fkie_cve-2012-4444
Vulnerability from fkie_nvd
Published
2012-12-21 11:47
Modified
2024-11-21 01:42
Severity ?
Summary
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:rc8:*:*:*:*:*:*", "matchCriteriaId": "CE582DCD-BC73-4540-87C8-71E2C3926305", "versionEndIncluding": "2.6.36", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:*:*:*:*:*:*:*", "matchCriteriaId": "10E55450-F6D9-483C-9CC8-E651E5A12AB1", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc1:*:*:*:*:*:*", "matchCriteriaId": "45273823-29EA-44DE-8444-3933402C5793", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc2:*:*:*:*:*:*", "matchCriteriaId": "88F60E74-09DB-4D4A-B922-4A46EED0EC20", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*", "matchCriteriaId": "E242D3DE-D1DC-406A-BCC3-C4380B7EC369", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc4:*:*:*:*:*:*", "matchCriteriaId": "5EE58B00-70BB-493D-ACDE-77F486984392", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc4:x86_32:*:*:*:*:*", "matchCriteriaId": "06EFB3F7-2EAE-4A56-A9A1-E8C734E6B91E", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc5:*:*:*:*:*:*", "matchCriteriaId": "8598D6E5-0C5C-4A31-841A-C12801DB7D91", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc6:*:*:*:*:*:*", "matchCriteriaId": "59800B0A-477B-42F8-A58A-5144F455AE01", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc7:*:*:*:*:*:*", "matchCriteriaId": "65210718-2AF2-47E5-A1A7-CE72B926F9F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc8:*:*:*:*:*:*", "matchCriteriaId": "724E1180-5A91-4503-8723-C59528794884", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.1:*:*:*:*:*:*:*", "matchCriteriaId": "99AC6D46-A0BF-4F1D-88BB-03BF74FDB84F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.2:*:*:*:*:*:*:*", "matchCriteriaId": "CC40B6DE-09D9-422B-965B-7EB9F6661DEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.3:*:*:*:*:*:*:*", "matchCriteriaId": "FEFB6E91-34CD-4FC5-A8E1-8F5760A9B4C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.4:*:*:*:*:*:*:*", "matchCriteriaId": "91170B40-4D25-4E40-8F0B-DBC1AE217F99", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.5:*:*:*:*:*:*:*", "matchCriteriaId": "9E28B8B9-B832-4D77-BE1A-BB5D8A678678", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.6:*:*:*:*:*:*:*", "matchCriteriaId": "56DF61F4-5DA1-4D79-B6C0-0E4DB825FB3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.7:*:*:*:*:*:*:*", "matchCriteriaId": "468745AA-0BE5-4B22-91FA-2FD350BD2F64", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.8:*:*:*:*:*:*:*", "matchCriteriaId": "FF208118-3534-47E5-9943-83EF165F1249", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.9:*:*:*:*:*:*:*", "matchCriteriaId": "427E3009-A2F2-4ED2-8D1A-14938F639D2A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.10:*:*:*:*:*:*:*", "matchCriteriaId": "DD3663BD-4EF5-496C-A573-2639C9E72214", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:*:*:*:*:*:*:*", "matchCriteriaId": "C4033E0B-A3A1-4CC5-956A-AAA0FB905DDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc1:*:*:*:*:*:*", "matchCriteriaId": "29C4A364-ED36-4AC8-AD1E-8BD18DD9324D", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc2:*:*:*:*:*:*", "matchCriteriaId": "4049867A-E3B2-4DC1-8966-0477E6A5D582", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc3:*:*:*:*:*:*", "matchCriteriaId": "A2507858-675B-4DA2-A49E-00DB54700CF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc4:*:*:*:*:*:*", "matchCriteriaId": "0A25EA55-3F1C-440C-A383-0BB9556C9508", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc5:*:*:*:*:*:*", "matchCriteriaId": "B2665356-4EF5-4543-AD15-67FDB851DCCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc6:*:*:*:*:*:*", "matchCriteriaId": "26E7609B-B058-496D-ACDD-7F69FBDE89E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc7:*:*:*:*:*:*", "matchCriteriaId": "210BF049-8B3C-4ACC-BF8E-2C3551477602", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc8:*:*:*:*:*:*", "matchCriteriaId": "1837F32C-80D3-4E10-AE5D-E9F5A11A434E", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc9:*:*:*:*:*:*", "matchCriteriaId": "4B4E132B-A69A-4CD1-B4D9-E17C4361A3AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31-rc2:*:*:*:*:*:*:*", "matchCriteriaId": "3C86BC69-06B6-45C7-9821-45D42D44B240", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31-rc3:*:*:*:*:*:*:*", "matchCriteriaId": "EA0353B9-907F-4B89-9104-2F4434159F0F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31-rc4:*:*:*:*:*:*:*", "matchCriteriaId": "7D1FF505-4135-4005-BD1A-3AC913FEE20A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31-rc5:*:*:*:*:*:*:*", "matchCriteriaId": "5D31D04B-1E65-4FD6-AEED-3F365C65FCDE", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31-rc6:*:*:*:*:*:*:*", "matchCriteriaId": "24CFD647-3926-462F-B264-56E136B74F81", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31-rc7:*:*:*:*:*:*:*", "matchCriteriaId": "BE71B9D7-B52E-426A-831D-ADEDC38318E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31-rc8:*:*:*:*:*:*:*", "matchCriteriaId": "C6FFA2CD-0EC9-4FBB-93DC-80736622CFCA", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31-rc9:*:*:*:*:*:*:*", "matchCriteriaId": "B64401A9-58F5-4CB6-B0E2-A3A2B92659EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31-rc10:*:*:*:*:*:*:*", "matchCriteriaId": "89137307-D97D-4D8B-9291-21DE1E6C56D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC3151BF-4BEE-4415-ABA2-E6D40673E591", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.2:*:*:*:*:*:*:*", "matchCriteriaId": "1037E899-6DB3-423D-9AD0-FE79A67E9681", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.3:*:*:*:*:*:*:*", "matchCriteriaId": "E4DD2F05-F990-417A-BD6D-CD9A7EB2BD55", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.4:*:*:*:*:*:*:*", "matchCriteriaId": "0634D7FE-7685-4669-8EF9-54E99683D28E", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.5:*:*:*:*:*:*:*", "matchCriteriaId": "9EEEB962-0E8D-402B-989E-96875453C609", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.6:*:*:*:*:*:*:*", "matchCriteriaId": "0042D9C4-7081-4DC2-A5B5-2649374B44F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.7:*:*:*:*:*:*:*", "matchCriteriaId": "9CD18FA2-677A-4934-88E6-0BB78D789875", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.8:*:*:*:*:*:*:*", "matchCriteriaId": "24EF19A2-A1CC-4410-8704-EF4041428383", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.9:*:*:*:*:*:*:*", "matchCriteriaId": "C9502A7E-2BFF-43A7-BF6B-ADC023BD9331", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.10:*:*:*:*:*:*:*", "matchCriteriaId": "6DC9A36E-1779-49DE-83CE-B8479CA018FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.11:*:*:*:*:*:*:*", "matchCriteriaId": "60B18050-4720-4ACB-AEE2-DEB4BFCA7B6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.12:*:*:*:*:*:*:*", "matchCriteriaId": "9704C4B5-28F1-4F62-A389-8A9917E8E99D", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.13:*:*:*:*:*:*:*", "matchCriteriaId": "6574F543-0B91-49A6-81FA-8142007BCD54", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.14:*:*:*:*:*:*:*", "matchCriteriaId": "4CD7F9D0-3AE3-4687-B1C9-36AD04D96F52", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*", "matchCriteriaId": "46568A0D-F374-4DAB-9B64-FCC74A9AA07B", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc1:*:*:*:*:*:*", "matchCriteriaId": "C85D4E0A-14DA-4884-AF6F-A0F54304430F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc3:*:*:*:*:*:*", "matchCriteriaId": "218DE1D1-3843-4076-9AE4-70AA0FD99B3E", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc4:*:*:*:*:*:*", "matchCriteriaId": "2677114B-AF05-42EB-BBC8-FA85CD631C21", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc5:*:*:*:*:*:*", "matchCriteriaId": "FA8D64E1-A700-4D9E-9063-EC3CFC1A6D98", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc6:*:*:*:*:*:*", "matchCriteriaId": "1B6C0A59-556F-4579-9AD2-4ABAE01FE2CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc7:*:*:*:*:*:*", "matchCriteriaId": "DBE3083A-0FA6-4854-8F65-05E8364B3A9B", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc8:*:*:*:*:*:*", "matchCriteriaId": "57F8D95D-DC49-46B3-A460-2352D7E540EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.1:*:*:*:*:*:*:*", "matchCriteriaId": "084A2575-E5A6-43BD-8CE5-1EF628AA9ACB", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.2:*:*:*:*:*:*:*", "matchCriteriaId": "041CE8AF-711C-496D-BDF2-B4AB655C0C8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.3:*:*:*:*:*:*:*", "matchCriteriaId": "FE192302-F569-4301-83F2-AEE020FB77B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.4:*:*:*:*:*:*:*", "matchCriteriaId": "2597A691-01B8-4FD2-AF71-D4BCC15C6F10", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.5:*:*:*:*:*:*:*", "matchCriteriaId": "533A03F0-D7C4-42EF-BAD7-2B5A9A9D68EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.6:*:*:*:*:*:*:*", "matchCriteriaId": "EDBA84AD-CB87-418B-BBF7-8E910FB8FD5D", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.7:*:*:*:*:*:*:*", "matchCriteriaId": "A0FA9FA7-3BE3-415B-AA06-A2401B2AD8DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.8:*:*:*:*:*:*:*", "matchCriteriaId": "A93EFB49-0195-4471-9445-DA944CD55459", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.9:*:*:*:*:*:*:*", "matchCriteriaId": "075C2C0A-E5E7-412C-9B28-3E3363A2DF05", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.10:*:*:*:*:*:*:*", "matchCriteriaId": "534281D8-EAEB-4E78-8835-E6BA318BE866", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.11:*:*:*:*:*:*:*", "matchCriteriaId": "192A8675-4413-4ADD-BF9E-DFD757C76387", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.12:*:*:*:*:*:*:*", "matchCriteriaId": "1E15D428-B54A-499D-8677-63C73A2C2934", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.13:*:*:*:*:*:*:*", "matchCriteriaId": "8804EC33-1751-4493-98D7-B85F326ABAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.14:*:*:*:*:*:*:*", "matchCriteriaId": "BC94715E-208F-421E-8FCA-81E86175C983", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.15:*:*:*:*:*:*:*", "matchCriteriaId": "982071FC-873D-4C38-817B-F5853699135D", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.16:*:*:*:*:*:*:*", "matchCriteriaId": "6B721839-AB4C-4DE7-834F-E790DE770066", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.17:*:*:*:*:*:*:*", "matchCriteriaId": "75965543-51D3-4809-8815-EA80BAC85C98", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.18:*:*:*:*:*:*:*", "matchCriteriaId": "4CEC8F08-EE90-41CA-A30F-D34290168571", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.19:*:*:*:*:*:*:*", "matchCriteriaId": "3A23998B-F0EE-4143-A206-AFD47EC8BD2D", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.20:*:*:*:*:*:*:*", "matchCriteriaId": "EAB711D9-B2DE-4C8F-A03C-EFF57664416C", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.21:*:*:*:*:*:*:*", "matchCriteriaId": "5A2B2D5E-FDBC-4BCE-9925-1F6D5256C237", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.22:*:*:*:*:*:*:*", "matchCriteriaId": "5BC0D45F-8619-4EB7-B074-90CD70A4BE6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.23:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7996C-04D2-4B0B-A1AE-E4430DE9BB80", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.24:*:*:*:*:*:*:*", "matchCriteriaId": "FD8BC35B-8304-4B11-BD48-A8633B1D97AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.25:*:*:*:*:*:*:*", "matchCriteriaId": "44A8D565-A7EC-47CD-A72E-FBFDC6254718", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.26:*:*:*:*:*:*:*", "matchCriteriaId": "0521A4B9-8A42-41B8-AD31-BCEB90D1E58B", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.27:*:*:*:*:*:*:*", "matchCriteriaId": "9428FC60-D446-46C0-9305-127BCCF11E4D", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.28:*:*:*:*:*:*:*", "matchCriteriaId": "7D2C6313-534F-4AAE-8DE7-B15410EFAC33", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.29:*:*:*:*:*:*:*", "matchCriteriaId": "38FCB9CD-1D91-4355-B00C-48F5270CB0D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.30:*:*:*:*:*:*:*", "matchCriteriaId": "66265F3F-55D1-4F73-817A-9752E13D8B4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.31:*:*:*:*:*:*:*", "matchCriteriaId": "3D6F4940-F31E-4D1F-989E-C4FB9CA756BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.32:*:*:*:*:*:*:*", "matchCriteriaId": "CEDE0109-B00A-409A-A403-975A7657367F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.33:*:*:*:*:*:*:*", "matchCriteriaId": "EB665B30-A013-4724-B21B-1F9696CBF861", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.34:*:*:*:*:*:*:*", "matchCriteriaId": "C7EA2632-BAA2-48BA-8DEA-AF4460D8794F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.35:*:*:*:*:*:*:*", "matchCriteriaId": "8694695B-5D4D-4136-83F4-E29F0E410613", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.36:*:*:*:*:*:*:*", "matchCriteriaId": "7C62F815-BDC3-4D56-96AA-3BCDD2F88E1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.37:*:*:*:*:*:*:*", "matchCriteriaId": "CE306F97-0BC4-472A-AF34-70F652CDA615", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.38:*:*:*:*:*:*:*", "matchCriteriaId": "D273697C-EDFD-4D0F-96C7-4EF583EB0D7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.39:*:*:*:*:*:*:*", "matchCriteriaId": "3D96D53C-21FF-4BC2-B414-A0610B2C895B", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.40:*:*:*:*:*:*:*", "matchCriteriaId": "0FAF66F2-4740-4B85-885A-C1B61AD463AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.41:*:*:*:*:*:*:*", "matchCriteriaId": "A5442BAC-D654-400F-9B1C-81C36B3425E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.42:*:*:*:*:*:*:*", "matchCriteriaId": "48FB9998-A3B3-4164-B3C7-5E2D667B9B84", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.43:*:*:*:*:*:*:*", "matchCriteriaId": "EA595B7C-AC9E-4A27-A96C-9C6398626C8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.44:*:*:*:*:*:*:*", "matchCriteriaId": "12DC0713-8F83-4FF4-A1E4-D4BD3273A4A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.45:*:*:*:*:*:*:*", "matchCriteriaId": "25FDE762-B5E7-43AA-8889-43FF057ECCB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.46:*:*:*:*:*:*:*", "matchCriteriaId": "1AFC49DE-B882-4E6D-914F-AF3A4B1DED65", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.47:*:*:*:*:*:*:*", "matchCriteriaId": "BEAD1D24-AE22-40CE-97C5-530650802779", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.48:*:*:*:*:*:*:*", "matchCriteriaId": "E7267C1F-7545-47D9-A734-D1503B836182", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.49:*:*:*:*:*:*:*", "matchCriteriaId": "26A662EA-3FA9-48DD-86E6-C143CC217301", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.50:*:*:*:*:*:*:*", "matchCriteriaId": "2D341758-5A25-4ED0-AC0C-7818C10B9C09", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.51:*:*:*:*:*:*:*", "matchCriteriaId": "4E94429E-BB47-4394-AEC7-78A8DB15C14C", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.52:*:*:*:*:*:*:*", "matchCriteriaId": "24710583-8DBA-49B3-A98E-2AE654AE08F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.53:*:*:*:*:*:*:*", "matchCriteriaId": "52BBD72A-ACD0-4809-A7A8-CC934F62562B", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.54:*:*:*:*:*:*:*", "matchCriteriaId": "F5CF66D2-F8CB-4452-9B5C-9013BC7EEAB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.55:*:*:*:*:*:*:*", "matchCriteriaId": "C873C76C-5EC2-4CEC-B10C-839CB4B13659", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.56:*:*:*:*:*:*:*", "matchCriteriaId": "CAC9316C-5E97-4F23-859F-6627FD6CC385", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.57:*:*:*:*:*:*:*", "matchCriteriaId": "B646D34E-0FF9-4EEA-A543-E1ABD1044A23", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.58:*:*:*:*:*:*:*", "matchCriteriaId": "80AAAE5D-0726-49E2-AF99-042DD960C3A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:*:*:*:*:*:*:*", "matchCriteriaId": "D81C2911-5781-46A4-AD27-F946BD44EAEC", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc1:*:*:*:*:*:*", "matchCriteriaId": "2DB53511-E1B0-4F81-BE9E-B52E84E9C30E", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc2:*:*:*:*:*:*", "matchCriteriaId": "207306A0-19F5-4E49-945C-A5E4DD442459", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc3:*:*:*:*:*:*", "matchCriteriaId": "1DE43C00-5967-44A1-ACEB-B7AF66EEBB53", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc4:*:*:*:*:*:*", "matchCriteriaId": "B33B5E4B-FCB3-4343-B992-F0ADB853754B", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc5:*:*:*:*:*:*", "matchCriteriaId": "D7295BBE-A9E3-44F6-9DD6-0FD6C2591E11", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc6:*:*:*:*:*:*", "matchCriteriaId": "B220EA3F-55B3-4B6E-8285-B28ADEF50138", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc7:*:*:*:*:*:*", "matchCriteriaId": "C61AB348-ACF4-4F88-AC9D-BEC63B76399C", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc8:*:*:*:*:*:*", "matchCriteriaId": "C3AFD58E-A261-4398-BA11-B62A091261F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.1:*:*:*:*:*:*:*", "matchCriteriaId": "17721A7D-E955-407B-AACB-97F859CE79C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.2:*:*:*:*:*:*:*", "matchCriteriaId": "7B04F515-29A7-4D6A-AFC5-3A115F8A5918", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.3:*:*:*:*:*:*:*", "matchCriteriaId": "7514928F-8992-4B8A-8AF4-E89F1CB6EFCE", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.4:*:*:*:*:*:*:*", "matchCriteriaId": "BD6324B7-1329-4C6B-8DDB-D489250E07C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.5:*:*:*:*:*:*:*", "matchCriteriaId": "A7910FE5-E02C-4B20-9F27-F488E76BDE93", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.6:*:*:*:*:*:*:*", "matchCriteriaId": "96F85BC2-54C4-4450-B3BA-A2A8EB78A81C", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.7:*:*:*:*:*:*:*", "matchCriteriaId": "25E5B510-1096-42E8-8BD1-E9198D588050", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.8:*:*:*:*:*:*:*", "matchCriteriaId": "29787617-FFDD-4BDE-97EB-330675B99614", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.9:*:*:*:*:*:*:*", "matchCriteriaId": "7B28D3CE-E432-4F10-BF25-D03B0D89388A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.10:*:*:*:*:*:*:*", "matchCriteriaId": "E587FF24-AA5D-454B-8928-9C3CE03C419C", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.11:*:*:*:*:*:*:*", "matchCriteriaId": "9DDBAAA5-240F-4DE5-BAA1-89508BD2CD8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.12:*:*:*:*:*:*:*", "matchCriteriaId": "F5D61706-2974-4C96-8196-9F3F56F1791F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.13:*:*:*:*:*:*:*", "matchCriteriaId": "46C5D7F1-152C-435F-8694-A66D0008289B", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.14:*:*:*:*:*:*:*", "matchCriteriaId": "BEA2A352-7F4F-449D-AE23-24D39BFE0DB3", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.15:*:*:*:*:*:*:*", "matchCriteriaId": "D9763287-12D3-485D-9DB4-0EBBEB2858C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.16:*:*:*:*:*:*:*", "matchCriteriaId": "9CDB80CE-2F1D-47EE-AE64-EA07B0AA3C20", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.17:*:*:*:*:*:*:*", "matchCriteriaId": "E70E77F5-12EF-4E12-8D34-9C56D23CAB22", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.18:*:*:*:*:*:*:*", "matchCriteriaId": "B0139175-7049-4A2D-878E-EC43325DB5B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.19:*:*:*:*:*:*:*", "matchCriteriaId": "18483901-EC47-45AD-A9EB-30591AA1247E", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.20:*:*:*:*:*:*:*", "matchCriteriaId": "9C069C17-8314-49BA-9CF5-E5F086F49381", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34:*:*:*:*:*:*:*", "matchCriteriaId": "F9F7B49B-7CDF-426C-9688-5E990846DBF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc1:*:*:*:*:*:*", "matchCriteriaId": "2033D2AE-EB00-4696-B72F-8739021D1788", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc2:*:*:*:*:*:*", "matchCriteriaId": "86D3F64C-3F27-43E0-B0D4-62CE1E1F4EFB", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc3:*:*:*:*:*:*", "matchCriteriaId": "7927713B-5EB0-41EB-86A9-9935775162E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc4:*:*:*:*:*:*", "matchCriteriaId": "59037296-3143-4FBB-AFF7-D4FE2C85502F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc5:*:*:*:*:*:*", "matchCriteriaId": "9CA27FD5-7DBF-4C85-80A9-D523B2E4B033", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc6:*:*:*:*:*:*", "matchCriteriaId": "9711E333-A8E7-4F4B-BCFD-2023E889651A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc7:*:*:*:*:*:*", "matchCriteriaId": "E04D3358-973B-42A1-8E08-2E3AE947193C", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.1:*:*:*:*:*:*:*", "matchCriteriaId": "B39BF614-85CD-4C6A-877C-724FB6F5B125", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.2:*:*:*:*:*:*:*", "matchCriteriaId": "DD31EA80-D021-4E47-8FB0-E1F23E379EA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.3:*:*:*:*:*:*:*", "matchCriteriaId": "0C683054-0275-4A92-B003-9C9A5A03B6E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.4:*:*:*:*:*:*:*", "matchCriteriaId": "A25DDBE8-9DA5-4515-AAAF-037D4D201898", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.5:*:*:*:*:*:*:*", "matchCriteriaId": "4499A795-2C87-4E0F-BFFB-63E47AE3EEB8", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.6:*:*:*:*:*:*:*", "matchCriteriaId": "1D11D058-0864-415A-97D6-C67BBBEB0E6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.7:*:*:*:*:*:*:*", "matchCriteriaId": "CF479FF8-8EB2-4436-89EB-FBA3EFA41184", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.8:*:*:*:*:*:*:*", "matchCriteriaId": "086028C0-0025-479A-8977-A880651D2433", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.9:*:*:*:*:*:*:*", "matchCriteriaId": "CC3435ED-DAB4-4BC0-AA30-D164258E0F0B", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.10:*:*:*:*:*:*:*", "matchCriteriaId": "798809DE-1B1E-4C0D-830B-72C549156645", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:*:*:*:*:*:*:*", "matchCriteriaId": "5480B0CF-B462-4172-9F6E-D94B451CF869", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc1:*:*:*:*:*:*", "matchCriteriaId": "17ACC235-F2C3-42B5-9244-DCCDC4704BA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc2:*:*:*:*:*:*", "matchCriteriaId": "EA4BC3D2-70FF-4EED-9DC8-B378F88F4D36", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc3:*:*:*:*:*:*", "matchCriteriaId": "A7ACC123-06D8-4A3F-8730-AA7FF6EFBD35", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc4:*:*:*:*:*:*", "matchCriteriaId": "3F6891F7-2B07-4A96-A0D6-AC528B7E0DD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc5:*:*:*:*:*:*", "matchCriteriaId": "657BCE5D-DC8B-4BE2-AED8-BC52C738F999", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc6:*:*:*:*:*:*", "matchCriteriaId": "160E9402-241A-44AE-A92A-9629CA656F38", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.1:*:*:*:*:*:*:*", "matchCriteriaId": "D2CD9FB1-AB83-427A-8923-97ED7ADFD63D", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.2:*:*:*:*:*:*:*", "matchCriteriaId": "1B2E5B71-BF7F-426A-BE5E-0481010725E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.3:*:*:*:*:*:*:*", "matchCriteriaId": "4540D1DF-9ED8-45DB-B868-BD195DDCB8B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.4:*:*:*:*:*:*:*", "matchCriteriaId": "CB33FE45-7254-4F8D-AC22-0FEA559A8567", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.5:*:*:*:*:*:*:*", "matchCriteriaId": "52E43E71-2F62-40E5-BF56-15D26806B7AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.6:*:*:*:*:*:*:*", "matchCriteriaId": "B422B61F-AE80-4F86-AACA-F86EE47983A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.7:*:*:*:*:*:*:*", "matchCriteriaId": "BDA2DB37-7A2D-400D-889E-36175DCDF3FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.8:*:*:*:*:*:*:*", "matchCriteriaId": "40C2CAA9-8EAF-43C7-B0CE-D1A09663C49B", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.9:*:*:*:*:*:*:*", "matchCriteriaId": "AA1CA35C-5F52-4095-B0EA-7A22481F4360", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.10:*:*:*:*:*:*:*", "matchCriteriaId": "EDB46950-0C6F-4A13-9425-3FCAF3C09A75", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.11:*:*:*:*:*:*:*", "matchCriteriaId": "55189BDD-5644-4B48-A94E-E71977F3376F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.12:*:*:*:*:*:*:*", "matchCriteriaId": "D1DACBA1-004B-4416-A52B-235A607181AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.13:*:*:*:*:*:*:*", "matchCriteriaId": "45B536B6-FE29-4775-B4A6-B198A9475B19", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*", "matchCriteriaId": "DBE26099-6D2C-4FAF-B15C-CBF985D59171", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*", "matchCriteriaId": "F2C193FF-3723-4BE9-8787-DED7D455FA8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*", "matchCriteriaId": "F874FE6A-968D-47E1-900A-E154E41EDAF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*", "matchCriteriaId": "14B7B8AE-CE83-4F0E-9138-6F165D97C19F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*", "matchCriteriaId": "B434ACFB-2B01-491A-B2E5-40FA0E11B3B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc6:*:*:*:*:*:*", "matchCriteriaId": "CF88CADB-AB36-4633-807B-44AB3145F748", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc7:*:*:*:*:*:*", "matchCriteriaId": "9D9830C2-0E2D-4A5A-B78F-5D4A4721B268", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments." }, { "lang": "es", "value": "La funci\u00f3n ip6_frag_queue en net/ipv6/reassembly.c en el kernel de Linux antes de v2.6.36 permite a atacantes remotos evitar las restricciones de red a trav\u00e9s de la superposici\u00f3n de fragmentos IPv6.\r\n" } ], "id": "CVE-2012-4444", "lastModified": "2024-11-21T01:42:54.643", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-12-21T11:47:36.533", "references": [ { "source": "secalert@redhat.com", "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36" }, { "source": "secalert@redhat.com", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=70789d7052239992824628db8133de08dc78e593" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00000.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2012-1580.html" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/11/09/2" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1660-1" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1661-1" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874835" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593" }, { "source": "secalert@redhat.com", "url": "https://media.blackhat.com/bh-eu-12/Atlasis/bh-eu-12-Atlasis-Attacking_IPv6-WP.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=70789d7052239992824628db8133de08dc78e593" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2012-1580.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/11/09/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1660-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1661-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874835" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://media.blackhat.com/bh-eu-12/Atlasis/bh-eu-12-Atlasis-Attacking_IPv6-WP.pdf" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.