Summary: | Kernel: iptables: --syn flag bypass (CVE-2012-6638) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Kernel | Assignee: | Gentoo Kernel Security <security-kernel> |
Status: | RESOLVED OBSOLETE | ||
Severity: | normal | CC: | arthur, kernel |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() CVE-2012-6638 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6638): The tcp_rcv_state_process function in net/ipv4/tcp_input.c in the Linux kernel before 3.2.24 allows remote attackers to cause a denial of service (kernel resource consumption) via a flood of SYN+FIN TCP packets, a different vulnerability than CVE-2012-2663. This seems to affect "Linux kernel before 3.2.24". Is it still relevant for Gentoo? There are no longer any 2.x or <3.2.24 kernels available in the repository with the exception of sys-kernel/xbox-sources which is unsupported by security. |