First published: Sun Jun 07 2015(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=3.4<3.4.109 | |
Linux Kernel | >=3.5<3.10.81 | |
Linux Kernel | >=3.11<3.12.45 | |
Linux Kernel | >=3.13<3.14.45 | |
Linux Kernel | >=3.15<3.16.35 | |
Linux Kernel | >=3.17<3.18.18 | |
Linux Kernel | >=3.19<4.0.6 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.133-1 6.12.21-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4003 has a severity rating that indicates it can lead to denial of service through a divide-by-zero error and system crash.
To fix CVE-2015-4003, update to the patched versions of the Linux kernel, specifically 5.10.223-1, 5.10.226-1, or 6.1.119-1 and later.
CVE-2015-4003 affects the Linux kernel versions from 3.4 through 4.0.5.
The impact of CVE-2015-4003 is severe as it allows remote attackers to crash the system through specially crafted packets.
To mitigate the risks associated with CVE-2015-4003, immediately update your Linux kernel to a version that is not affected.