flaw to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality (CVE-2015-5364, CVE-2015-5366) | ||
=== See also === | === See also === |
Latest revision as of 08:26, 25 January 2016
Changes[edit]
Since 028stab119.6:
- Rebase to RHEL5 kernel 2.6.32-408.el5
- A flaw was found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use this flaw to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality (CVE-2015-5364, CVE-2015-5366)