Unrated severityNVD Advisory· Published Apr 5, 2015· Updated May 6, 2026
CVE-2015-1465
CVE-2015-1465
Description
The IPv4 implementation in the Linux kernel before 3.18.8 does not properly consider the length of the Read-Copy Update (RCU) grace period for redirecting lookups in the absence of caching, which allows remote attackers to cause a denial of service (memory consumption or system crash) via a flood of packets.
Affected products
23cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*+ 2 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
- osv-coords19 versionspkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2012pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/kgraft-patch-SLE12_Update_1&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12_Update_2&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12_Update_5&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012
< 3.12.43-52.6.1+ 18 more
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.2
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.2
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3-2.1
- (no CPE)range: < 3-2.1
- (no CPE)range: < 1-2.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
14- lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.htmlnvdMailing ListThird Party Advisory
- www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.8nvdVendor Advisory
- www.openwall.com/lists/oss-security/2015/02/03/13nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/72435nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1036763nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-2545-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2546-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2562-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2563-1nvdThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingThird Party Advisory
- github.com/torvalds/linux/commit/df4d92549f23e1c037e83323aff58a21b3de7fe0nvdThird Party Advisory
- git.kernel.orgnvd
News mentions
0No linked articles in our index yet.