diff --git a/data/cve/CVE-2013-2224.json b/data/cve/CVE-2013-2224.json index 7e6b9123a6056bb6e7586f95cd8ccb7e2c021764..dbeb33d75ce258ceda5ec88fe3d3b93cef917ddf 100644 --- a/data/cve/CVE-2013-2224.json +++ b/data/cve/CVE-2013-2224.json @@ -48,13 +48,13 @@ } ], "affected_packages": [ - "kernel:4.19", "kernel:6.6", - "kernel:5.10" + "kernel:5.10", + "kernel:4.19" ], "score": 6.9, "severity": "Important", - "status": 2, + "status": 1, "source": "Mitre", "cve_source_link": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2224", "abstract": "A certain Red Hat patch for the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 allows local users to cause a denial of service (invalid free operation and system crash) or possibly gain privileges via a sendmsg system call with the IP_RETOPTS option, as demonstrated by hemlock.c. NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-3552.",