Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-0216 (GCVE-0-2013-0216)
Vulnerability from cvelistv5 – Published: 2013-02-18 02:00 – Updated: 2024-08-06 14:18- n/a
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T14:18:09.642Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "MDVSA-2013:176",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=910883"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/torvalds/linux/commit/48856286b64e4b66ec62b94e504d0b29c1ade664"
},
{
"name": "openSUSE-SU-2013:0395",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00004.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=48856286b64e4b66ec62b94e504d0b29c1ade664"
},
{
"name": "SUSE-SU-2013:0674",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.8"
},
{
"name": "openSUSE-SU-2013:0925",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
},
{
"name": "[oss-security] 20130205 Xen Security Advisory 39 (CVE-2013-0216,CVE-2013-0217) - Linux netback DoS via malicious guest ring.",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2013/02/05/12"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-02-05T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (loop) by triggering ring pointer corruption."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-03-08T10:00:00.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "MDVSA-2013:176",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=910883"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/torvalds/linux/commit/48856286b64e4b66ec62b94e504d0b29c1ade664"
},
{
"name": "openSUSE-SU-2013:0395",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00004.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=48856286b64e4b66ec62b94e504d0b29c1ade664"
},
{
"name": "SUSE-SU-2013:0674",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.8"
},
{
"name": "openSUSE-SU-2013:0925",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
},
{
"name": "[oss-security] 20130205 Xen Security Advisory 39 (CVE-2013-0216,CVE-2013-0217) - Linux netback DoS via malicious guest ring.",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2013/02/05/12"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2013-0216",
"datePublished": "2013-02-18T02:00:00.000Z",
"dateReserved": "2012-12-06T00:00:00.000Z",
"dateUpdated": "2024-08-06T14:18:09.642Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CERTA-2013-AVI-259
Vulnerability from certfr_avis - Published: 2013-04-18 - Updated: 2013-04-18
De multiples vulnérabilités ont été corrigées dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Long Life version 5.9 server | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS version 5.9.z server | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux version 5 server | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop version 5 client |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Long Life version 5.9 server",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS version 5.9.z server",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux version 5 server",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop version 5 client",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-0231",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0231"
},
{
"name": "CVE-2012-6537",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6537"
},
{
"name": "CVE-2013-1826",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1826"
},
{
"name": "CVE-2013-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0216"
},
{
"name": "CVE-2012-6546",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6546"
},
{
"name": "CVE-2012-6547",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6547"
},
{
"name": "CVE-2012-6542",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6542"
}
],
"initial_release_date": "2013-04-18T00:00:00",
"last_revision_date": "2013-04-18T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2013-0747 du 16 avril 2013",
"url": "https://rhn.redhat.com/errata/RHSA-2013-0747.html"
}
],
"reference": "CERTA-2013-AVI-259",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-04-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans le noyau \u003cspan\nclass=\"textit\"\u003eLinux\u003c/span\u003e de \u003cspan class=\"textit\"\u003eRed Hat\u003c/span\u003e.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2013-0747 du 16 avril 2013",
"url": null
}
]
}
CERTA-2013-AVI-496
Vulnerability from certfr_avis - Published: 2013-08-29 - Updated: 2013-08-29
De multiples vulnérabilités ont été corrigées dans Citrix XenClient XT. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "XenClient XT versions ant\u00e9rieures \u00e0 3.1.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "XenClient XT versions ant\u00e9rieures \u00e0 2.1.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-2195",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2195"
},
{
"name": "CVE-2013-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0217"
},
{
"name": "CVE-2013-0231",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0231"
},
{
"name": "CVE-2013-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0216"
},
{
"name": "CVE-2013-1432",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1432"
},
{
"name": "CVE-2013-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2194"
},
{
"name": "CVE-2013-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2196"
},
{
"name": "CVE-2013-2601",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2601"
}
],
"initial_release_date": "2013-08-29T00:00:00",
"last_revision_date": "2013-08-29T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00035 du 01 juillet 2013",
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00035\u0026languageid=en-fr"
}
],
"reference": "CERTA-2013-AVI-496",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-08-29T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eCitrix XenClient XT\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire, un d\u00e9ni de\nservice et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Citrix XenClient XT",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX138633 du 28 ao\u00fbt 2013",
"url": "http://support.citrix.com/article/CTX138633"
}
]
}
CERTA-2013-AVI-375
Vulnerability from certfr_avis - Published: 2013-06-26 - Updated: 2013-06-26
De multiples vulnérabilités ont été corrigées dans le noyau Linux de Mandriva. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Mandriva Business Server 1
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eMandriva Business Server 1\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-2546",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2546"
},
{
"name": "CVE-2013-3228",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3228"
},
{
"name": "CVE-2013-1979",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1979"
},
{
"name": "CVE-2013-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0217"
},
{
"name": "CVE-2013-0290",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0290"
},
{
"name": "CVE-2013-3225",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3225"
},
{
"name": "CVE-2013-3235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3235"
},
{
"name": "CVE-2013-0914",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0914"
},
{
"name": "CVE-2013-3233",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3233"
},
{
"name": "CVE-2013-3223",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3223"
},
{
"name": "CVE-2013-1929",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1929"
},
{
"name": "CVE-2013-1860",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1860"
},
{
"name": "CVE-2013-2635",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2635"
},
{
"name": "CVE-2013-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0216"
},
{
"name": "CVE-2013-1798",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1798"
},
{
"name": "CVE-2013-2548",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2548"
},
{
"name": "CVE-2013-2634",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2634"
},
{
"name": "CVE-2013-3234",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3234"
},
{
"name": "CVE-2013-3222",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3222"
},
{
"name": "CVE-2013-2094",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2094"
},
{
"name": "CVE-2013-1767",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1767"
},
{
"name": "CVE-2012-6548",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6548"
},
{
"name": "CVE-2013-1797",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1797"
},
{
"name": "CVE-2013-3231",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3231"
},
{
"name": "CVE-2013-1792",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1792"
},
{
"name": "CVE-2013-2547",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2547"
},
{
"name": "CVE-2013-3229",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3229"
},
{
"name": "CVE-2013-0311",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0311"
},
{
"name": "CVE-2013-1796",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1796"
},
{
"name": "CVE-2013-2596",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2596"
},
{
"name": "CVE-2013-2141",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2141"
},
{
"name": "CVE-2013-0228",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0228"
},
{
"name": "CVE-2013-3227",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3227"
},
{
"name": "CVE-2012-6547",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6547"
},
{
"name": "CVE-2013-3232",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3232"
},
{
"name": "CVE-2012-5532",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5532"
},
{
"name": "CVE-2012-6549",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6549"
},
{
"name": "CVE-2013-3224",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3224"
},
{
"name": "CVE-2012-2669",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2669"
},
{
"name": "CVE-2013-1848",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1848"
},
{
"name": "CVE-2013-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2146"
},
{
"name": "CVE-2013-1763",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1763"
}
],
"initial_release_date": "2013-06-26T00:00:00",
"last_revision_date": "2013-06-26T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDVSA-2013:176 du 24 juin 2013",
"url": "http://www.mandriva.com/fr/support/security/advisories/mbs1/MDVSA-2013:176/"
}
],
"reference": "CERTA-2013-AVI-375",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-06-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans le noyau Linux de\n\u003cspan class=\"textit\"\u003eMandriva\u003c/span\u003e. Certaines d\u0027entre elles permettent\n\u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, un d\u00e9ni de\nservice et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Mandriva",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDVSA-2013:176 du 24 juin 2013",
"url": null
}
]
}
CERTA-2013-AVI-158
Vulnerability from certfr_avis - Published: 2013-02-28 - Updated: 2013-02-28
De multiples vulnérabilités ont été corrigées dans Citrix XenServer. Elles permettent à un attaquant de provoquer un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Citrix XenServer versions 6.1 et antérieures
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eCitrix XenServer versions 6.1 et ant\u00e9rieures\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0217"
},
{
"name": "CVE-2013-0231",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0231"
},
{
"name": "CVE-2013-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0216"
},
{
"name": "CVE-2013-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0215"
},
{
"name": "CVE-2013-0153",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0153"
}
],
"initial_release_date": "2013-02-28T00:00:00",
"last_revision_date": "2013-02-28T00:00:00",
"links": [],
"reference": "CERTA-2013-AVI-158",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-02-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eCitrix XenServer\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Citrix XenServer",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX136540 du 26 f\u00e9vrier 2013",
"url": "http://support.citrix.com/article/CTX136540"
}
]
}
CERTA-2013-AVI-189
Vulnerability from certfr_avis - Published: 2013-03-19 - Updated: 2013-03-19
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Ubuntu 12.04 LTS
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eUbuntu 12.04 LTS\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0217"
},
{
"name": "CVE-2013-0231",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0231"
},
{
"name": "CVE-2013-0268",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0268"
},
{
"name": "CVE-2013-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0216"
},
{
"name": "CVE-2013-0349",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0349"
},
{
"name": "CVE-2013-1774",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1774"
},
{
"name": "CVE-2013-0313",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0313"
},
{
"name": "CVE-2013-0311",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0311"
},
{
"name": "CVE-2013-0228",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0228"
},
{
"name": "CVE-2013-0190",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0190"
}
],
"initial_release_date": "2013-03-19T00:00:00",
"last_revision_date": "2013-03-19T00:00:00",
"links": [],
"reference": "CERTA-2013-AVI-189",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-03-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans le noyau Linux\nd\u0027\u003cspan class=\"textit\"\u003eUbuntu\u003c/span\u003e. Certaines d\u0027entre elles permettent\n\u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, un d\u00e9ni de\nservice et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-1767-1 du 18 mars 2013",
"url": "http://www.ubuntu.com/usn/usn-1767-1/"
}
]
}
CERTFR-2019-AVI-230
Vulnerability from certfr_avis - Published: 2019-05-17 - Updated: 2019-05-17
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP4-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-EXTRA",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-1979",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1979"
},
{
"name": "CVE-2013-0231",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0231"
},
{
"name": "CVE-2013-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0216"
},
{
"name": "CVE-2019-9213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9213"
},
{
"name": "CVE-2012-3412",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3412"
},
{
"name": "CVE-2012-3430",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3430"
},
{
"name": "CVE-2013-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0160"
}
],
"initial_release_date": "2019-05-17T00:00:00",
"last_revision_date": "2019-05-17T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-230",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-05-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-201914051-1 du 16 mai 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914051-1/"
}
]
}
CERTA-2013-AVI-098
Vulnerability from certfr_avis - Published: 2013-02-06 - Updated: 2013-02-06
De multiples vulnérabilités ont été corrigées dans Xen. Elles permettent à un attaquant de provoquer un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Xen branche 4.1.x",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
},
{
"description": "Xen branche 4.2.x",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0217"
},
{
"name": "CVE-2013-0231",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0231"
},
{
"name": "CVE-2013-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0216"
},
{
"name": "CVE-2013-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0215"
},
{
"name": "CVE-2013-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0154"
},
{
"name": "CVE-2013-0153",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0153"
}
],
"initial_release_date": "2013-02-06T00:00:00",
"last_revision_date": "2013-02-06T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Xen 43 du 05 f\u00e9vrier 2013",
"url": "http://lists.xen.org/archives/html/xen-announce/2013-02/msg00003.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Xen 38 du 05 f\u00e9vrier 2013",
"url": "http://lists.xen.org/archives/html/xen-announce/2013-02/msg00000.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Xen 39 du 05 f\u00e9vrier 2013",
"url": "http://lists.xen.org/archives/html/xen-announce/2013-02/msg00001.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Xen 37 du 04 f\u00e9vrier 2013",
"url": "http://lists.xen.org/archives/html/xen-announce/2013-01/msg00000.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Xen 36 du 05 f\u00e9vrier 2013",
"url": "http://lists.xen.org/archives/html/xen-announce/2013-02/msg00002.html"
}
],
"reference": "CERTA-2013-AVI-098",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-02-06T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eXen\u003c/span\u003e. Elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Xen",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Xen du 04 f\u00e9vrier 2013",
"url": null
}
]
}
GSD-2013-0216
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2013-0216",
"description": "The Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (loop) by triggering ring pointer corruption.",
"id": "GSD-2013-0216",
"references": [
"https://www.suse.com/security/cve/CVE-2013-0216.html",
"https://access.redhat.com/errata/RHSA-2013:0747",
"https://linux.oracle.com/cve/CVE-2013-0216.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2013-0216"
],
"details": "The Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (loop) by triggering ring pointer corruption.",
"id": "GSD-2013-0216",
"modified": "2023-12-13T01:22:14.936139Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0216",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (loop) by triggering ring pointer corruption."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00004.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00004.html"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=48856286b64e4b66ec62b94e504d0b29c1ade664",
"refsource": "MISC",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=48856286b64e4b66ec62b94e504d0b29c1ade664"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.8",
"refsource": "MISC",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.8"
},
{
"name": "http://www.openwall.com/lists/oss-security/2013/02/05/12",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2013/02/05/12"
},
{
"name": "https://github.com/torvalds/linux/commit/48856286b64e4b66ec62b94e504d0b29c1ade664",
"refsource": "MISC",
"url": "https://github.com/torvalds/linux/commit/48856286b64e4b66ec62b94e504d0b29c1ade664"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=910883",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=910883"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.7.8",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0216"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (loop) by triggering ring pointer corruption."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/torvalds/linux/commit/48856286b64e4b66ec62b94e504d0b29c1ade664",
"refsource": "CONFIRM",
"tags": [
"Exploit",
"Patch"
],
"url": "https://github.com/torvalds/linux/commit/48856286b64e4b66ec62b94e504d0b29c1ade664"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=910883",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=910883"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.8",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.8"
},
{
"name": "[oss-security] 20130205 Xen Security Advisory 39 (CVE-2013-0216,CVE-2013-0217) - Linux netback DoS via malicious guest ring.",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2013/02/05/12"
},
{
"name": "openSUSE-SU-2013:0395",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00004.html"
},
{
"name": "SUSE-SU-2013:0674",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html"
},
{
"name": "openSUSE-SU-2013:0925",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
},
{
"name": "MDVSA-2013:176",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=48856286b64e4b66ec62b94e504d0b29c1ade664",
"refsource": "MISC",
"tags": [],
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=48856286b64e4b66ec62b94e504d0b29c1ade664"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 5.2,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 4.4,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T00:27Z",
"publishedDate": "2013-02-18T04:41Z"
}
}
}
FKIE_CVE-2013-0216
Vulnerability from fkie_nvd - Published: 2013-02-18 04:41 - Updated: 2025-04-11 00:51{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D73089E5-7EBB-403A-A689-F6111BFEBCE5",
"versionEndIncluding": "3.7.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D30AEC07-3CBD-4F4F-9646-BEAA1D98750B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C2AA8E68-691B-499C-AEDD-3C0BFFE70044",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "9440475B-5960-4066-A204-F30AAFC87846",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "53BCFBFB-6AF0-4525-8623-7633CC5E17DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*",
"matchCriteriaId": "6ED4E86A-74F0-436A-BEB4-3F4EE93A5421",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*",
"matchCriteriaId": "BF0365B0-8E16-4F30-BD92-5DD538CC8135",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*",
"matchCriteriaId": "079505E8-2942-4C33-93D1-35ADA4C39E72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38989541-2360-4E0A-AE5A-3D6144AA6114",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4E51646B-7A0E-40F3-B8C9-239C1DA81DD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "42A8A507-F8E2-491C-A144-B2448A1DB26E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "901FC6F3-2C2A-4112-AE27-AB102BBE8DEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "203AD334-DB9F-41B0-A4D1-A6C158EF8C40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B3611753-E440-410F-8250-600C996A4B8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9739BB47-EEAF-42F1-A557-2AE2EA9526A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "5A95E3BB-0AFC-4C2E-B9BE-C975E902A266",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "482A6C9A-9B8E-4D1C-917A-F16370745E7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D87357-63E0-41D0-9F02-1BCBF9A77E63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "3765A2D6-2D78-4FB1-989E-D5106BFA3F5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F54257DB-7023-43C4-AC4D-9590B815CD92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "61FF5FCD-A4A1-4803-AC53-320A4C838AF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "9F096553-064F-46A2-877B-F32F163A0F49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "C0D762D1-E3AD-40EA-8D39-83EEB51B5E85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "A6187D19-7148-4B87-AD7E-244FF9EE0FA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "99AC64C2-E391-485C-9CD7-BA09C8FA5E63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "8CDA5E95-7805-441B-BEF7-4448EA45E964",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "51561053-6C28-4F38-BC9B-3F7A7508EB72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "118F4A5B-C498-4FC3-BE28-50D18EBE4F22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "BD38EBE6-FE1A-4B55-9FB5-07952253B7A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*",
"matchCriteriaId": "3A491E47-82AD-4055-9444-2EC0D6715326",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*",
"matchCriteriaId": "13C5FD16-23B6-467F-9438-5B554922F974",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*",
"matchCriteriaId": "9C67235F-5B51-4BF7-89EC-4810F720246F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*",
"matchCriteriaId": "08405DEF-05F4-45F0-AC95-DBF914A36D93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*",
"matchCriteriaId": "1A7B9C4B-4A41-4175-9F07-191C1EE98C1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*",
"matchCriteriaId": "B306E0A8-4D4A-4895-8128-A500D30A7E0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*",
"matchCriteriaId": "295C839A-F34E-4853-A926-55EABC639412",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*",
"matchCriteriaId": "2AFD5F49-7EF9-4CFE-95BD-8FD19B500B0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*",
"matchCriteriaId": "00B3DDDD-B2F6-4753-BA38-65A24017857D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*",
"matchCriteriaId": "33FCD39E-F4BF-432D-9CF9-F195CF5844F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*",
"matchCriteriaId": "C7308690-CB0D-4758-B80F-D2ADCD2A9D66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*",
"matchCriteriaId": "313A470B-8A2B-478A-82B5-B27D2718331C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*",
"matchCriteriaId": "83FF021E-07E3-41CC-AAE8-D99D7FF24B9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*",
"matchCriteriaId": "F72412E3-8DA9-4CC9-A426-B534202ADBA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*",
"matchCriteriaId": "FCAA9D7A-3C3E-4C0B-9D38-EA80E68C2E46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*",
"matchCriteriaId": "4A9E3AE5-3FCF-4CBB-A30B-082BCFBFB0CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*",
"matchCriteriaId": "CF715657-4C3A-4392-B85D-1BBF4DE45D89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*",
"matchCriteriaId": "4B63C618-AC3D-4EF7-AFDF-27B9BF482B78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*",
"matchCriteriaId": "C33DA5A9-5E40-4365-9602-82FB4DCD15B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*",
"matchCriteriaId": "EFAFDB74-40BD-46FA-89AC-617EB2C7160B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*",
"matchCriteriaId": "CF5F17DA-30A7-40CF-BD7C-CEDF06D64617",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*",
"matchCriteriaId": "71A276F5-BD9D-4C1B-90DF-9B0C15B6F7DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*",
"matchCriteriaId": "F8F6EBEC-3C29-444B-BB85-6EF239B59EC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3DFFE5A6-6A67-4992-84A3-C0F05FACDEAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "13BBD2A3-AE10-48B9-8776-4FB1CAC37D44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "B25680CC-8918-4F27-8D7E-A6579215450B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*",
"matchCriteriaId": "92C48B4C-410C-4BA8-A28A-B2E928320FCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*",
"matchCriteriaId": "CB447523-855B-461E-8197-95169BE86EB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B155BBDF-6DF6-4FF5-9C41-D8A5266DCC67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "28476DEC-9630-4B40-9D4D-9BC151DC4CA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5646880A-2355-4BDD-89E7-825863A0311F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7FF99148-267A-46F8-9927-A9082269BAF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A783C083-5D9C-48F9-B5A6-A97A9604FB19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "2B817A24-03AC-46CD-BEFA-505457FD2A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "51CF1BCE-090E-4B70-BA16-ACB74411293B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "187AAD67-10D7-4B57-B4C6-00443E246AF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F341CE88-C5BC-4CDD-9CB5-B6BAD7152E63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "37ACE2A6-C229-4236-8E9F-235F008F3AA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D3220B70-917F-4F9F-8A3B-2BF581281E8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "99372D07-C06A-41FA-9843-6D57F99AB5AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "2B9DC110-D260-4DB4-B8B0-EF1D160ADA07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*",
"matchCriteriaId": "6192FE84-4D53-40D4-AF61-78CE7136141A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*",
"matchCriteriaId": "42FEF3CF-1302-45EB-89CC-3786FE4BAC1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*",
"matchCriteriaId": "AE6A6B58-2C89-4DE4-BA57-78100818095C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*",
"matchCriteriaId": "1D467F87-2F13-4D26-9A93-E0BA526FEA24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FE348F7B-02DE-47D5-8011-F83DA9426021",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E91594EA-F0A3-41B3-A9C6-F7864FC2F229",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9E1ECCDB-0208-48F6-B44F-16CC0ECE3503",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA8B5DE-372E-47E0-A0F6-BE286D509CC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9A1CA083-2CF8-45AE-9E15-1AA3A8352E3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "19D69A49-5290-4C5F-8157-719AD58D253D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "290BD969-42E7-47B0-B21B-06DE4865432C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "23A9E29E-DE78-4C73-9FBD-C2410F5FC8B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "018434C9-E75F-45CB-A169-DAB4B1D864D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "DC0AC68F-EC58-4C4F-8CBC-A59ECC00CCDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "C123C844-F6D7-471E-A62E-F756042FB1CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "A11C38BB-7FA2-49B0-AAC9-83DB387A06DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "61F3733C-E5F6-4855-B471-DF3FB823613B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "1DDCA75F-9A06-4457-9A45-38A38E7F7086",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "7AEA837E-7864-4003-8DB7-111ED710A7E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "B6FE471F-2D1F-4A1D-A197-7E46B75787E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "FDA9E6AB-58DC-4EC5-A25C-11F9D0B38BF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "DC6B8DB3-B05B-41A2-B091-342D66AAE8F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "958F0FF8-33EF-4A71-A0BD-572C85211DBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA39F48-B02F-4C48-B304-DA9CCA055244",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "1FF841F3-48A7-41D7-9C45-A8170435A5EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "EF506916-A6DC-4B1E-90E5-959492AF55F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "B3CDAD1F-2C6A-48C0-8FAB-C2659373FA25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "4FFE4B22-C96A-43D0-B993-F51EDD9C5E0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "F571CC8B-B212-4553-B463-1DB01D616E8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*",
"matchCriteriaId": "84E3E151-D437-48ED-A529-731EEFF88567",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*",
"matchCriteriaId": "E9E3EA3C-CCA5-4433-86E0-3D02C4757A0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AC4F7D-9FA6-4CF1-B2E9-70BF7D4D177C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*",
"matchCriteriaId": "3CE3A80D-9648-43CC-8F99-D741ED6552BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A98C03-A465-41B4-A551-A26FEC7FFD94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AFB76697-1C2F-48C0-9B14-517EC053D4B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*",
"matchCriteriaId": "BED88DFD-1DC5-4505-A441-44ECDEF0252D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DBFD2ACD-728A-4082-BB6A-A1EF6E58E47D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*",
"matchCriteriaId": "C31B0E51-F62D-4053-B04F-FC4D5BC373D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A914303E-1CB6-4AAD-9F5F-DE5433C4E814",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*",
"matchCriteriaId": "203BBA69-90B2-4C5E-8023-C14180742421",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*",
"matchCriteriaId": "0DBFAB53-B889-4028-AC0E-7E165B152A18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*",
"matchCriteriaId": "FE409AEC-F677-4DEF-8EB7-2C35809043CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "578EC12B-402F-4AD4-B8F8-C9B2CAB06891",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "877002ED-8097-4BB4-BB88-6FC6306C38B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "76294CE3-D72C-41D5-9E0F-B693D0042699",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "916E97D4-1FAB-42F5-826B-653B1C0909A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "33FD2217-C5D0-48C1-AD74-3527127FEF9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "2E92971F-B629-4E0A-9A50-8B235F9704B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "EDD3A069-3829-4EE2-9D5A-29459F29D4C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A4A0964C-CEB2-41D7-A69C-1599B05B6171",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0F960FA6-F904-4A4E-B483-44C70090E9A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "261C1B41-C9E0-414F-8368-51C0C0B8AD38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5CCA261D-2B97-492F-89A0-5F209A804350",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*",
"matchCriteriaId": "1B1C0C68-9194-473F-BE5E-EC7F184899FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*",
"matchCriteriaId": "D7A6AC9E-BEA6-44B0-B3B3-F0F94E32424A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*",
"matchCriteriaId": "16038328-9399-4B85-B777-BA4757D02C9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*",
"matchCriteriaId": "16CA2757-FA8D-43D9-96E8-D3C0EB6E1DEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*",
"matchCriteriaId": "E8CB5481-5EAE-401E-BD7E-D3095CCA9E94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A0F36FAC-141D-476D-84C5-A558C199F904",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "51D64824-25F6-4761-BD6A-29038A143744",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E284C8A1-740F-454D-A774-99CD3A21B594",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C70D72AE-0CBF-4324-9935-57E28EC6279C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F674B06B-7E86-4E41-9126-8152D0DDABAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7039B3EC-8B22-413E-B582-B4BEC6181241",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "35CF1DD2-80B9-4476-8963-5C3EF52B33F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "BFB0B05B-A5CE-4B9C-AE7F-83062868D35B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "D166A66E-7454-47EC-BB56-861A9AFEAFE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "7DA94F50-2A62-4300-BF4D-A342AAE35629",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "252D937B-50DC-444F-AE73-5FCF6203DF27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F6D8EE51-02C1-47BC-A92C-0A8ABEFD28FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "7F20A5D7-3B38-4911-861A-04C8310D5916",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "D472DE3A-71D8-4F40-9DDE-85929A2B047D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*",
"matchCriteriaId": "B2AED943-65A8-4FDB-BBD0-CCEF8682A48C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*",
"matchCriteriaId": "D4640185-F3D8-4575-A71D-4C889A93DE2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*",
"matchCriteriaId": "144CCF7C-025E-4879-B2E7-ABB8E4390BE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*",
"matchCriteriaId": "B6FAA052-0B2B-40CE-8C98-919B8D08A5ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*",
"matchCriteriaId": "4B5A53DE-9C83-4A6B-96F3-23C03BF445D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*",
"matchCriteriaId": "063EB879-CB05-4E33-AA90-9E43516839B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*",
"matchCriteriaId": "2D25764F-4B02-4C65-954E-8C7D6632DE00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*",
"matchCriteriaId": "F31F5BF3-CD0A-465C-857F-273841BCD28A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*",
"matchCriteriaId": "FF302C8A-079B-42B9-B455-CD9083BFA067",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*",
"matchCriteriaId": "744999C0-33D3-4363-B3DB-E0D02CDD3918",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "962B0C45-AB29-4383-AC16-C6E8245D0FF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A0EE126B-74B2-4F79-BFE1-3DC169F3F9B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "392075E0-A9C7-4B4A-90F9-7F1ADFF5EFA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "ECC66968-06F0-4874-A95A-A292C36E45C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5FE986E6-1068-4E1B-8EAB-DF1EAF32B4E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "543E8536-1A8E-4E76-B89F-1B1F9F26FAB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2B45E3-31E1-4B46-85FA-3A84E75B8F84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5AC4A13E-F560-4D01-98A3-E2A2B82EB25B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "942C462A-5398-4BB9-A792-598682E1FEF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "B852F7E0-0282-483D-BB4D-18CB7A4F1392",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "53ED9A31-99CC-41C8-8B72-5B2A9B49AA6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EFD646BC-62F7-47CF-B0BE-768F701F7D9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F43D418E-87C1-4C83-9FF1-4F45B4F452DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "680D0E00-F29A-487C-8770-8E7EAC672B7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2DCA96A4-A836-4E94-A39C-3AD3EA1D9611",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "753C05E3-B603-4E36-B9BA-FAEDCBF62A7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E385C2E0-B9F1-4564-8E6D-56FD9E762405",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "041335D4-05E1-4004-9381-28AAD5994B47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (loop) by triggering ring pointer corruption."
},
{
"lang": "es",
"value": "La funcionalidad Xen netback en el kernel de Linux anterior a v3.7.8 permite a usuarios invitados del OS generar una denegaci\u00f3n de servicio (bucle) mediante una corrupci\u00f3n de puntero."
}
],
"id": "CVE-2013-0216",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 5.2,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 4.4,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-02-18T04:41:50.323",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=48856286b64e4b66ec62b94e504d0b29c1ade664"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00004.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.8"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2013/02/05/12"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=910883"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Patch"
],
"url": "https://github.com/torvalds/linux/commit/48856286b64e4b66ec62b94e504d0b29c1ade664"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=48856286b64e4b66ec62b94e504d0b29c1ade664"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2013/02/05/12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=910883"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
],
"url": "https://github.com/torvalds/linux/commit/48856286b64e4b66ec62b94e504d0b29c1ade664"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-G3G7-52M9-P44Q
Vulnerability from github – Published: 2022-05-05 02:48 – Updated: 2022-05-05 02:48The Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (loop) by triggering ring pointer corruption.
{
"affected": [],
"aliases": [
"CVE-2013-0216"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2013-02-18T04:41:00Z",
"severity": "MODERATE"
},
"details": "The Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (loop) by triggering ring pointer corruption.",
"id": "GHSA-g3g7-52m9-p44q",
"modified": "2022-05-05T02:48:37Z",
"published": "2022-05-05T02:48:37Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0216"
},
{
"type": "WEB",
"url": "https://github.com/torvalds/linux/commit/48856286b64e4b66ec62b94e504d0b29c1ade664"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=910883"
},
{
"type": "WEB",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=48856286b64e4b66ec62b94e504d0b29c1ade664"
},
{
"type": "WEB",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=48856286b64e4b66ec62b94e504d0b29c1ade664"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00004.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
},
{
"type": "WEB",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.8"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2013/02/05/12"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.