Логотип exploitDog
bind:CVE-2015-8215
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2015-8215

Количество 16

Количество 16

ubuntu логотип

CVE-2015-8215

больше 9 лет назад

net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.

CVSS2: 5
EPSS: Низкий
redhat логотип

CVE-2015-8215

больше 10 лет назад

net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-2015-8215

больше 9 лет назад

net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2015-8215

больше 9 лет назад

net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 d ...

CVSS2: 5
EPSS: Низкий
github логотип

GHSA-2rqg-pj4m-7gvr

около 3 лет назад

net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.

EPSS: Низкий
oracle-oval логотип

ELSA-2016-3566

около 9 лет назад

ELSA-2016-3566: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2016-3565

около 9 лет назад

ELSA-2016-3565: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2016-3567

около 9 лет назад

ELSA-2016-3567: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:2292-1

больше 9 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2016:0354-1

больше 9 лет назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2016-0855

около 9 лет назад

ELSA-2016-0855: kernel security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:2350-1

больше 9 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:2339-1

больше 9 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2016:0585-1

больше 9 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2016:1203-1

около 9 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2016:2074-1

почти 9 лет назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2015-8215

net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.

CVSS2: 5
6%
Низкий
больше 9 лет назад
redhat логотип
CVE-2015-8215

net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.

CVSS2: 5
6%
Низкий
больше 10 лет назад
nvd логотип
CVE-2015-8215

net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.

CVSS2: 5
6%
Низкий
больше 9 лет назад
debian логотип
CVE-2015-8215

net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 d ...

CVSS2: 5
6%
Низкий
больше 9 лет назад
github логотип
GHSA-2rqg-pj4m-7gvr

net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.

6%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2016-3566

ELSA-2016-3566: Unbreakable Enterprise kernel security update (IMPORTANT)

около 9 лет назад
oracle-oval логотип
ELSA-2016-3565

ELSA-2016-3565: Unbreakable Enterprise kernel security update (IMPORTANT)

около 9 лет назад
oracle-oval логотип
ELSA-2016-3567

ELSA-2016-3567: Unbreakable Enterprise kernel security update (IMPORTANT)

около 9 лет назад
suse-cvrf логотип
SUSE-SU-2015:2292-1

Security update for the Linux Kernel

больше 9 лет назад
suse-cvrf логотип
SUSE-SU-2016:0354-1

Security update for the Linux Kernel

больше 9 лет назад
oracle-oval логотип
ELSA-2016-0855

ELSA-2016-0855: kernel security, bug fix, and enhancement update (MODERATE)

около 9 лет назад
suse-cvrf логотип
SUSE-SU-2015:2350-1

Security update for the Linux Kernel

больше 9 лет назад
suse-cvrf логотип
SUSE-SU-2015:2339-1

Security update for the Linux Kernel

больше 9 лет назад
suse-cvrf логотип
SUSE-SU-2016:0585-1

Security update for the Linux Kernel

больше 9 лет назад
suse-cvrf логотип
SUSE-SU-2016:1203-1

Security update for the Linux Kernel

около 9 лет назад
suse-cvrf логотип
SUSE-SU-2016:2074-1

Security update for the Linux Kernel

почти 9 лет назад

Уязвимостей на страницу