U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2012-3400

Change History

Modified Analysis by NIST 1/17/2023 4:47:50 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to (including) 3.4.4
OR
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to (excluding) 3.0.37
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 3.1 up to (excluding) 3.2.23
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 3.4 up to (excluding) 3.4.5
Added CWE

								
							
							
						
NIST CWE-787
Removed CWE
NIST CWE-119

								
						
Changed Reference Type
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1df2ae31c724e57be9d7ac00d78db8a5dabdd050 Patch
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1df2ae31c724e57be9d7ac00d78db8a5dabdd050 Patch, Vendor Advisory
Changed Reference Type
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=adee11b2085bee90bd8f4f52123ffb07882d6256 Patch
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=adee11b2085bee90bd8f4f52123ffb07882d6256 Patch, Vendor Advisory
Changed Reference Type
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691 No Types Assigned
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691 Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html Mailing List, Third Party Advisory
Changed Reference Type
http://rhn.redhat.com/errata/RHSA-2013-0594.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2013-0594.html Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/50506 No Types Assigned
http://secunia.com/advisories/50506 Broken Link
Changed Reference Type
http://ubuntu.com/usn/usn-1529-1 No Types Assigned
http://ubuntu.com/usn/usn-1529-1 Third Party Advisory
Changed Reference Type
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.5 No Types Assigned
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.5 Vendor Advisory
Changed Reference Type
http://www.openwall.com/lists/oss-security/2012/07/10/2 No Types Assigned
http://www.openwall.com/lists/oss-security/2012/07/10/2 Mailing List, Third Party Advisory
Changed Reference Type
http://www.ubuntu.com/usn/USN-1555-1 No Types Assigned
http://www.ubuntu.com/usn/USN-1555-1 Third Party Advisory
Changed Reference Type
http://www.ubuntu.com/usn/USN-1556-1 No Types Assigned
http://www.ubuntu.com/usn/USN-1556-1 Third Party Advisory
Changed Reference Type
http://www.ubuntu.com/usn/USN-1557-1 No Types Assigned
http://www.ubuntu.com/usn/USN-1557-1 Third Party Advisory
Changed Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=843139 No Types Assigned
https://bugzilla.redhat.com/show_bug.cgi?id=843139 Issue Tracking, Third Party Advisory
Changed Reference Type
https://github.com/torvalds/linux/commit/1df2ae31c724e57be9d7ac00d78db8a5dabdd050 Vendor Advisory
https://github.com/torvalds/linux/commit/1df2ae31c724e57be9d7ac00d78db8a5dabdd050 Third Party Advisory
Changed Reference Type
https://github.com/torvalds/linux/commit/adee11b2085bee90bd8f4f52123ffb07882d6256 Exploit
https://github.com/torvalds/linux/commit/adee11b2085bee90bd8f4f52123ffb07882d6256 Exploit, Third Party Advisory