Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 505684 (CVE-2012-6638)

Summary: Kernel: iptables: --syn flag bypass (CVE-2012-6638)
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: KernelAssignee: Gentoo Kernel Security <security-kernel>
Status: RESOLVED OBSOLETE    
Severity: normal CC: arthur, kernel
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard:
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2014-03-25 12:08:12 UTC
CVE-2012-6638 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6638):

he tcp_rcv_state_process function in net/ipv4/tcp_input.c in the Linux kernel before 3.2.24 allows remote 
attackers to cause a denial of service (kernel resource consumption) via a flood of SYN+FIN TCP packets, a 
different vulnerability than CVE-2012-2663.
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2014-08-10 22:07:39 UTC
CVE-2012-6638 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6638):
  The tcp_rcv_state_process function in net/ipv4/tcp_input.c in the Linux
  kernel before 3.2.24 allows remote attackers to cause a denial of service
  (kernel resource consumption) via a flood of SYN+FIN TCP packets, a
  different vulnerability than CVE-2012-2663.
Comment 2 zless 2018-02-23 09:13:52 UTC
This seems to affect "Linux kernel before 3.2.24". Is it still relevant for Gentoo?
Comment 3 Christopher Díaz Riveros (RETIRED) gentoo-dev Security 2018-04-04 19:35:44 UTC
There are no longer any 2.x or <3.2.24 kernels available in the repository with
the exception of sys-kernel/xbox-sources which is unsupported by security.