CVE-2015-3332

A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds.
Configurations

Configuration 1 (hide)

cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:29

Type Values Removed Values Added
References () http://article.gmane.org/gmane.linux.network/359588 - () http://article.gmane.org/gmane.linux.network/359588 -
References () http://www.debian.org/security/2015/dsa-3237 - () http://www.debian.org/security/2015/dsa-3237 -
References () http://www.openwall.com/lists/oss-security/2015/04/14/14 - () http://www.openwall.com/lists/oss-security/2015/04/14/14 -
References () https://bugs.debian.org/782515 - () https://bugs.debian.org/782515 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1213951 - () https://bugzilla.redhat.com/show_bug.cgi?id=1213951 -

Information

Published : 2015-05-27 10:59

Updated : 2024-11-21 02:29


NVD link : CVE-2015-3332

Mitre link : CVE-2015-3332

CVE.ORG link : CVE-2015-3332


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-399

Resource Management Errors