Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 505684 (CVE-2012-6638) - Kernel: iptables: --syn flag bypass (CVE-2012-6638)
Summary: Kernel: iptables: --syn flag bypass (CVE-2012-6638)
Status: RESOLVED OBSOLETE
Alias: CVE-2012-6638
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Kernel Security
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2014-03-25 12:08 UTC by Agostino Sarubbo
Modified: 2018-04-04 19:35 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-03-25 12:08:12 UTC
CVE-2012-6638 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6638):

he tcp_rcv_state_process function in net/ipv4/tcp_input.c in the Linux kernel before 3.2.24 allows remote 
attackers to cause a denial of service (kernel resource consumption) via a flood of SYN+FIN TCP packets, a 
different vulnerability than CVE-2012-2663.
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2014-08-10 22:07:39 UTC
CVE-2012-6638 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6638):
  The tcp_rcv_state_process function in net/ipv4/tcp_input.c in the Linux
  kernel before 3.2.24 allows remote attackers to cause a denial of service
  (kernel resource consumption) via a flood of SYN+FIN TCP packets, a
  different vulnerability than CVE-2012-2663.
Comment 2 zless 2018-02-23 09:13:52 UTC
This seems to affect "Linux kernel before 3.2.24". Is it still relevant for Gentoo?
Comment 3 Christopher Díaz Riveros (RETIRED) gentoo-dev Security 2018-04-04 19:35:44 UTC
There are no longer any 2.x or <3.2.24 kernels available in the repository with
the exception of sys-kernel/xbox-sources which is unsupported by security.