CVE-2015-3332
Summary
| CVE | CVE-2015-3332 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2015-05-27 10:59:00 UTC |
| Updated | 2016-04-11 18:54:00 UTC |
| Description | A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Bug 1213951 – CVE-2015-3332 kernel: TCP Fast Open local DoS |
CONFIRM |
bugzilla.redhat.com |
|
| Debian -- Security Information -- DSA-3237-1 linux |
DEBIAN |
www.debian.org |
|
| article.gmane.org | 522: Connection timed out |
MLIST |
article.gmane.org |
|
| oss-security - TCP Fast Open local DoS in some Linux stable branches |
MLIST |
www.openwall.com |
|
| #782515 - [regression] BUG in process context when using TCP Fast Open (CVE-2015-2015-3332) - Debian Bug report logs |
CONFIRM |
bugs.debian.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 671064 EulerOS Security Update for kernel (EulerOS-SA-2019-2599)