Affected Products
| Vendor | Product | Versions |
|---|---|---|
| n/a | n/a | n/a |
| n/a | n/a | n/a |
| linux | linux_kernel | 2.6.19, 2.6.19, 2.6.19 |
| Linux | Linux | 0, 5.10.248, 5.15.198 |
Timeline
- Feb 28, 2013 CVE Published
- Aug 6, 2024 CVE Updated
- Oct 17, 2025 PoC Published
- Oct 21, 2025 PoC Published
- Dec 18, 2025 PoC Published
- Dec 19, 2025 PoC Published
- Dec 26, 2025 PoC Published
- Dec 29, 2025 PoC Published
- Dec 30, 2025 PoC Published
- Dec 30, 2025 PoC Published
- Dec 30, 2025 PoC Published
- Jan 7, 2026 PoC Published
References
- RHSA-2013:0496 vendor-advisoryx_refsource_REDHAT
- RHSA-2013:0882 vendor-advisoryx_refsource_REDHAT
- RHSA-2013:0928 vendor-advisoryx_refsource_REDHAT
- [linux-kernel] 20130124 [PATCH 00/13] Corrections and customization of the SG_IO command whitelist (CVE-2012-4542) mailing-listx_refsource_MLIST
- x_refsource_CONFIRM
- [linux-kernel] 20130124 [PATCH 04/13] sg_io: resolve conflicts between commands assigned to multiple classes (CVE-2012-4542) mailing-listx_refsource_MLIST
- RHSA-2013:0579 vendor-advisoryx_refsource_REDHAT
- x_refsource_CONFIRM
- https://lists.debian.org/debian-security-announce/2026/msg00036.html advisory
- https://lists.debian.org/debian-security-announce/2026/msg00035.html advisory
- https://git.kernel.org/stable/c/c8f6f88cd1df35155258285c4f43268b361819df url
- https://git.kernel.org/stable/c/278455a82245a572aeb218a6212a416a98e418de url
- https://git.kernel.org/stable/c/b3e655e52b98a1d3df41c8e42035711e083099f8 url
- https://git.kernel.org/stable/c/e354793a7ab9bb0934ea699a9d57bcd1b48fc27b url
- https://git.kernel.org/stable/c/a41dc180b6e1229ae49ca290ae14d82101c148c3 url
- https://git.kernel.org/stable/c/751c19635c2bfaaf2836a533caa3663633066dcf url
- https://git.kernel.org/stable/c/f6ab594672d4cba08540919a4e6be2e202b60007 url