First published: Fri Dec 02 2011(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.18-371.8.1.el5 | 0:2.6.18-371.8.1.el5 |
redhat/kernel | <0:2.6.18-348.27.1.el5 | 0:2.6.18-348.27.1.el5 |
Linux Kernel | <3.0.38 | |
Linux Kernel | >=3.1<3.2.24 | |
<3.0.38 | ||
>=3.1<3.2.24 | ||
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.22-1 6.12.25-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6638 has a high severity rating due to its potential to allow a denial of service attack.
To fix CVE-2012-6638, update your Linux kernel to a version that includes the necessary patches, such as those released by Red Hat or Debian.
CVE-2012-6638 affects various versions of the Linux kernel, particularly those below version 3.2.24 and several specific Red Hat kernel packages.
Yes, CVE-2012-6638 can be exploited remotely by a user or program to trigger a denial of service condition.
In the context of CVE-2012-6638, 'SYN+FIN' flags in TCP connection requests represent an abnormal state that can be used to initiate a denial of service attack.