ID |
CVE-2013-2224
|
Summary |
A certain Red Hat patch for the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 allows local users to cause a denial of service (invalid free operation and system crash) or possibly gain privileges via a sendmsg system call with the IP_RETOPTS option, as demonstrated by hemlock.c. NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-3552. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 6.9 (as of 13-02-2023 - 04:43) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
LOCAL |
MEDIUM |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
COMPLETE |
COMPLETE |
COMPLETE |
|
cvss-vector
via4
|
AV:L/AC:M/Au:N/C:C/I:C/A:C
|
redhat
via4
|
advisories | | rpms | - kernel-0:2.6.18-348.16.1.el5
- kernel-PAE-0:2.6.18-348.16.1.el5
- kernel-PAE-debuginfo-0:2.6.18-348.16.1.el5
- kernel-PAE-devel-0:2.6.18-348.16.1.el5
- kernel-debug-0:2.6.18-348.16.1.el5
- kernel-debug-debuginfo-0:2.6.18-348.16.1.el5
- kernel-debug-devel-0:2.6.18-348.16.1.el5
- kernel-debuginfo-0:2.6.18-348.16.1.el5
- kernel-debuginfo-common-0:2.6.18-348.16.1.el5
- kernel-devel-0:2.6.18-348.16.1.el5
- kernel-doc-0:2.6.18-348.16.1.el5
- kernel-headers-0:2.6.18-348.16.1.el5
- kernel-kdump-0:2.6.18-348.16.1.el5
- kernel-kdump-debuginfo-0:2.6.18-348.16.1.el5
- kernel-kdump-devel-0:2.6.18-348.16.1.el5
- kernel-xen-0:2.6.18-348.16.1.el5
- kernel-xen-debuginfo-0:2.6.18-348.16.1.el5
- kernel-xen-devel-0:2.6.18-348.16.1.el5
- kernel-0:2.6.32-358.18.1.el6
- kernel-bootwrapper-0:2.6.32-358.18.1.el6
- kernel-debug-0:2.6.32-358.18.1.el6
- kernel-debug-debuginfo-0:2.6.32-358.18.1.el6
- kernel-debug-devel-0:2.6.32-358.18.1.el6
- kernel-debuginfo-0:2.6.32-358.18.1.el6
- kernel-debuginfo-common-i686-0:2.6.32-358.18.1.el6
- kernel-debuginfo-common-ppc64-0:2.6.32-358.18.1.el6
- kernel-debuginfo-common-s390x-0:2.6.32-358.18.1.el6
- kernel-debuginfo-common-x86_64-0:2.6.32-358.18.1.el6
- kernel-devel-0:2.6.32-358.18.1.el6
- kernel-doc-0:2.6.32-358.18.1.el6
- kernel-firmware-0:2.6.32-358.18.1.el6
- kernel-headers-0:2.6.32-358.18.1.el6
- kernel-kdump-0:2.6.32-358.18.1.el6
- kernel-kdump-debuginfo-0:2.6.32-358.18.1.el6
- kernel-kdump-devel-0:2.6.32-358.18.1.el6
- perf-0:2.6.32-358.18.1.el6
- perf-debuginfo-0:2.6.32-358.18.1.el6
- python-perf-0:2.6.32-358.18.1.el6
- python-perf-debuginfo-0:2.6.32-358.18.1.el6
- kernel-0:2.6.32-358.118.1.openstack.el6
- kernel-debug-0:2.6.32-358.118.1.openstack.el6
- kernel-debug-debuginfo-0:2.6.32-358.118.1.openstack.el6
- kernel-debug-devel-0:2.6.32-358.118.1.openstack.el6
- kernel-debuginfo-0:2.6.32-358.118.1.openstack.el6
- kernel-debuginfo-common-x86_64-0:2.6.32-358.118.1.openstack.el6
- kernel-devel-0:2.6.32-358.118.1.openstack.el6
- kernel-doc-0:2.6.32-358.118.1.openstack.el6
- kernel-firmware-0:2.6.32-358.118.1.openstack.el6
- kernel-headers-0:2.6.32-358.118.1.openstack.el6
- perf-0:2.6.32-358.118.1.openstack.el6
- perf-debuginfo-0:2.6.32-358.118.1.openstack.el6
- python-perf-0:2.6.32-358.118.1.openstack.el6
- python-perf-debuginfo-0:2.6.32-358.118.1.openstack.el6
- kernel-0:2.6.32-279.37.2.el6
- kernel-bootwrapper-0:2.6.32-279.37.2.el6
- kernel-debug-0:2.6.32-279.37.2.el6
- kernel-debug-debuginfo-0:2.6.32-279.37.2.el6
- kernel-debug-devel-0:2.6.32-279.37.2.el6
- kernel-debuginfo-0:2.6.32-279.37.2.el6
- kernel-debuginfo-common-i686-0:2.6.32-279.37.2.el6
- kernel-debuginfo-common-ppc64-0:2.6.32-279.37.2.el6
- kernel-debuginfo-common-s390x-0:2.6.32-279.37.2.el6
- kernel-debuginfo-common-x86_64-0:2.6.32-279.37.2.el6
- kernel-devel-0:2.6.32-279.37.2.el6
- kernel-doc-0:2.6.32-279.37.2.el6
- kernel-firmware-0:2.6.32-279.37.2.el6
- kernel-headers-0:2.6.32-279.37.2.el6
- kernel-kdump-0:2.6.32-279.37.2.el6
- kernel-kdump-debuginfo-0:2.6.32-279.37.2.el6
- kernel-kdump-devel-0:2.6.32-279.37.2.el6
- perf-0:2.6.32-279.37.2.el6
- perf-debuginfo-0:2.6.32-279.37.2.el6
- python-perf-0:2.6.32-279.37.2.el6
- python-perf-debuginfo-0:2.6.32-279.37.2.el6
|
|
refmap
via4
|
|
Last major update |
13-02-2023 - 04:43 |
Published |
04-07-2013 - 21:55 |
Last modified |
13-02-2023 - 04:43 |