CVE-2015-0272
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/11/2015
Last modified:
12/04/2025
Description
GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:gnome:networkmanager:*:*:*:*:*:*:*:* | 1.2.0 (excluding) | |
| cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:* | ||
| cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:* | ||
| cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp4:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=d5fc88e573fa58b93034b04d35a2454f5d28cad9
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/76814
- http://www.ubuntu.com/usn/USN-2792-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1192132
- http://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=d5fc88e573fa58b93034b04d35a2454f5d28cad9
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/76814
- http://www.ubuntu.com/usn/USN-2792-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1192132



