Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-1188

Опубликовано: 31 мар. 2010
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.1

Описание

Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

hardy

not-affected

intrepid

not-affected

jaunty

not-affected

karmic

not-affected

lucid

not-affected

upstream

not-affected

Показывать по

РелизСтатусПримечание
dapper

released

2.6.15-55.84
devel

DNE

hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

DNE

lucid

DNE

upstream

not-affected

Показывать по

EPSS

Процентиль: 87%
0.03629
Низкий

7.1 High

CVSS2

Связанные уязвимости

redhat
больше 18 лет назад

Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.

nvd
около 15 лет назад

Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.

debian
около 15 лет назад

Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kern ...

github
около 3 лет назад

Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.

oracle-oval
около 15 лет назад

ELSA-2010-0178: Oracle Enterprise Linux 5.5 kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 87%
0.03629
Низкий

7.1 High

CVSS2