cve-2012-4444
Vulnerability from cvelistv5
Published
2012-12-21 11:00
Modified
2024-08-06 20:35
Severity ?
Summary
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
References
secalert@redhat.comhttp://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
secalert@redhat.comhttp://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=70789d7052239992824628db8133de08dc78e593
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2013-06/msg00000.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2012-1580.html
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/11/09/2
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1660-1
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1661-1
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=874835Patch
secalert@redhat.comhttps://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593Patch, Vendor Advisory
secalert@redhat.comhttps://media.blackhat.com/bh-eu-12/Atlasis/bh-eu-12-Atlasis-Attacking_IPv6-WP.pdf
af854a3a-2127-422b-91ae-364da2661108http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
af854a3a-2127-422b-91ae-364da2661108http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=70789d7052239992824628db8133de08dc78e593
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2012-1580.html
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/11/09/2
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1660-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1661-1
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=874835Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://media.blackhat.com/bh-eu-12/Atlasis/bh-eu-12-Atlasis-Attacking_IPv6-WP.pdf
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:35:10.019Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36"
          },
          {
            "name": "SUSE-SU-2013:0856",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00000.html"
          },
          {
            "name": "RHSA-2012:1580",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2012-1580.html"
          },
          {
            "name": "[oss-security] 20121109 Re: CVE request --- acceptation of overlapping ipv6 fragments",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/11/09/2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874835"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=70789d7052239992824628db8133de08dc78e593"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://media.blackhat.com/bh-eu-12/Atlasis/bh-eu-12-Atlasis-Attacking_IPv6-WP.pdf"
          },
          {
            "name": "USN-1661-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1661-1"
          },
          {
            "name": "USN-1660-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1660-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-10-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-01-04T10:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36"
        },
        {
          "name": "SUSE-SU-2013:0856",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00000.html"
        },
        {
          "name": "RHSA-2012:1580",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2012-1580.html"
        },
        {
          "name": "[oss-security] 20121109 Re: CVE request --- acceptation of overlapping ipv6 fragments",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/11/09/2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874835"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=70789d7052239992824628db8133de08dc78e593"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://media.blackhat.com/bh-eu-12/Atlasis/bh-eu-12-Atlasis-Attacking_IPv6-WP.pdf"
        },
        {
          "name": "USN-1661-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1661-1"
        },
        {
          "name": "USN-1660-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1660-1"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-4444",
    "datePublished": "2012-12-21T11:00:00",
    "dateReserved": "2012-08-21T00:00:00",
    "dateUpdated": "2024-08-06T20:35:10.019Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2012-4444\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-12-21T11:47:36.533\",\"lastModified\":\"2024-11-21T01:42:54.643\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n ip6_frag_queue en net/ipv6/reassembly.c en el kernel de Linux antes de v2.6.36 permite a atacantes remotos evitar las restricciones de red a trav\u00e9s de la superposici\u00f3n de fragmentos IPv6.\\r\\n\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:rc8:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6.36\",\"matchCriteriaId\":\"CE582DCD-BC73-4540-87C8-71E2C3926305\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10E55450-F6D9-483C-9CC8-E651E5A12AB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"45273823-29EA-44DE-8444-3933402C5793\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"88F60E74-09DB-4D4A-B922-4A46EED0EC20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E242D3DE-D1DC-406A-BCC3-C4380B7EC369\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EE58B00-70BB-493D-ACDE-77F486984392\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc4:x86_32:*:*:*:*:*\",\"matchCriteriaId\":\"06EFB3F7-2EAE-4A56-A9A1-E8C734E6B91E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"8598D6E5-0C5C-4A31-841A-C12801DB7D91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"59800B0A-477B-42F8-A58A-5144F455AE01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"65210718-2AF2-47E5-A1A7-CE72B926F9F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"724E1180-5A91-4503-8723-C59528794884\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99AC6D46-A0BF-4F1D-88BB-03BF74FDB84F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC40B6DE-09D9-422B-965B-7EB9F6661DEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEFB6E91-34CD-4FC5-A8E1-8F5760A9B4C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91170B40-4D25-4E40-8F0B-DBC1AE217F99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E28B8B9-B832-4D77-BE1A-BB5D8A678678\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56DF61F4-5DA1-4D79-B6C0-0E4DB825FB3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"468745AA-0BE5-4B22-91FA-2FD350BD2F64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF208118-3534-47E5-9943-83EF165F1249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"427E3009-A2F2-4ED2-8D1A-14938F639D2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD3663BD-4EF5-496C-A573-2639C9E72214\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4033E0B-A3A1-4CC5-956A-AAA0FB905DDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"29C4A364-ED36-4AC8-AD1E-8BD18DD9324D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4049867A-E3B2-4DC1-8966-0477E6A5D582\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2507858-675B-4DA2-A49E-00DB54700CF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A25EA55-3F1C-440C-A383-0BB9556C9508\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2665356-4EF5-4543-AD15-67FDB851DCCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"26E7609B-B058-496D-ACDD-7F69FBDE89E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"210BF049-8B3C-4ACC-BF8E-2C3551477602\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"1837F32C-80D3-4E10-AE5D-E9F5A11A434E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31:rc9:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B4E132B-A69A-4CD1-B4D9-E17C4361A3AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31-rc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C86BC69-06B6-45C7-9821-45D42D44B240\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31-rc3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA0353B9-907F-4B89-9104-2F4434159F0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31-rc4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D1FF505-4135-4005-BD1A-3AC913FEE20A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31-rc5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D31D04B-1E65-4FD6-AEED-3F365C65FCDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31-rc6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24CFD647-3926-462F-B264-56E136B74F81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31-rc7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE71B9D7-B52E-426A-831D-ADEDC38318E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31-rc8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6FFA2CD-0EC9-4FBB-93DC-80736622CFCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31-rc9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B64401A9-58F5-4CB6-B0E2-A3A2B92659EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31-rc10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89137307-D97D-4D8B-9291-21DE1E6C56D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC3151BF-4BEE-4415-ABA2-E6D40673E591\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1037E899-6DB3-423D-9AD0-FE79A67E9681\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4DD2F05-F990-417A-BD6D-CD9A7EB2BD55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0634D7FE-7685-4669-8EF9-54E99683D28E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EEEB962-0E8D-402B-989E-96875453C609\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0042D9C4-7081-4DC2-A5B5-2649374B44F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CD18FA2-677A-4934-88E6-0BB78D789875\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24EF19A2-A1CC-4410-8704-EF4041428383\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9502A7E-2BFF-43A7-BF6B-ADC023BD9331\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DC9A36E-1779-49DE-83CE-B8479CA018FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60B18050-4720-4ACB-AEE2-DEB4BFCA7B6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9704C4B5-28F1-4F62-A389-8A9917E8E99D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6574F543-0B91-49A6-81FA-8142007BCD54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD7F9D0-3AE3-4687-B1C9-36AD04D96F52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46568A0D-F374-4DAB-9B64-FCC74A9AA07B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C85D4E0A-14DA-4884-AF6F-A0F54304430F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"218DE1D1-3843-4076-9AE4-70AA0FD99B3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"2677114B-AF05-42EB-BBC8-FA85CD631C21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA8D64E1-A700-4D9E-9063-EC3CFC1A6D98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B6C0A59-556F-4579-9AD2-4ABAE01FE2CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBE3083A-0FA6-4854-8F65-05E8364B3A9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"57F8D95D-DC49-46B3-A460-2352D7E540EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"084A2575-E5A6-43BD-8CE5-1EF628AA9ACB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"041CE8AF-711C-496D-BDF2-B4AB655C0C8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE192302-F569-4301-83F2-AEE020FB77B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2597A691-01B8-4FD2-AF71-D4BCC15C6F10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"533A03F0-D7C4-42EF-BAD7-2B5A9A9D68EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDBA84AD-CB87-418B-BBF7-8E910FB8FD5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0FA9FA7-3BE3-415B-AA06-A2401B2AD8DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A93EFB49-0195-4471-9445-DA944CD55459\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"075C2C0A-E5E7-412C-9B28-3E3363A2DF05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"534281D8-EAEB-4E78-8835-E6BA318BE866\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"192A8675-4413-4ADD-BF9E-DFD757C76387\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E15D428-B54A-499D-8677-63C73A2C2934\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8804EC33-1751-4493-98D7-B85F326ABAD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC94715E-208F-421E-8FCA-81E86175C983\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"982071FC-873D-4C38-817B-F5853699135D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B721839-AB4C-4DE7-834F-E790DE770066\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75965543-51D3-4809-8815-EA80BAC85C98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CEC8F08-EE90-41CA-A30F-D34290168571\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A23998B-F0EE-4143-A206-AFD47EC8BD2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAB711D9-B2DE-4C8F-A03C-EFF57664416C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A2B2D5E-FDBC-4BCE-9925-1F6D5256C237\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BC0D45F-8619-4EB7-B074-90CD70A4BE6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7A7996C-04D2-4B0B-A1AE-E4430DE9BB80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD8BC35B-8304-4B11-BD48-A8633B1D97AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44A8D565-A7EC-47CD-A72E-FBFDC6254718\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0521A4B9-8A42-41B8-AD31-BCEB90D1E58B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9428FC60-D446-46C0-9305-127BCCF11E4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D2C6313-534F-4AAE-8DE7-B15410EFAC33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38FCB9CD-1D91-4355-B00C-48F5270CB0D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66265F3F-55D1-4F73-817A-9752E13D8B4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D6F4940-F31E-4D1F-989E-C4FB9CA756BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEDE0109-B00A-409A-A403-975A7657367F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB665B30-A013-4724-B21B-1F9696CBF861\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7EA2632-BAA2-48BA-8DEA-AF4460D8794F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8694695B-5D4D-4136-83F4-E29F0E410613\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C62F815-BDC3-4D56-96AA-3BCDD2F88E1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE306F97-0BC4-472A-AF34-70F652CDA615\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D273697C-EDFD-4D0F-96C7-4EF583EB0D7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D96D53C-21FF-4BC2-B414-A0610B2C895B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FAF66F2-4740-4B85-885A-C1B61AD463AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5442BAC-D654-400F-9B1C-81C36B3425E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48FB9998-A3B3-4164-B3C7-5E2D667B9B84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA595B7C-AC9E-4A27-A96C-9C6398626C8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12DC0713-8F83-4FF4-A1E4-D4BD3273A4A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25FDE762-B5E7-43AA-8889-43FF057ECCB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AFC49DE-B882-4E6D-914F-AF3A4B1DED65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEAD1D24-AE22-40CE-97C5-530650802779\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7267C1F-7545-47D9-A734-D1503B836182\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26A662EA-3FA9-48DD-86E6-C143CC217301\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D341758-5A25-4ED0-AC0C-7818C10B9C09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E94429E-BB47-4394-AEC7-78A8DB15C14C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24710583-8DBA-49B3-A98E-2AE654AE08F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52BBD72A-ACD0-4809-A7A8-CC934F62562B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5CF66D2-F8CB-4452-9B5C-9013BC7EEAB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C873C76C-5EC2-4CEC-B10C-839CB4B13659\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAC9316C-5E97-4F23-859F-6627FD6CC385\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B646D34E-0FF9-4EEA-A543-E1ABD1044A23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80AAAE5D-0726-49E2-AF99-042DD960C3A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D81C2911-5781-46A4-AD27-F946BD44EAEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DB53511-E1B0-4F81-BE9E-B52E84E9C30E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"207306A0-19F5-4E49-945C-A5E4DD442459\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DE43C00-5967-44A1-ACEB-B7AF66EEBB53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B33B5E4B-FCB3-4343-B992-F0ADB853754B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7295BBE-A9E3-44F6-9DD6-0FD6C2591E11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"B220EA3F-55B3-4B6E-8285-B28ADEF50138\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"C61AB348-ACF4-4F88-AC9D-BEC63B76399C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3AFD58E-A261-4398-BA11-B62A091261F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17721A7D-E955-407B-AACB-97F859CE79C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B04F515-29A7-4D6A-AFC5-3A115F8A5918\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7514928F-8992-4B8A-8AF4-E89F1CB6EFCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD6324B7-1329-4C6B-8DDB-D489250E07C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7910FE5-E02C-4B20-9F27-F488E76BDE93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96F85BC2-54C4-4450-B3BA-A2A8EB78A81C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25E5B510-1096-42E8-8BD1-E9198D588050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29787617-FFDD-4BDE-97EB-330675B99614\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B28D3CE-E432-4F10-BF25-D03B0D89388A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E587FF24-AA5D-454B-8928-9C3CE03C419C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DDBAAA5-240F-4DE5-BAA1-89508BD2CD8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5D61706-2974-4C96-8196-9F3F56F1791F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46C5D7F1-152C-435F-8694-A66D0008289B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEA2A352-7F4F-449D-AE23-24D39BFE0DB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9763287-12D3-485D-9DB4-0EBBEB2858C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CDB80CE-2F1D-47EE-AE64-EA07B0AA3C20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E70E77F5-12EF-4E12-8D34-9C56D23CAB22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0139175-7049-4A2D-878E-EC43325DB5B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18483901-EC47-45AD-A9EB-30591AA1247E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C069C17-8314-49BA-9CF5-E5F086F49381\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9F7B49B-7CDF-426C-9688-5E990846DBF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2033D2AE-EB00-4696-B72F-8739021D1788\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"86D3F64C-3F27-43E0-B0D4-62CE1E1F4EFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"7927713B-5EB0-41EB-86A9-9935775162E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"59037296-3143-4FBB-AFF7-D4FE2C85502F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CA27FD5-7DBF-4C85-80A9-D523B2E4B033\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"9711E333-A8E7-4F4B-BCFD-2023E889651A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"E04D3358-973B-42A1-8E08-2E3AE947193C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B39BF614-85CD-4C6A-877C-724FB6F5B125\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD31EA80-D021-4E47-8FB0-E1F23E379EA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C683054-0275-4A92-B003-9C9A5A03B6E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A25DDBE8-9DA5-4515-AAAF-037D4D201898\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4499A795-2C87-4E0F-BFFB-63E47AE3EEB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D11D058-0864-415A-97D6-C67BBBEB0E6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF479FF8-8EB2-4436-89EB-FBA3EFA41184\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"086028C0-0025-479A-8977-A880651D2433\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC3435ED-DAB4-4BC0-AA30-D164258E0F0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"798809DE-1B1E-4C0D-830B-72C549156645\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5480B0CF-B462-4172-9F6E-D94B451CF869\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"17ACC235-F2C3-42B5-9244-DCCDC4704BA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA4BC3D2-70FF-4EED-9DC8-B378F88F4D36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7ACC123-06D8-4A3F-8730-AA7FF6EFBD35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F6891F7-2B07-4A96-A0D6-AC528B7E0DD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"657BCE5D-DC8B-4BE2-AED8-BC52C738F999\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"160E9402-241A-44AE-A92A-9629CA656F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2CD9FB1-AB83-427A-8923-97ED7ADFD63D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B2E5B71-BF7F-426A-BE5E-0481010725E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4540D1DF-9ED8-45DB-B868-BD195DDCB8B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB33FE45-7254-4F8D-AC22-0FEA559A8567\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52E43E71-2F62-40E5-BF56-15D26806B7AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B422B61F-AE80-4F86-AACA-F86EE47983A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDA2DB37-7A2D-400D-889E-36175DCDF3FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40C2CAA9-8EAF-43C7-B0CE-D1A09663C49B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA1CA35C-5F52-4095-B0EA-7A22481F4360\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDB46950-0C6F-4A13-9425-3FCAF3C09A75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55189BDD-5644-4B48-A94E-E71977F3376F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1DACBA1-004B-4416-A52B-235A607181AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45B536B6-FE29-4775-B4A6-B198A9475B19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBE26099-6D2C-4FAF-B15C-CBF985D59171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2C193FF-3723-4BE9-8787-DED7D455FA8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F874FE6A-968D-47E1-900A-E154E41EDAF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"14B7B8AE-CE83-4F0E-9138-6F165D97C19F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B434ACFB-2B01-491A-B2E5-40FA0E11B3B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF88CADB-AB36-4633-807B-44AB3145F748\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D9830C2-0E2D-4A5A-B78F-5D4A4721B268\"}]}]}],\"references\":[{\"url\":\"http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=70789d7052239992824628db8133de08dc78e593\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00000.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1580.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/11/09/2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1660-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1661-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=874835\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://media.blackhat.com/bh-eu-12/Atlasis/bh-eu-12-Atlasis-Attacking_IPv6-WP.pdf\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=70789d7052239992824628db8133de08dc78e593\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1580.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/11/09/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1660-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1661-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=874835\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://media.blackhat.com/bh-eu-12/Atlasis/bh-eu-12-Atlasis-Attacking_IPv6-WP.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.