FKIE_CVE-2012-4444
Vulnerability from fkie_nvd - Published: 2012-12-21 11:47 - Updated: 2025-04-11 00:51
Severity ?
Summary
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:rc8:*:*:*:*:*:*",
"matchCriteriaId": "CE582DCD-BC73-4540-87C8-71E2C3926305",
"versionEndIncluding": "2.6.36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:*:*:*:*:*:*:*",
"matchCriteriaId": "10E55450-F6D9-483C-9CC8-E651E5A12AB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc1:*:*:*:*:*:*",
"matchCriteriaId": "45273823-29EA-44DE-8444-3933402C5793",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc2:*:*:*:*:*:*",
"matchCriteriaId": "88F60E74-09DB-4D4A-B922-4A46EED0EC20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E242D3DE-D1DC-406A-BCC3-C4380B7EC369",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc4:*:*:*:*:*:*",
"matchCriteriaId": "5EE58B00-70BB-493D-ACDE-77F486984392",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc4:x86_32:*:*:*:*:*",
"matchCriteriaId": "06EFB3F7-2EAE-4A56-A9A1-E8C734E6B91E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc5:*:*:*:*:*:*",
"matchCriteriaId": "8598D6E5-0C5C-4A31-841A-C12801DB7D91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc6:*:*:*:*:*:*",
"matchCriteriaId": "59800B0A-477B-42F8-A58A-5144F455AE01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc7:*:*:*:*:*:*",
"matchCriteriaId": "65210718-2AF2-47E5-A1A7-CE72B926F9F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc8:*:*:*:*:*:*",
"matchCriteriaId": "724E1180-5A91-4503-8723-C59528794884",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.1:*:*:*:*:*:*:*",
"matchCriteriaId": "99AC6D46-A0BF-4F1D-88BB-03BF74FDB84F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CC40B6DE-09D9-422B-965B-7EB9F6661DEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FEFB6E91-34CD-4FC5-A8E1-8F5760A9B4C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.4:*:*:*:*:*:*:*",
"matchCriteriaId": "91170B40-4D25-4E40-8F0B-DBC1AE217F99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9E28B8B9-B832-4D77-BE1A-BB5D8A678678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.6:*:*:*:*:*:*:*",
"matchCriteriaId": "56DF61F4-5DA1-4D79-B6C0-0E4DB825FB3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.7:*:*:*:*:*:*:*",
"matchCriteriaId": "468745AA-0BE5-4B22-91FA-2FD350BD2F64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.8:*:*:*:*:*:*:*",
"matchCriteriaId": "FF208118-3534-47E5-9943-83EF165F1249",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.9:*:*:*:*:*:*:*",
"matchCriteriaId": "427E3009-A2F2-4ED2-8D1A-14938F639D2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.10:*:*:*:*:*:*:*",
"matchCriteriaId": "DD3663BD-4EF5-496C-A573-2639C9E72214",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:*:*:*:*:*:*:*",
"matchCriteriaId": "C4033E0B-A3A1-4CC5-956A-AAA0FB905DDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc1:*:*:*:*:*:*",
"matchCriteriaId": "29C4A364-ED36-4AC8-AD1E-8BD18DD9324D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4049867A-E3B2-4DC1-8966-0477E6A5D582",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc3:*:*:*:*:*:*",
"matchCriteriaId": "A2507858-675B-4DA2-A49E-00DB54700CF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc4:*:*:*:*:*:*",
"matchCriteriaId": "0A25EA55-3F1C-440C-A383-0BB9556C9508",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc5:*:*:*:*:*:*",
"matchCriteriaId": "B2665356-4EF5-4543-AD15-67FDB851DCCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc6:*:*:*:*:*:*",
"matchCriteriaId": "26E7609B-B058-496D-ACDD-7F69FBDE89E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc7:*:*:*:*:*:*",
"matchCriteriaId": "210BF049-8B3C-4ACC-BF8E-2C3551477602",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc8:*:*:*:*:*:*",
"matchCriteriaId": "1837F32C-80D3-4E10-AE5D-E9F5A11A434E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc9:*:*:*:*:*:*",
"matchCriteriaId": "4B4E132B-A69A-4CD1-B4D9-E17C4361A3AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31-rc2:*:*:*:*:*:*:*",
"matchCriteriaId": "3C86BC69-06B6-45C7-9821-45D42D44B240",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31-rc3:*:*:*:*:*:*:*",
"matchCriteriaId": "EA0353B9-907F-4B89-9104-2F4434159F0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31-rc4:*:*:*:*:*:*:*",
"matchCriteriaId": "7D1FF505-4135-4005-BD1A-3AC913FEE20A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31-rc5:*:*:*:*:*:*:*",
"matchCriteriaId": "5D31D04B-1E65-4FD6-AEED-3F365C65FCDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31-rc6:*:*:*:*:*:*:*",
"matchCriteriaId": "24CFD647-3926-462F-B264-56E136B74F81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31-rc7:*:*:*:*:*:*:*",
"matchCriteriaId": "BE71B9D7-B52E-426A-831D-ADEDC38318E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31-rc8:*:*:*:*:*:*:*",
"matchCriteriaId": "C6FFA2CD-0EC9-4FBB-93DC-80736622CFCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31-rc9:*:*:*:*:*:*:*",
"matchCriteriaId": "B64401A9-58F5-4CB6-B0E2-A3A2B92659EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31-rc10:*:*:*:*:*:*:*",
"matchCriteriaId": "89137307-D97D-4D8B-9291-21DE1E6C56D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AC3151BF-4BEE-4415-ABA2-E6D40673E591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1037E899-6DB3-423D-9AD0-FE79A67E9681",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E4DD2F05-F990-417A-BD6D-CD9A7EB2BD55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0634D7FE-7685-4669-8EF9-54E99683D28E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9EEEB962-0E8D-402B-989E-96875453C609",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0042D9C4-7081-4DC2-A5B5-2649374B44F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9CD18FA2-677A-4934-88E6-0BB78D789875",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.8:*:*:*:*:*:*:*",
"matchCriteriaId": "24EF19A2-A1CC-4410-8704-EF4041428383",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C9502A7E-2BFF-43A7-BF6B-ADC023BD9331",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.10:*:*:*:*:*:*:*",
"matchCriteriaId": "6DC9A36E-1779-49DE-83CE-B8479CA018FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.11:*:*:*:*:*:*:*",
"matchCriteriaId": "60B18050-4720-4ACB-AEE2-DEB4BFCA7B6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.12:*:*:*:*:*:*:*",
"matchCriteriaId": "9704C4B5-28F1-4F62-A389-8A9917E8E99D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6574F543-0B91-49A6-81FA-8142007BCD54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4CD7F9D0-3AE3-4687-B1C9-36AD04D96F52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*",
"matchCriteriaId": "46568A0D-F374-4DAB-9B64-FCC74A9AA07B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc1:*:*:*:*:*:*",
"matchCriteriaId": "C85D4E0A-14DA-4884-AF6F-A0F54304430F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc3:*:*:*:*:*:*",
"matchCriteriaId": "218DE1D1-3843-4076-9AE4-70AA0FD99B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc4:*:*:*:*:*:*",
"matchCriteriaId": "2677114B-AF05-42EB-BBC8-FA85CD631C21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc5:*:*:*:*:*:*",
"matchCriteriaId": "FA8D64E1-A700-4D9E-9063-EC3CFC1A6D98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc6:*:*:*:*:*:*",
"matchCriteriaId": "1B6C0A59-556F-4579-9AD2-4ABAE01FE2CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc7:*:*:*:*:*:*",
"matchCriteriaId": "DBE3083A-0FA6-4854-8F65-05E8364B3A9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc8:*:*:*:*:*:*",
"matchCriteriaId": "57F8D95D-DC49-46B3-A460-2352D7E540EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.1:*:*:*:*:*:*:*",
"matchCriteriaId": "084A2575-E5A6-43BD-8CE5-1EF628AA9ACB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.2:*:*:*:*:*:*:*",
"matchCriteriaId": "041CE8AF-711C-496D-BDF2-B4AB655C0C8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FE192302-F569-4301-83F2-AEE020FB77B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2597A691-01B8-4FD2-AF71-D4BCC15C6F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.5:*:*:*:*:*:*:*",
"matchCriteriaId": "533A03F0-D7C4-42EF-BAD7-2B5A9A9D68EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.6:*:*:*:*:*:*:*",
"matchCriteriaId": "EDBA84AD-CB87-418B-BBF7-8E910FB8FD5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A0FA9FA7-3BE3-415B-AA06-A2401B2AD8DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A93EFB49-0195-4471-9445-DA944CD55459",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.9:*:*:*:*:*:*:*",
"matchCriteriaId": "075C2C0A-E5E7-412C-9B28-3E3363A2DF05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.10:*:*:*:*:*:*:*",
"matchCriteriaId": "534281D8-EAEB-4E78-8835-E6BA318BE866",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.11:*:*:*:*:*:*:*",
"matchCriteriaId": "192A8675-4413-4ADD-BF9E-DFD757C76387",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.12:*:*:*:*:*:*:*",
"matchCriteriaId": "1E15D428-B54A-499D-8677-63C73A2C2934",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.13:*:*:*:*:*:*:*",
"matchCriteriaId": "8804EC33-1751-4493-98D7-B85F326ABAD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.14:*:*:*:*:*:*:*",
"matchCriteriaId": "BC94715E-208F-421E-8FCA-81E86175C983",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.15:*:*:*:*:*:*:*",
"matchCriteriaId": "982071FC-873D-4C38-817B-F5853699135D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.16:*:*:*:*:*:*:*",
"matchCriteriaId": "6B721839-AB4C-4DE7-834F-E790DE770066",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.17:*:*:*:*:*:*:*",
"matchCriteriaId": "75965543-51D3-4809-8815-EA80BAC85C98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.18:*:*:*:*:*:*:*",
"matchCriteriaId": "4CEC8F08-EE90-41CA-A30F-D34290168571",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.19:*:*:*:*:*:*:*",
"matchCriteriaId": "3A23998B-F0EE-4143-A206-AFD47EC8BD2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.20:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB711D9-B2DE-4C8F-A03C-EFF57664416C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.21:*:*:*:*:*:*:*",
"matchCriteriaId": "5A2B2D5E-FDBC-4BCE-9925-1F6D5256C237",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.22:*:*:*:*:*:*:*",
"matchCriteriaId": "5BC0D45F-8619-4EB7-B074-90CD70A4BE6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.23:*:*:*:*:*:*:*",
"matchCriteriaId": "F7A7996C-04D2-4B0B-A1AE-E4430DE9BB80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.24:*:*:*:*:*:*:*",
"matchCriteriaId": "FD8BC35B-8304-4B11-BD48-A8633B1D97AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.25:*:*:*:*:*:*:*",
"matchCriteriaId": "44A8D565-A7EC-47CD-A72E-FBFDC6254718",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.26:*:*:*:*:*:*:*",
"matchCriteriaId": "0521A4B9-8A42-41B8-AD31-BCEB90D1E58B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.27:*:*:*:*:*:*:*",
"matchCriteriaId": "9428FC60-D446-46C0-9305-127BCCF11E4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.28:*:*:*:*:*:*:*",
"matchCriteriaId": "7D2C6313-534F-4AAE-8DE7-B15410EFAC33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.29:*:*:*:*:*:*:*",
"matchCriteriaId": "38FCB9CD-1D91-4355-B00C-48F5270CB0D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.30:*:*:*:*:*:*:*",
"matchCriteriaId": "66265F3F-55D1-4F73-817A-9752E13D8B4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.31:*:*:*:*:*:*:*",
"matchCriteriaId": "3D6F4940-F31E-4D1F-989E-C4FB9CA756BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.32:*:*:*:*:*:*:*",
"matchCriteriaId": "CEDE0109-B00A-409A-A403-975A7657367F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.33:*:*:*:*:*:*:*",
"matchCriteriaId": "EB665B30-A013-4724-B21B-1F9696CBF861",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.34:*:*:*:*:*:*:*",
"matchCriteriaId": "C7EA2632-BAA2-48BA-8DEA-AF4460D8794F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.35:*:*:*:*:*:*:*",
"matchCriteriaId": "8694695B-5D4D-4136-83F4-E29F0E410613",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.36:*:*:*:*:*:*:*",
"matchCriteriaId": "7C62F815-BDC3-4D56-96AA-3BCDD2F88E1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.37:*:*:*:*:*:*:*",
"matchCriteriaId": "CE306F97-0BC4-472A-AF34-70F652CDA615",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.38:*:*:*:*:*:*:*",
"matchCriteriaId": "D273697C-EDFD-4D0F-96C7-4EF583EB0D7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.39:*:*:*:*:*:*:*",
"matchCriteriaId": "3D96D53C-21FF-4BC2-B414-A0610B2C895B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.40:*:*:*:*:*:*:*",
"matchCriteriaId": "0FAF66F2-4740-4B85-885A-C1B61AD463AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.41:*:*:*:*:*:*:*",
"matchCriteriaId": "A5442BAC-D654-400F-9B1C-81C36B3425E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.42:*:*:*:*:*:*:*",
"matchCriteriaId": "48FB9998-A3B3-4164-B3C7-5E2D667B9B84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.43:*:*:*:*:*:*:*",
"matchCriteriaId": "EA595B7C-AC9E-4A27-A96C-9C6398626C8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.44:*:*:*:*:*:*:*",
"matchCriteriaId": "12DC0713-8F83-4FF4-A1E4-D4BD3273A4A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.45:*:*:*:*:*:*:*",
"matchCriteriaId": "25FDE762-B5E7-43AA-8889-43FF057ECCB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.46:*:*:*:*:*:*:*",
"matchCriteriaId": "1AFC49DE-B882-4E6D-914F-AF3A4B1DED65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.47:*:*:*:*:*:*:*",
"matchCriteriaId": "BEAD1D24-AE22-40CE-97C5-530650802779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.48:*:*:*:*:*:*:*",
"matchCriteriaId": "E7267C1F-7545-47D9-A734-D1503B836182",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.49:*:*:*:*:*:*:*",
"matchCriteriaId": "26A662EA-3FA9-48DD-86E6-C143CC217301",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.50:*:*:*:*:*:*:*",
"matchCriteriaId": "2D341758-5A25-4ED0-AC0C-7818C10B9C09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.51:*:*:*:*:*:*:*",
"matchCriteriaId": "4E94429E-BB47-4394-AEC7-78A8DB15C14C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.52:*:*:*:*:*:*:*",
"matchCriteriaId": "24710583-8DBA-49B3-A98E-2AE654AE08F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.53:*:*:*:*:*:*:*",
"matchCriteriaId": "52BBD72A-ACD0-4809-A7A8-CC934F62562B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.54:*:*:*:*:*:*:*",
"matchCriteriaId": "F5CF66D2-F8CB-4452-9B5C-9013BC7EEAB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.55:*:*:*:*:*:*:*",
"matchCriteriaId": "C873C76C-5EC2-4CEC-B10C-839CB4B13659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.56:*:*:*:*:*:*:*",
"matchCriteriaId": "CAC9316C-5E97-4F23-859F-6627FD6CC385",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.57:*:*:*:*:*:*:*",
"matchCriteriaId": "B646D34E-0FF9-4EEA-A543-E1ABD1044A23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.58:*:*:*:*:*:*:*",
"matchCriteriaId": "80AAAE5D-0726-49E2-AF99-042DD960C3A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:*:*:*:*:*:*:*",
"matchCriteriaId": "D81C2911-5781-46A4-AD27-F946BD44EAEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2DB53511-E1B0-4F81-BE9E-B52E84E9C30E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc2:*:*:*:*:*:*",
"matchCriteriaId": "207306A0-19F5-4E49-945C-A5E4DD442459",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc3:*:*:*:*:*:*",
"matchCriteriaId": "1DE43C00-5967-44A1-ACEB-B7AF66EEBB53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc4:*:*:*:*:*:*",
"matchCriteriaId": "B33B5E4B-FCB3-4343-B992-F0ADB853754B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc5:*:*:*:*:*:*",
"matchCriteriaId": "D7295BBE-A9E3-44F6-9DD6-0FD6C2591E11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc6:*:*:*:*:*:*",
"matchCriteriaId": "B220EA3F-55B3-4B6E-8285-B28ADEF50138",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc7:*:*:*:*:*:*",
"matchCriteriaId": "C61AB348-ACF4-4F88-AC9D-BEC63B76399C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc8:*:*:*:*:*:*",
"matchCriteriaId": "C3AFD58E-A261-4398-BA11-B62A091261F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.1:*:*:*:*:*:*:*",
"matchCriteriaId": "17721A7D-E955-407B-AACB-97F859CE79C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7B04F515-29A7-4D6A-AFC5-3A115F8A5918",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7514928F-8992-4B8A-8AF4-E89F1CB6EFCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BD6324B7-1329-4C6B-8DDB-D489250E07C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A7910FE5-E02C-4B20-9F27-F488E76BDE93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.6:*:*:*:*:*:*:*",
"matchCriteriaId": "96F85BC2-54C4-4450-B3BA-A2A8EB78A81C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.7:*:*:*:*:*:*:*",
"matchCriteriaId": "25E5B510-1096-42E8-8BD1-E9198D588050",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.8:*:*:*:*:*:*:*",
"matchCriteriaId": "29787617-FFDD-4BDE-97EB-330675B99614",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.9:*:*:*:*:*:*:*",
"matchCriteriaId": "7B28D3CE-E432-4F10-BF25-D03B0D89388A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E587FF24-AA5D-454B-8928-9C3CE03C419C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9DDBAAA5-240F-4DE5-BAA1-89508BD2CD8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F5D61706-2974-4C96-8196-9F3F56F1791F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.13:*:*:*:*:*:*:*",
"matchCriteriaId": "46C5D7F1-152C-435F-8694-A66D0008289B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.14:*:*:*:*:*:*:*",
"matchCriteriaId": "BEA2A352-7F4F-449D-AE23-24D39BFE0DB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.15:*:*:*:*:*:*:*",
"matchCriteriaId": "D9763287-12D3-485D-9DB4-0EBBEB2858C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9CDB80CE-2F1D-47EE-AE64-EA07B0AA3C20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.17:*:*:*:*:*:*:*",
"matchCriteriaId": "E70E77F5-12EF-4E12-8D34-9C56D23CAB22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.18:*:*:*:*:*:*:*",
"matchCriteriaId": "B0139175-7049-4A2D-878E-EC43325DB5B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.19:*:*:*:*:*:*:*",
"matchCriteriaId": "18483901-EC47-45AD-A9EB-30591AA1247E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.20:*:*:*:*:*:*:*",
"matchCriteriaId": "9C069C17-8314-49BA-9CF5-E5F086F49381",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34:*:*:*:*:*:*:*",
"matchCriteriaId": "F9F7B49B-7CDF-426C-9688-5E990846DBF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2033D2AE-EB00-4696-B72F-8739021D1788",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc2:*:*:*:*:*:*",
"matchCriteriaId": "86D3F64C-3F27-43E0-B0D4-62CE1E1F4EFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc3:*:*:*:*:*:*",
"matchCriteriaId": "7927713B-5EB0-41EB-86A9-9935775162E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc4:*:*:*:*:*:*",
"matchCriteriaId": "59037296-3143-4FBB-AFF7-D4FE2C85502F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc5:*:*:*:*:*:*",
"matchCriteriaId": "9CA27FD5-7DBF-4C85-80A9-D523B2E4B033",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc6:*:*:*:*:*:*",
"matchCriteriaId": "9711E333-A8E7-4F4B-BCFD-2023E889651A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc7:*:*:*:*:*:*",
"matchCriteriaId": "E04D3358-973B-42A1-8E08-2E3AE947193C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B39BF614-85CD-4C6A-877C-724FB6F5B125",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DD31EA80-D021-4E47-8FB0-E1F23E379EA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0C683054-0275-4A92-B003-9C9A5A03B6E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A25DDBE8-9DA5-4515-AAAF-037D4D201898",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4499A795-2C87-4E0F-BFFB-63E47AE3EEB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1D11D058-0864-415A-97D6-C67BBBEB0E6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.7:*:*:*:*:*:*:*",
"matchCriteriaId": "CF479FF8-8EB2-4436-89EB-FBA3EFA41184",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.8:*:*:*:*:*:*:*",
"matchCriteriaId": "086028C0-0025-479A-8977-A880651D2433",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.9:*:*:*:*:*:*:*",
"matchCriteriaId": "CC3435ED-DAB4-4BC0-AA30-D164258E0F0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.10:*:*:*:*:*:*:*",
"matchCriteriaId": "798809DE-1B1E-4C0D-830B-72C549156645",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:*:*:*:*:*:*:*",
"matchCriteriaId": "5480B0CF-B462-4172-9F6E-D94B451CF869",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc1:*:*:*:*:*:*",
"matchCriteriaId": "17ACC235-F2C3-42B5-9244-DCCDC4704BA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc2:*:*:*:*:*:*",
"matchCriteriaId": "EA4BC3D2-70FF-4EED-9DC8-B378F88F4D36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc3:*:*:*:*:*:*",
"matchCriteriaId": "A7ACC123-06D8-4A3F-8730-AA7FF6EFBD35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc4:*:*:*:*:*:*",
"matchCriteriaId": "3F6891F7-2B07-4A96-A0D6-AC528B7E0DD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc5:*:*:*:*:*:*",
"matchCriteriaId": "657BCE5D-DC8B-4BE2-AED8-BC52C738F999",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc6:*:*:*:*:*:*",
"matchCriteriaId": "160E9402-241A-44AE-A92A-9629CA656F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D2CD9FB1-AB83-427A-8923-97ED7ADFD63D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1B2E5B71-BF7F-426A-BE5E-0481010725E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4540D1DF-9ED8-45DB-B868-BD195DDCB8B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CB33FE45-7254-4F8D-AC22-0FEA559A8567",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.5:*:*:*:*:*:*:*",
"matchCriteriaId": "52E43E71-2F62-40E5-BF56-15D26806B7AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B422B61F-AE80-4F86-AACA-F86EE47983A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.7:*:*:*:*:*:*:*",
"matchCriteriaId": "BDA2DB37-7A2D-400D-889E-36175DCDF3FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.8:*:*:*:*:*:*:*",
"matchCriteriaId": "40C2CAA9-8EAF-43C7-B0CE-D1A09663C49B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AA1CA35C-5F52-4095-B0EA-7A22481F4360",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.10:*:*:*:*:*:*:*",
"matchCriteriaId": "EDB46950-0C6F-4A13-9425-3FCAF3C09A75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.11:*:*:*:*:*:*:*",
"matchCriteriaId": "55189BDD-5644-4B48-A94E-E71977F3376F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.12:*:*:*:*:*:*:*",
"matchCriteriaId": "D1DACBA1-004B-4416-A52B-235A607181AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.13:*:*:*:*:*:*:*",
"matchCriteriaId": "45B536B6-FE29-4775-B4A6-B198A9475B19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*",
"matchCriteriaId": "DBE26099-6D2C-4FAF-B15C-CBF985D59171",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F2C193FF-3723-4BE9-8787-DED7D455FA8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F874FE6A-968D-47E1-900A-E154E41EDAF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*",
"matchCriteriaId": "14B7B8AE-CE83-4F0E-9138-6F165D97C19F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*",
"matchCriteriaId": "B434ACFB-2B01-491A-B2E5-40FA0E11B3B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc6:*:*:*:*:*:*",
"matchCriteriaId": "CF88CADB-AB36-4633-807B-44AB3145F748",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc7:*:*:*:*:*:*",
"matchCriteriaId": "9D9830C2-0E2D-4A5A-B78F-5D4A4721B268",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments."
},
{
"lang": "es",
"value": "La funci\u00f3n ip6_frag_queue en net/ipv6/reassembly.c en el kernel de Linux antes de v2.6.36 permite a atacantes remotos evitar las restricciones de red a trav\u00e9s de la superposici\u00f3n de fragmentos IPv6.\r\n"
}
],
"id": "CVE-2012-4444",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-12-21T11:47:36.533",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36"
},
{
"source": "secalert@redhat.com",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=70789d7052239992824628db8133de08dc78e593"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00000.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1580.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2012/11/09/2"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/USN-1660-1"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/USN-1661-1"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=874835"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593"
},
{
"source": "secalert@redhat.com",
"url": "https://media.blackhat.com/bh-eu-12/Atlasis/bh-eu-12-Atlasis-Attacking_IPv6-WP.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=70789d7052239992824628db8133de08dc78e593"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1580.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2012/11/09/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-1660-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-1661-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=874835"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://media.blackhat.com/bh-eu-12/Atlasis/bh-eu-12-Atlasis-Attacking_IPv6-WP.pdf"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…