Описание
The socket implementation in net/core/sock.c in the Linux kernel before 2.6.34 does not properly manage a backlog of received packets, which allows remote attackers to cause a denial of service (memory consumption) by sending a large amount of network traffic, as demonstrated by netperf UDP tests.
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | not-affected | 2.6.39-0.0 |
hardy | ignored | end of life, was deferred |
lucid | released | 2.6.32-34.73 |
maverick | not-affected | 2.6.35-1.1 |
natty | not-affected | 2.6.37-2.9 |
oneiric | not-affected | 2.6.39-0.0 |
precise | not-affected | 3.1.0-1.1 |
quantal | not-affected | 2.6.39-0.0 |
raring | not-affected | 2.6.39-0.0 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
hardy | DNE | |
lucid | DNE | |
natty | DNE | |
oneiric | DNE | |
precise | not-affected | 3.2.0-1600.1 |
quantal | not-affected | 3.2.0-1602.5 |
raring | DNE | |
upstream | released | 2.6.34~rc2 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | DNE | |
hardy | DNE | |
lucid | released | 2.6.32-318.37 |
maverick | ignored | end of life |
natty | DNE | |
oneiric | DNE | |
precise | DNE | |
quantal | DNE | |
raring | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | DNE | |
hardy | DNE | |
lucid | released | 2.6.31-610.27 |
maverick | DNE | |
natty | DNE | |
oneiric | DNE | |
precise | DNE | |
quantal | DNE | |
raring | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | DNE | |
hardy | DNE | |
lucid | not-affected | 2.6.35-1.1~lucid1 |
maverick | DNE | |
natty | DNE | |
oneiric | DNE | |
precise | DNE | |
quantal | DNE | |
raring | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
hardy | DNE | |
lucid | not-affected | 2.6.38-1.27~lucid1 |
maverick | DNE | |
natty | DNE | |
oneiric | DNE | |
precise | DNE | |
quantal | DNE | |
raring | DNE | |
upstream | released | 2.6.34~rc2 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
hardy | DNE | |
lucid | not-affected | |
maverick | DNE | |
natty | DNE | |
oneiric | DNE | |
precise | DNE | |
quantal | DNE | |
raring | DNE | |
upstream | released | 2.6.34~rc2 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
hardy | DNE | |
lucid | DNE | |
oneiric | DNE | |
precise | not-affected | |
quantal | DNE | |
raring | DNE | |
upstream | released | 2.6.34~rc2 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
hardy | DNE | |
lucid | DNE | |
oneiric | DNE | |
precise | not-affected | |
quantal | DNE | |
raring | DNE | |
upstream | released | 2.6.34~rc2 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | DNE | |
hardy | DNE | |
lucid | released | 2.6.32-218.35 |
maverick | released | 2.6.32-418.35 |
natty | DNE | |
oneiric | DNE | |
precise | DNE | |
quantal | DNE | |
raring | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | ignored | end of life |
devel | DNE | |
hardy | DNE | |
lucid | DNE | |
maverick | DNE | |
natty | DNE | |
oneiric | DNE | |
precise | DNE | |
quantal | DNE | |
raring | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | not-affected | 2.6.38-1309.13 |
hardy | DNE | |
lucid | DNE | |
maverick | not-affected | 2.6.35-903.8 |
natty | not-affected | 2.6.38-1201.2 |
oneiric | not-affected | 2.6.38-1309.13 |
precise | not-affected | 3.0.0-1401.2 |
quantal | not-affected | 2.6.38-1309.13 |
raring | not-affected | 2.6.38-1309.13 |
Показывать по
EPSS
7.8 High
CVSS2
7.5 High
CVSS3
Связанные уязвимости
The socket implementation in net/core/sock.c in the Linux kernel before 2.6.34 does not properly manage a backlog of received packets, which allows remote attackers to cause a denial of service (memory consumption) by sending a large amount of network traffic, as demonstrated by netperf UDP tests.
The socket implementation in net/core/sock.c in the Linux kernel before 2.6.34 does not properly manage a backlog of received packets, which allows remote attackers to cause a denial of service (memory consumption) by sending a large amount of network traffic, as demonstrated by netperf UDP tests.
The socket implementation in net/core/sock.c in the Linux kernel befor ...
The socket implementation in net/core/sock.c in the Linux kernel before 2.6.34 does not properly manage a backlog of received packets, which allows remote attackers to cause a denial of service (memory consumption) by sending a large amount of network traffic, as demonstrated by netperf UDP tests.
ELSA-2011-0303: kernel security and bug fix update (MODERATE)
EPSS
7.8 High
CVSS2
7.5 High
CVSS3