Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-3332

Опубликовано: 27 мая 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.9

Описание

A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds.

РелизСтатусПримечание
devel

not-affected

4.2.0-16.19
esm-infra-legacy/trusty

released

3.13.0-53.89
lucid

not-affected

precise

not-affected

3.2.0-85.122
trusty

released

3.13.0-53.89
trusty/esm

released

3.13.0-53.89
upstream

released

3.19~rc1
utopic

released

3.16.0-38.52
vivid

not-affected

3.19.0-7.7
vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.19~rc1
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

not-affected

3.2.0-1651.71
trusty

DNE

trusty/esm

DNE

upstream

released

3.19~rc1
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

not-affected

precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.19~rc1
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
lucid

DNE

precise

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

released

3.19~rc1
utopic

not-affected

vivid

not-affected

vivid/stable-phone-overlay

not-affected

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.19~rc1
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
lucid

DNE

precise

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

released

3.19~rc1
utopic

not-affected

vivid

not-affected

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
lucid

DNE

precise

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

released

3.19~rc1
utopic

ignored

end of life
vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

ignored

end of life
trusty

DNE

trusty/esm

DNE

upstream

released

3.19~rc1
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

ignored

end of life
trusty

DNE

trusty/esm

DNE

upstream

released

3.19~rc1
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

ignored

end of life
trusty

DNE

trusty/esm

DNE

upstream

released

3.19~rc1
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

not-affected

trusty

DNE

trusty/esm

DNE

upstream

released

3.19~rc1
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

not-affected

trusty

DNE

trusty/esm

DNE

upstream

released

3.19~rc1
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

not-affected

trusty

DNE

trusty/esm

DNE

upstream

released

3.19~rc1
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

released

3.13.0-53.89~precise1
trusty

DNE

trusty/esm

DNE

upstream

released

3.19~rc1
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [3.16.0-38.52~14.04.1]]
lucid

DNE

precise

DNE

trusty

released

3.16.0-38.52~14.04.1
trusty/esm

DNE

trusty was released [3.16.0-38.52~14.04.1]
upstream

released

3.19~rc1
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.19.0-18.18~14.04.1]]
lucid

DNE

precise

DNE

trusty

not-affected

3.19.0-18.18~14.04.1
trusty/esm

DNE

trusty was not-affected [3.19.0-18.18~14.04.1]
upstream

released

3.19~rc1
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
lucid

DNE

precise

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

released

3.19~rc1
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
lucid

DNE

precise

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

released

3.19~rc1
utopic

not-affected

vivid

not-affected

vivid/stable-phone-overlay

not-affected

Показывать по

РелизСтатусПримечание
devel

not-affected

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
lucid

DNE

precise

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

released

3.19~rc1
utopic

not-affected

vivid

not-affected

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.19~rc1
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

ignored

end of life
trusty

DNE

trusty/esm

DNE

upstream

released

3.19~rc1
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

4.2.0-1014.21
esm-infra-legacy/trusty

DNE

precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.19~rc1
vivid

DNE

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

released

4.2.0-1014.21
wily

not-affected

4.2.0-1008.12

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

not-affected

3.2.0-1465.85
trusty

DNE

trusty/esm

DNE

upstream

released

3.19~rc1
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

EPSS

Процентиль: 31%
0.00119
Низкий

4.9 Medium

CVSS2

Связанные уязвимости

redhat
почти 11 лет назад

A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds.

nvd
больше 10 лет назад

A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds.

debian
больше 10 лет назад

A certain backport in the TCP Fast Open implementation for the Linux k ...

github
больше 3 лет назад

A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds.

suse-cvrf
больше 10 лет назад

Security update for the Linux Kernel

EPSS

Процентиль: 31%
0.00119
Низкий

4.9 Medium

CVSS2

Уязвимость CVE-2015-3332