Vigil@nce - Linux kernel: denial of service via UDP
July 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can flood a Linux host with UDP packet with wrong
checksum, in order to trigger a denial of service.
Impacted products: Linux, SUSE Linux Enterprise Desktop, SLES
Severity: 1/4
Creation date: 01/07/2015
DESCRIPTION OF THE VULNERABILITY
UDP packets carry a checksum to check whether the packet has been
corrupted in transit.
However, the check occurs quite late in the packet processing
process. So, when the incoming packet rate is hight, the kernel
spends too much time handling packet queue and other internal data
structures, which prevent resuming the user processes.
An attacker can therefore flood a Linux host with UDP packet with
wrong checksum, in order to trigger a denial of service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Linux-kernel-denial-of-service-via-UDP-17284