Description
A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3237-1 | linux security update |
EUVD |
EUVD-2015-3378 | A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds. |
Ubuntu USN |
USN-2615-1 | Linux kernel (Utopic HWE) vulnerabilities |
Ubuntu USN |
USN-2616-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2619-1 | Linux kernel (Trusty HWE) vulnerability |
Ubuntu USN |
USN-2620-1 | Linux kernel vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T05:47:57.725Z
Reserved: 2015-04-17T00:00:00.000Z
Link: CVE-2015-3332
No data.
Status : Modified
Published: 2015-05-27T10:59:08.860
Modified: 2026-05-06T22:30:45.220
Link: CVE-2015-3332
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN