Synopsis:          Important: kernel security update
Advisory ID:       SLSA-2016:0045-1
Issue Date:        2016-01-19
CVE Numbers:       CVE-2015-5366
                   CVE-2015-5364
--

* Two flaws were found in the way the Linux kernel's networking
implementation handled UDP packets with incorrect checksum values. A
remote attacker could potentially use these flaws to trigger an infinite
loop in the kernel, resulting in a denial of service on the system, or
cause a denial of service in applications using the edge triggered epoll
functionality. (CVE-2015-5364, CVE-2015-5366, Important)

The system must be rebooted for this update to take effect.
--

SL5
  x86_64
    kernel-2.6.18-408.el5.x86_64.rpm
    kernel-debug-2.6.18-408.el5.x86_64.rpm
    kernel-debug-debuginfo-2.6.18-408.el5.x86_64.rpm
    kernel-debug-devel-2.6.18-408.el5.x86_64.rpm
    kernel-debuginfo-2.6.18-408.el5.x86_64.rpm
    kernel-debuginfo-common-2.6.18-408.el5.x86_64.rpm
    kernel-devel-2.6.18-408.el5.x86_64.rpm
    kernel-headers-2.6.18-408.el5.x86_64.rpm
    kernel-xen-2.6.18-408.el5.x86_64.rpm
    kernel-xen-debuginfo-2.6.18-408.el5.x86_64.rpm
    kernel-xen-devel-2.6.18-408.el5.x86_64.rpm
  i386
    kernel-2.6.18-408.el5.i686.rpm
    kernel-PAE-2.6.18-408.el5.i686.rpm
    kernel-PAE-debuginfo-2.6.18-408.el5.i686.rpm
    kernel-PAE-devel-2.6.18-408.el5.i686.rpm
    kernel-debug-2.6.18-408.el5.i686.rpm
    kernel-debug-debuginfo-2.6.18-408.el5.i686.rpm
    kernel-debug-devel-2.6.18-408.el5.i686.rpm
    kernel-debuginfo-2.6.18-408.el5.i686.rpm
    kernel-debuginfo-common-2.6.18-408.el5.i686.rpm
    kernel-devel-2.6.18-408.el5.i686.rpm
    kernel-headers-2.6.18-408.el5.i386.rpm
    kernel-xen-2.6.18-408.el5.i686.rpm
    kernel-xen-debuginfo-2.6.18-408.el5.i686.rpm
    kernel-xen-devel-2.6.18-408.el5.i686.rpm
  noarch
    kernel-doc-2.6.18-408.el5.noarch.rpm

- Scientific Linux Development Team