CVE-2014-7250

NameCVE-2014-7250
DescriptionThe TCP stack in 4.3BSD Net/2, as used in FreeBSD 5.4, NetBSD possibly 2.0, and OpenBSD possibly 3.6, does not properly implement the session timer, which allows remote attackers to cause a denial of service (resource consumption) via crafted packets.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs778367

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
kfreebsd-10 (PTS)jessie10.1~svn274115-4vulnerable
stretch10.3~svn300087-3undetermined
buster10.3~svn300087-5vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kfreebsd-10sourcejessie(unfixed)end-of-life
kfreebsd-10sourcebuster(unfixed)end-of-life
kfreebsd-10source(unstable)undetermined778367
kfreebsd-8sourcewheezy(unfixed)end-of-life
kfreebsd-8source(unstable)undetermined
kfreebsd-9sourcewheezy(unfixed)end-of-life
kfreebsd-9source(unstable)undetermined

Notes

[wheezy] - kfreebsd-8 <end-of-life> (Not supported in wheezy LTS)
[wheezy] - kfreebsd-9 <end-of-life> (Not supported in wheezy LTS)
[buster] - kfreebsd-10 <end-of-life> (Not supported in buster LTS)
[jessie] - kfreebsd-10 <end-of-life> (Not supported in Jessie LTS)

Search for package or bug name: Reporting problems