var-201001-0163
Vulnerability from variot
The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.32.4, when network namespaces are enabled, allows remote attackers to cause a denial of service (NULL pointer dereference) via an invalid IPv6 jumbogram, a related issue to CVE-2007-4567. Linux The kernel IPv6 jumbogram There is a vulnerability in the processing of. Attackers can exploit this issue to cause a kernel panic, denying service to legitimate users. ----------------------------------------------------------------------
Secunia integrated with Microsoft WSUS http://secunia.com/blog/71/
TITLE: Fedora update for kernel
SECUNIA ADVISORY ID: SA38168
VERIFY ADVISORY: http://secunia.com/advisories/38168/
DESCRIPTION: Fedora has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
Successful exploitation requires that network namespaces are enabled.
SOLUTION: Apply updated packages via the yum utility ("yum update kernel").
ORIGINAL ADVISORY: FEDORA-2010-0823: https://admin.fedoraproject.org/updates/F12/FEDORA-2010-0823
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201001-0163", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "kernel", "scope": "lt", "trust": 1.8, "vendor": "linux", "version": "2.6.32.4" }, { "model": "kernel", "scope": "eq", "trust": 0.9, "vendor": "linux", "version": "2.6.32.3" }, { "model": "kernel", "scope": "eq", "trust": 0.9, "vendor": "linux", "version": "2.6.32" }, { "model": "kernel", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "2.6.32.2" }, { "model": "kernel", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "2.6.32.1" }, { "model": "kernel", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "2.6.32.4" }, { "model": "river systems linux", "scope": "eq", "trust": 0.3, "vendor": "wind", "version": "3.1" }, { "model": "river systems linux", "scope": "eq", "trust": 0.3, "vendor": "wind", "version": "3.0" }, { "model": "river systems linux", "scope": "eq", "trust": 0.3, "vendor": "wind", "version": "0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.315" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31.11" }, { "model": "kernel -rc7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31" }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30.1" }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.29.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.29.1" }, { "model": "kernel -git8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.29" }, { "model": "kernel -git14", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.29" }, { "model": "kernel -git1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.29" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.29" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.9" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.1" }, { "model": "kernel -rc7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28" }, { "model": "kernel -git7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.276" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.273" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.2712" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.24" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.14" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.12" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "kernel 2.6.33-rc4", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.32-rc8", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.32-rc7", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.32-rc5", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.32-rc4", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.32-rc3", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.32-rc2", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.32-rc1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31.1" }, { "model": "kernel 2.6.31-rc9", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.31-rc8", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.31-rc5-git3", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.31-rc4", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.31-rc2", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.31-git11", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30.3" }, { "model": "kernel 2.6.29-rc2-git1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.29-rc2", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.29-rc1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.10" }, { "model": "kernel 2.6.27-git3", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "desktop video device", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2010-0006" }, { "db": "CNNVD", "id": "CNNVD-201001-263" }, { "db": "JVNDB", "id": "JVNDB-2010-001087" }, { "db": "BID", "id": "37810" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.6.32.4", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2010-0006" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Olli Jarva\nTuomo Untinen", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-263" } ], "trust": 0.6 }, "cve": "CVE-2010-0006", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/severity#" }, "@id": "https://www.variotdbs.pl/ref/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2010-0006", "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.8, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2010-0006", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201001-263", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2010-0006" }, { "db": "CNNVD", "id": "CNNVD-201001-263" }, { "db": "JVNDB", "id": "JVNDB-2010-001087" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.32.4, when network namespaces are enabled, allows remote attackers to cause a denial of service (NULL pointer dereference) via an invalid IPv6 jumbogram, a related issue to CVE-2007-4567. Linux The kernel IPv6 jumbogram There is a vulnerability in the processing of. \nAttackers can exploit this issue to cause a kernel panic, denying service to legitimate users. ----------------------------------------------------------------------\n\n\n\nSecunia integrated with Microsoft WSUS \nhttp://secunia.com/blog/71/\n\n\n\n----------------------------------------------------------------------\n\nTITLE:\nFedora update for kernel\n\nSECUNIA ADVISORY ID:\nSA38168\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/38168/\n\nDESCRIPTION:\nFedora has issued an update for the kernel. This fixes a\nvulnerability, which can be exploited by malicious people to cause a\nDoS (Denial of Service). \n\nSuccessful exploitation requires that network namespaces are enabled. \n\nSOLUTION:\nApply updated packages via the yum utility (\"yum update kernel\"). \n\nORIGINAL ADVISORY:\nFEDORA-2010-0823:\nhttps://admin.fedoraproject.org/updates/F12/FEDORA-2010-0823\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2010-0006" }, { "db": "JVNDB", "id": "JVNDB-2010-001087" }, { "db": "BID", "id": "37810" }, { "db": "PACKETSTORM", "id": "85473" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "37810", "trust": 2.7 }, { "db": "NVD", "id": "CVE-2010-0006", "trust": 2.7 }, { "db": "OSVDB", "id": "61876", "trust": 2.4 }, { "db": "SECUNIA", "id": "38168", "trust": 1.7 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2010/01/14/2", "trust": 1.6 }, { "db": "SECUNIA", "id": "38333", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2010-001087", "trust": 0.8 }, { "db": "FEDORA", "id": "FEDORA-2010-0919", "trust": 0.6 }, { "db": "NSFOCUS", "id": "14412", "trust": 0.6 }, { "db": "MLIST", "id": "[LINUX-NETDEV] 20100114 [PATCH]: IPV6: SKB_DST() CAN BE NULL IN IPV6_HOP_JUMBO().", "trust": 0.6 }, { "db": "MLIST", "id": "[OSS-SECURITY] 20100114 CVE-2010-0006 - KERNEL: IPV6: SKB_DST() CAN BE NULL IN IPV6_HOP_JUMBO()", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201001-263", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "85473", "trust": 0.1 } ], "sources": [ { "db": "NVD", "id": "CVE-2010-0006" }, { "db": "CNNVD", "id": "CNNVD-201001-263" }, { "db": "JVNDB", "id": "JVNDB-2010-001087" }, { "db": "BID", "id": "37810" }, { "db": "PACKETSTORM", "id": "85473" } ] }, "id": "VAR-201001-0163", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.3857143 }, "last_update_date": "2021-12-18T21:59:59.281000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "ChangeLog-2.6.32.4", "trust": 0.8, "url": "http://www.kernel.org/pub/linux/kernel/v2.6/changelog-2.6.32.4" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-001087" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.8 } ], "sources": [ { "db": "NVD", "id": "CVE-2010-0006" }, { "db": "JVNDB", "id": "JVNDB-2010-001087" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.securityfocus.com/bid/37810" }, { "trust": 2.4, "url": "http://www.osvdb.org/61876" }, { "trust": 1.9, "url": "http://marc.info/?l=linux-netdev\u0026m=126343325807340\u0026w=2" }, { "trust": 1.6, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-january/034250.html" }, { "trust": 1.6, "url": "http://secunia.com/advisories/38333" }, { "trust": 1.6, "url": "http://www.openwall.com/lists/oss-security/2010/01/14/2" }, { "trust": 1.6, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2570a4f5428bcdb1077622342181755741e7fa60" }, { "trust": 1.6, "url": "http://www.kernel.org/pub/linux/kernel/v2.6/changelog-2.6.32.4" }, { "trust": 1.6, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=555217" }, { "trust": 1.6, "url": "http://secunia.com/advisories/38168" }, { "trust": 1.6, "url": "http://bugs.gentoo.org/show_bug.cgi?id=300951" }, { "trust": 1.6, "url": "http://security-tracker.debian.org/tracker/cve-2010-0006" }, { "trust": 1.6, "url": "http://cert.fi/en/reports/2010/vulnerability341748.html" }, { "trust": 1.0, "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html" }, { "trust": 0.8, "url": "http://www.cert.fi/en/reports/2010/vulnerability341748.html" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0006" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu571860/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0006" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/14412" }, { "trust": 0.3, "url": "http://www.kernel.org/" }, { "trust": 0.3, "url": "http://support.avaya.com/css/p8/documents/100141285" }, { "trust": 0.3, "url": "http://www.ubuntu.com/usn/usn-894-1" }, { "trust": 0.1, "url": "http://secunia.com/blog/71/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "https://admin.fedoraproject.org/updates/f12/fedora-2010-0823" }, { "trust": 0.1, "url": "http://secunia.com/advisories/38168/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "NVD", "id": "CVE-2010-0006" }, { "db": "CNNVD", "id": "CNNVD-201001-263" }, { "db": "JVNDB", "id": "JVNDB-2010-001087" }, { "db": "BID", "id": "37810" }, { "db": "PACKETSTORM", "id": "85473" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "NVD", "id": "CVE-2010-0006" }, { "db": "CNNVD", "id": "CNNVD-201001-263" }, { "db": "JVNDB", "id": "JVNDB-2010-001087" }, { "db": "BID", "id": "37810" }, { "db": "PACKETSTORM", "id": "85473" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-01-26T18:30:00", "db": "NVD", "id": "CVE-2010-0006" }, { "date": "2010-01-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201001-263" }, { "date": "2010-02-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-001087" }, { "date": "2010-01-14T00:00:00", "db": "BID", "id": "37810" }, { "date": "2010-01-21T10:22:03", "db": "PACKETSTORM", "id": "85473" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-11-13T16:41:00", "db": "NVD", "id": "CVE-2010-0006" }, { "date": "2010-01-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201001-263" }, { "date": "2014-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-001087" }, { "date": "2015-05-07T17:09:00", "db": "BID", "id": "37810" }, { "date": null, "db": "PACKETSTORM", "id": "85473" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-263" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Linux Kernel \u0027ipv6_hop_jumbo()\u0027 Remote denial of service vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-263" }, { "db": "BID", "id": "37810" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-263" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.