From 445746da116c30e260f63a7fcbddcc88f1c82044 Mon Sep 17 00:00:00 2001 From: anolis-bot Date: Wed, 11 Jun 2025 15:39:27 +0800 Subject: [PATCH] update cve CVE-2013-2224 --- data/cve/CVE-2013-2224.json | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/data/cve/CVE-2013-2224.json b/data/cve/CVE-2013-2224.json index 7e6b9123a6..dbeb33d75c 100644 --- a/data/cve/CVE-2013-2224.json +++ b/data/cve/CVE-2013-2224.json @@ -48,13 +48,13 @@ } ], "affected_packages": [ - "kernel:4.19", "kernel:6.6", - "kernel:5.10" + "kernel:5.10", + "kernel:4.19" ], "score": 6.9, "severity": "Important", - "status": 2, + "status": 1, "source": "Mitre", "cve_source_link": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2224", "abstract": "A certain Red Hat patch for the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 allows local users to cause a denial of service (invalid free operation and system crash) or possibly gain privileges via a sendmsg system call with the IP_RETOPTS option, as demonstrated by hemlock.c. NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-3552.", -- Gitee