Executive Summary
Summary | |
---|---|
Title | kernel-rt security and bug fix update |
Informations | |||
---|---|---|---|
Name | RHSA-2012:0010 | First vendor Publication | 2012-01-10 |
Vendor | RedHat | Last vendor Modification | 2012-01-10 |
Severity (Vendor) | Important | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated kernel-rt packages that fix several security issues and two bugs are now available for Red Hat Enterprise MRG 2.0. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: MRG Realtime for RHEL 6 Server v.2 - noarch, x86_64 3. Description: The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issues: * A malicious CIFS (Common Internet File System) server could send a specially-crafted response to a directory read request that would result in a denial of service or privilege escalation on a system that has a CIFS share mounted. (CVE-2011-3191, Important) * The way fragmented IPv6 UDP datagrams over the bridge with UDP Fragmentation Offload (UFO) functionality on were handled could allow a remote attacker to cause a denial of service. (CVE-2011-4326, Important) * GRO (Generic Receive Offload) fields could be left in an inconsistent state. An attacker on the local network could use this flaw to cause a denial of service. GRO is enabled by default in all network drivers that support it. (CVE-2011-2723, Moderate) * IPv4 and IPv6 protocol sequence number and fragment ID generation could allow a man-in-the-middle attacker to inject packets and possibly hijack connections. Protocol sequence numbers and fragment IDs are now more random. (CVE-2011-3188, Moderate) * A flaw in the FUSE (Filesystem in Userspace) implementation could allow a local user in the fuse group who has access to mount a FUSE file system to cause a denial of service. (CVE-2011-3353, Moderate) * A flaw in the b43 driver. If a system had an active wireless interface that uses the b43 driver, an attacker able to send a specially-crafted frame to that interface could cause a denial of service. (CVE-2011-3359, Moderate) * A flaw in the way CIFS shares with DFS referrals at their root were handled could allow an attacker on the local network, who is able to deploy a malicious CIFS server, to create a CIFS network share that, when mounted, would cause the client system to crash. (CVE-2011-3363, Moderate) * A flaw in the m_stop() implementation could allow a local, unprivileged user to trigger a denial of service. (CVE-2011-3637, Moderate) * Flaws in ghash_update() and ghash_final() could allow a local, unprivileged user to cause a denial of service. (CVE-2011-4081, Moderate) * A flaw in the key management facility could allow a local, unprivileged user to cause a denial of service via the keyctl utility. (CVE-2011-4110, Moderate) * A flaw in the Journaling Block Device (JBD) could allow a local attacker to crash the system by mounting a specially-crafted ext3 or ext4 disk. (CVE-2011-4132, Moderate) * A flaw in the way memory containing security-related data was handled in tpm_read() could allow a local, unprivileged user to read the results of a previously run TPM command. (CVE-2011-1162, Low) * I/O statistics from the taskstats subsystem could be read without any restrictions, which could allow a local, unprivileged user to gather confidential information, such as the length of a password used in a process. (CVE-2011-2494, Low) * Flaws in tpacket_rcv() and packet_recvmsg() could allow a local, unprivileged user to leak information to user-space. (CVE-2011-2898, Low) Red Hat would like to thank Darren Lavender for reporting CVE-2011-3191; Brent Meshier for reporting CVE-2011-2723; Dan Kaminsky for reporting CVE-2011-3188; Yogesh Sharma for reporting CVE-2011-3363; Nick Bowler for reporting CVE-2011-4081; Peter Huewe for reporting CVE-2011-1162; and Vasiliy Kulikov of Openwall for reporting CVE-2011-2494. This update also fixes the following bugs: * Previously, a mismatch in the build-id of the kernel-rt and the one in the related debuginfo package caused failures in SystemTap and perf. (BZ#768413) * IBM x3650m3 systems were not able to boot the MRG Realtime kernel because they require a pmcraid driver that was not available. The pmcraid driver is included in this update. (BZ#753992) Users should upgrade to these updated packages, which correct these issues. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system. 5. Bugs fixed (http://bugzilla.redhat.com/): 716842 - CVE-2011-2494 kernel: taskstats io infoleak 726552 - CVE-2011-2723 kernel: gro: only reset frag0 when skb can be pulled 728023 - CVE-2011-2898 kernel: af_packet: infoleak 732629 - CVE-2011-1162 kernel: tpm: infoleak 732658 - CVE-2011-3188 kernel: net: improve sequence number generation 732869 - CVE-2011-3191 kernel: cifs: signedness issue in CIFSFindNext() 736761 - CVE-2011-3353 kernel: fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message 738202 - CVE-2011-3359 kernel: b43: allocate receive buffers big enough for max frame len + offset 738291 - CVE-2011-3363 kernel: cifs: always do is_path_accessible check in cifs_mount 747848 - CVE-2011-3637 kernel: proc: fix oops on invalid /proc/ |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2012-0010.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
23 % | CWE-200 | Information Exposure |
23 % | CWE-20 | Improper Input Validation |
15 % | CWE-476 | NULL Pointer Dereference |
15 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
8 % | CWE-399 | Resource Management Errors |
8 % | CWE-264 | Permissions, Privileges, and Access Controls |
8 % | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:14087 | |||
Oval ID: | oval:org.mitre.oval:def:14087 | ||
Title: | USN-1161-1 -- linux-ec2 vulnerabilities | ||
Description: | linux-ec2: Linux kernel for EC2 Multiple kernel flaws have been fixed. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1161-1 CVE-2010-3881 CVE-2011-1017 CVE-2011-1090 CVE-2011-1163 CVE-2011-1494 CVE-2011-1495 CVE-2011-1593 CVE-2011-1598 CVE-2011-1748 CVE-2011-1745 CVE-2011-2022 CVE-2011-1746 CVE-2011-1759 CVE-2011-1770 CVE-2011-1776 CVE-2011-3363 | Version: | 5 |
Platform(s): | Ubuntu 10.04 | Product(s): | linux-ec2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:14862 | |||
Oval ID: | oval:org.mitre.oval:def:14862 | ||
Title: | USN-1318-1 -- Linux kernel (FSL-IMX51) vulnerabilities | ||
Description: | linux-fsl-imx51: Linux kernel for IMX51 Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1318-1 CVE-2011-1162 CVE-2011-2203 CVE-2011-4110 | Version: | 5 |
Platform(s): | Ubuntu 10.04 | Product(s): | Linux |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:15015 | |||
Oval ID: | oval:org.mitre.oval:def:15015 | ||
Title: | USN-1313-1 -- Linux Kernel (Oneiric backport) vulnerability | ||
Description: | linux-lts-backport-oneiric: Linux kernel backport from Oneiric Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1313-1 CVE-2011-4081 | Version: | 5 |
Platform(s): | Ubuntu 10.04 | Product(s): | Linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15037 | |||
Oval ID: | oval:org.mitre.oval:def:15037 | ||
Title: | USN-1281-1 -- Linux (OMAP4) vulnerabilities | ||
Description: | linux-ti-omap4: Linux kernel for OMAP4 Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1281-1 CVE-2011-2183 CVE-2011-2479 CVE-2011-2491 CVE-2011-2494 CVE-2011-2495 CVE-2011-2496 CVE-2011-2517 CVE-2011-2905 CVE-2011-2909 CVE-2011-3363 | Version: | 5 |
Platform(s): | Ubuntu 11.04 | Product(s): | Linux |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:15203 | |||
Oval ID: | oval:org.mitre.oval:def:15203 | ||
Title: | USN-1287-1 -- Linux (OMAP4) vulnerability | ||
Description: | linux-ti-omap4: Linux kernel for OMAP4 The system could be made to crash under certain conditions. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1287-1 CVE-2011-4081 | Version: | 5 |
Platform(s): | Ubuntu 11.10 | Product(s): | Linux |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:15214 | |||
Oval ID: | oval:org.mitre.oval:def:15214 | ||
Title: | USN-1319-1 -- Linux kernel (OMAP4) vulnerabilities | ||
Description: | linux-ti-omap4: Linux kernel for OMAP4 Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1319-1 CVE-2011-1162 CVE-2011-2203 CVE-2011-4110 | Version: | 5 |
Platform(s): | Ubuntu 11.04 | Product(s): | Linux |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:15269 | |||
Oval ID: | oval:org.mitre.oval:def:15269 | ||
Title: | USN-1328-1 -- Linux kernel (Marvell DOVE) vulnerabilities | ||
Description: | linux-mvl-dove: Linux kernel for DOVE Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1328-1 CVE-2011-2203 CVE-2011-4110 | Version: | 5 |
Platform(s): | Ubuntu 10.10 | Product(s): | Linux |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:15273 | |||
Oval ID: | oval:org.mitre.oval:def:15273 | ||
Title: | USN-1294-1 -- Linux kernel (Oneiric backport) vulnerabilities | ||
Description: | linux-lts-backport-oneiric: Linux kernel backport from Oneiric Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1294-1 CVE-2011-1162 CVE-2011-2494 CVE-2011-2942 CVE-2011-3209 CVE-2011-3638 CVE-2011-4087 CVE-2011-4326 | Version: | 5 |
Platform(s): | Ubuntu 10.04 | Product(s): | Linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15280 | |||
Oval ID: | oval:org.mitre.oval:def:15280 | ||
Title: | USN-1329-1 -- Linux kernel (OMAP4) vulnerability | ||
Description: | linux-ti-omap4: Linux kernel for OMAP4 The system could be made to crash under certain conditions. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1329-1 CVE-2011-3353 | Version: | 5 |
Platform(s): | Ubuntu 11.04 | Product(s): | Linux |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:15311 | |||
Oval ID: | oval:org.mitre.oval:def:15311 | ||
Title: | USN-1324-1 -- Linux kernel (EC2) vulnerabilities | ||
Description: | linux-ec2: Linux kernel for EC2 Two security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1324-1 CVE-2011-2203 CVE-2011-4110 | Version: | 5 |
Platform(s): | Ubuntu 10.04 | Product(s): | Linux |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:15318 | |||
Oval ID: | oval:org.mitre.oval:def:15318 | ||
Title: | USN-1337-1 -- Linux kernel (Natty backport) vulnerabilities | ||
Description: | linux-lts-backport-natty: Linux kernel backport from Natty Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1337-1 CVE-2011-1162 CVE-2011-2203 CVE-2011-4110 | Version: | 5 |
Platform(s): | Ubuntu 10.04 | Product(s): | Linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15337 | |||
Oval ID: | oval:org.mitre.oval:def:15337 | ||
Title: | USN-1332-1 -- Linux kernel (Maverick backport) vulnerabilities | ||
Description: | linux-lts-backport-maverick: Linux kernel backport from Maverick Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1332-1 CVE-2011-1162 CVE-2011-1759 CVE-2011-2182 CVE-2011-2203 CVE-2011-4110 | Version: | 5 |
Platform(s): | Ubuntu 10.04 | Product(s): | Linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15353 | |||
Oval ID: | oval:org.mitre.oval:def:15353 | ||
Title: | USN-1325-1 -- Linux kernel (OMAP4) vulnerabilities | ||
Description: | linux-ti-omap4: Linux kernel for OMAP4 Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1325-1 CVE-2011-1162 CVE-2011-2203 CVE-2011-3353 CVE-2011-3359 CVE-2011-4110 | Version: | 5 |
Platform(s): | Ubuntu 10.10 | Product(s): | Linux |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:15432 | |||
Oval ID: | oval:org.mitre.oval:def:15432 | ||
Title: | USN-1322-1 -- Linux kernel vulnerabilities | ||
Description: | linux: Linux kernel Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1322-1 CVE-2011-4081 | Version: | 5 |
Platform(s): | Ubuntu 11.10 | Product(s): | Linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20253 | |||
Oval ID: | oval:org.mitre.oval:def:20253 | ||
Title: | VMware vSphere and vCOps updates to third party libraries | ||
Description: | The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified MD4 algorithm to generate sequence numbers and Fragment Identification values, which makes it easier for remote attackers to cause a denial of service (disrupted networking) or hijack network sessions by predicting these values and sending crafted packets. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2011-3188 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20613 | |||
Oval ID: | oval:org.mitre.oval:def:20613 | ||
Title: | VMware ESXi and ESX address several security issues | ||
Description: | Integer signedness error in the CIFSFindNext function in fs/cifs/cifssmb.c in the Linux kernel before 3.1 allows remote CIFS servers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large length value in a response to a read request for a directory. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2011-3191 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20617 | |||
Oval ID: | oval:org.mitre.oval:def:20617 | ||
Title: | VMware vSphere and vCOps updates to third party libraries | ||
Description: | The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2011-3363 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20683 | |||
Oval ID: | oval:org.mitre.oval:def:20683 | ||
Title: | VMware vSphere and vCOps updates to third party libraries | ||
Description: | The cleanup_journal_tail function in the Journaling Block Device (JBD) functionality in the Linux kernel 2.6 allows local users to cause a denial of service (assertion error and kernel oops) via an ext3 or ext4 image with an "invalid log first block value." | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2011-4132 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20706 | |||
Oval ID: | oval:org.mitre.oval:def:20706 | ||
Title: | VMware vSphere and vCOps updates to third party libraries | ||
Description: | The user_update function in security/keys/user_defined.c in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and kernel oops) via vectors related to a user-defined key and "updating a negative key into a fully instantiated key." | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2011-4110 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20777 | |||
Oval ID: | oval:org.mitre.oval:def:20777 | ||
Title: | USN-1242-1 -- linux-lts-backport-maverick vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1242-1 CVE-2010-4250 CVE-2011-1479 CVE-2011-2494 CVE-2011-2495 CVE-2011-2695 CVE-2011-2905 CVE-2011-2909 CVE-2011-3188 CVE-2011-3363 | Version: | 5 |
Platform(s): | Ubuntu 10.04 | Product(s): | linux-lts-backport-maverick |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20812 | |||
Oval ID: | oval:org.mitre.oval:def:20812 | ||
Title: | USN-1228-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1228-1 CVE-2011-1776 CVE-2011-2213 CVE-2011-2497 CVE-2011-2695 CVE-2011-2700 CVE-2011-2723 CVE-2011-2928 CVE-2011-3188 CVE-2011-3191 | Version: | 5 |
Platform(s): | Ubuntu 11.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20867 | |||
Oval ID: | oval:org.mitre.oval:def:20867 | ||
Title: | USN-1244-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1244-1 CVE-2010-3873 CVE-2011-2183 CVE-2011-2491 CVE-2011-2494 CVE-2011-2495 CVE-2011-2517 CVE-2011-2695 CVE-2011-2905 CVE-2011-2909 CVE-2011-3363 | Version: | 5 |
Platform(s): | Ubuntu 10.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:27217 | |||
Oval ID: | oval:org.mitre.oval:def:27217 | ||
Title: | RHSA-2011:1530 -- Red Hat Enterprise Linux 6 kernel security, bug fix and enhancement update (Moderate) | ||
Description: | The kernel packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issues: * The proc file system could allow a local, unprivileged user to obtain sensitive information or possibly cause integrity issues. (CVE-2011-1020, Moderate) * Non-member VLAN (virtual LAN) packet handling for interfaces in promiscuous mode and also using the be2net driver could allow an attacker on the local network to cause a denial of service. (CVE-2011-3347, Moderate) * A flaw was found in the Linux kernel in the way splitting two extents in ext4_ext_convert_to_initialized() worked. A local, unprivileged user with access to mount and unmount ext4 file systems could use this flaw to cause a denial of service. (CVE-2011-3638, Moderate) * A NULL pointer dereference flaw was found in the way the Linux kernel's key management facility handled user-defined key types. A local, unprivileged user could use the keyctl utility to cause a denial of service. (CVE-2011-4110, Moderate) Red Hat would like to thank Kees Cook for reporting CVE-2011-1020; Somnath Kotur for reporting CVE-2011-3347; and Zheng Liu for reporting CVE-2011-3638. This update also fixes several hundred bugs and adds enhancements. Refer to the Red Hat Enterprise Linux 6.2 Release Notes for information on the most significant of these changes, and the Technical Notes for further information, both linked to in the References. All Red Hat Enterprise Linux 6 users are advised to install these updated packages, which correct these issues, and fix the bugs and add the enhancements noted in the Red Hat Enterprise Linux 6.2 Release Notes and Technical Notes. The system must be rebooted for this update to take effect. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2011:1530 CVE-2011-1020 CVE-2011-3347 CVE-2011-3638 CVE-2011-4110 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 6 | Product(s): | kernel |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27741 | |||
Oval ID: | oval:org.mitre.oval:def:27741 | ||
Title: | DEPRECATED: ELSA-2011-1479 -- kernel security, bug fix, and enhancement update (important) | ||
Description: | kernel [2.6.18-274.12.1.0.1.el5] - fix ia64 build error due to add-support-above-32-vcpus.patch(Zhenzhong Duan) - [x86] use dynamic vcpu_info remap to support more than 32 vcpus (Zhenzhong Duan) - [scsi] add additional scsi medium error handling (John Sobecki) [orabug 12904887] - [x86] Fix lvt0 reset when hvm boot up with noapic param - [scsi] remove printk's when doing I/O to a dead device (John Sobecki, Chris Mason) [orabug 12342275] - [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 12561346] - [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566] - bonding: reread information about speed and duplex when interface goes up (John Haxby) [orabug 11890822] - [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646] - [scsi] fix scsi hotplug and rescan race [orabug 10260172] - fix filp_close() race (Joe Jin) [orabug 10335998] - make xenkbd.abs_pointer=1 by default [orabug 67188919] - [xen] check to see if hypervisor supports memory reservation change (Chuck Anderson) [orabug 7556514] - [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki) [orabug 10315433] - [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258] - [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839] - fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042] - [rds] Patch rds to 1.4.2-20 (Andy Grover) [orabug 9471572, 9344105] RDS: Fix BUG_ONs to not fire when in a tasklet ipoib: Fix lockup of the tx queue RDS: Do not call set_page_dirty() with irqs off (Sherman Pun) RDS: Properly unmap when getting a remote access error (Tina Yang) RDS: Fix locking in rds_send_drop_to() - [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson) [orabug 9107465] - [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson) [orabug 9764220] - Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615] - fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro, Guru Anbalagane) [orabug 6124033] - [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208] - [ib] fix memory corruption (Andy Grover) [orabug 9972346] - [aio] patch removes limit on number of retries (Srinivas Eeda) [orabug 10044782] - [loop] Do not call loop_unplug for not configured loop device (orabug 10314497) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011-1479 CVE-2011-1162 CVE-2011-1898 CVE-2011-2203 CVE-2011-2494 CVE-2011-3363 CVE-2011-4110 | Version: | 4 |
Platform(s): | Oracle Linux 5 | Product(s): | kernel |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28092 | |||
Oval ID: | oval:org.mitre.oval:def:28092 | ||
Title: | ELSA-2011-2033 -- Unbreakable Enterprise kernel security update (important) | ||
Description: | [2.6.32-200.23.1.el6uek] - net: Remove atmclip.h to prevent break kabi check. - KConfig: add CONFIG_UEK5=n to ol6/config-generic [2.6.32-200.22.1.el6uek] - ipv6: make fragment identifications less predictable (Joe Jin) {CVE-2011-2699} - vlan: fix panic when handling priority tagged frames (Joe Jin) {CVE-2011-3593} - ipv6: udp: fix the wrong headroom check (Maxim Uvarov) {CVE-2011-4326} - b43: allocate receive buffers big enough for max frame len + offset (Maxim Uvarov) {CVE-2011-3359} - fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message (Maxim Uvarov) {CVE-2011-3353} - cifs: fix possible memory corruption in CIFSFindNext (Maxim Uvarov) {CVE-2011-3191} - crypto: md5 - Add export support (Maxim Uvarov) {CVE-2011-2699} - fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops (Maxim Uvarov) {CVE-2011-1577} - block: use struct parsed_partitions *state universally in partition check code (Maxim Uvarov) - net: Compute protocol sequence numbers and fragment IDs using MD5. (Maxim Uvarov) {CVE-2011-3188} - crypto: Move md5_transform to lib/md5.c (Maxim Uvarov) {CVE-2011-3188} - perf tools: do not look at ./config for configuration (Maxim Uvarov) {CVE-2011-2905} - Make TASKSTATS require root access (Maxim Uvarov) {CVE-2011-2494} - TPM: Zero buffer after copying to userspace (Maxim Uvarov) {CVE-2011-1162} - TPM: Call tpm_transmit with correct size (Maxim Uvarov){CVE-2011-1161} - fnic: fix panic while booting in fnic(Xiaowei Hu) - Revert 'PCI hotplug: acpiphp: set current_state to D0 in register_slot' (Guru Anbalagane) - xen: drop xen_sched_clock in favour of using plain wallclock time (Jeremy Fitzhardinge) [2.6.32-200.21.1.el6uek] - PCI: Set device power state to PCI_D0 for device without native PM support (Ajaykumar Hotchandani) [orabug 13033435] | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011-2033 CVE-2011-1162 CVE-2011-1577 CVE-2011-2494 CVE-2011-2699 CVE-2011-3188 CVE-2011-3191 CVE-2011-3353 CVE-2011-3593 CVE-2011-4326 | Version: | 5 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | kernel-uek ofa kernel-uek-debug kernel-uek-debug-devel kernel-uek-devel kernel-uek-doc kernel-uek-firmware kernel-uek-headers |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28166 | |||
Oval ID: | oval:org.mitre.oval:def:28166 | ||
Title: | DEPRECATED: ELSA-2011-1465 -- kernel security and bug fix update (important) | ||
Description: | [2.6.32-131.21.1.el6] - [net] ipv6/udp: fix the wrong headroom check (Thomas Graf) [753167 698170] [2.6.32-131.20.1.el6] - [net] vlan: fix panic when handling priority tagged frames (Andy Gospodarek) [742849 714936] {CVE-2011-3593} - [netdrv] igb: fix WOL on second port of i350 device (Frantisek Hrbata) [743807 718293] - [kernel] fix taskstats io infoleak (Jerome Marchand) [716847 716848] {CVE-2011-2494} - [tpm] Zero buffer after copying to userspace (Jiri Benc) [732632 732633] {CVE-2011-1162} - [scsi] Revert megaraid_sas: Driver only report tape drive, JBOD and logic drives (Tomas Henzl) [741167 736667] - [x86] acpi: Prevent acpiphp from deadlocking on PCI-to-PCI bridge remove (Prarit Bhargava) [745557 732706] - [net] sctp: deal with multiple COOKIE_ECHO chunks (Frantisek Hrbata) [743510 729220] - [scsi] iscsi_tcp: fix locking around iscsi sk user data (Mike Christie) [741704 647268] - [kernel] first time swap use results in heavy swapping (Hendrik Brueckner) [747868 722461] - [scsi] Reduce error recovery time by reducing use of TURs (Mike Christie) [744811 691945] - [fs] cifs: add fallback in is_path_accessible for old servers (Jeff Layton) [738301 692709] {CVE-2011-3363} - [fs] cifs: always do is_path_accessible check in cifs_mount (Jeff Layton) [738301 692709] {CVE-2011-3363} - [net] ipv6: fix NULL dereference in udp6_ufo_fragment() (Jason Wang) [748808 740465] - [net] ipv6: make fragment identifications less predictable (Jiri Pirko) [723432 723433] {CVE-2011-2699} [2.6.32-131.19.1.el6] - [scsi] scan: don't fail scans when host is in recovery (Mike Christie) [734774 713682] - [netdrv] b43: allocate receive buffers big enough for max frame len + offset (RuiRui Yang) [738204 738205] {CVE-2011-3359} - [fs] fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message (RuiRui Yang) [736764 736765] {CVE-2011-3353} - [fs] cifs: fix possible memory corruption in CIFSFindNext (Jeff Layton) [737482 730354] {CVE-2011-3191} - [kernel] perf tools: do not look at ./config for configuration (Jiri Benc) [730203 730204] {CVE-2011-2905} - [x86] mm: Fix pgd_lock deadlock (Andrew Jones) [737570 691310] - [mm] pdpte registers are not flushed when PGD entry is changed in x86 PAE mode (Andrew Jones) [737570 691310] - [mm] Revert 'fix pgd_lock deadlock' (Andrew Jones) [737570 691310] - [fs] corrupted GUID partition tables can cause kernel oops (Jerome Marchand) [695981 695982] {CVE-2011-1577} - [net] Compute protocol sequence numbers and fragment IDs using MD5. (Jiri Pirko) [732664 732665] {CVE-2011-3188} - [crypto] Move md5_transform to lib/md5.c (Jiri Pirko) [732664 732665] {CVE-2011-3188} - [fs] SUNRPC: Fix use of static variable in rpcb_getport_async (Steve Dickson) [740230 723650] - [fs] NFSv4.1: update nfs4_fattr_bitmap_maxsz (Steve Dickson) [740230 723650] - [fs] SUNRPC: Fix a race between work-queue and rpc_killall_tasks (Steve Dickson) [740230 723650] - [fs] SUNRPC: Ensure we always run the tk_callback before tk_action (Steve Dickson) [740230 723650] - [misc] enclosure: fix error path to actually return ERR_PTR() on error (Tomas Henzl) [741166 713730] - [virt] KVM: make guest mode entry to be rcu quiescent state (Gleb Natapov) [740352 712653] - [virt] rcu: provide rcu_virt_note_context_switch() function (Gleb Natapov) [740352 712653] [2.6.32-131.18.1.el6] - [sched] wait_for_completion_interruptible_timeout() should return signed long (J. Bruce Fields) [745413 738379] | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011-1465 CVE-2011-1162 CVE-2011-1577 CVE-2011-2494 CVE-2011-2699 CVE-2011-2905 CVE-2011-3188 CVE-2011-3191 CVE-2011-3353 CVE-2011-3359 CVE-2011-3363 CVE-2011-3593 CVE-2011-4326 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | kernel |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2013-09-18 | Name : Debian Security Advisory DSA 2389-1 (linux-2.6 - privilege escalation/denial ... File : nvt/deb_2389_1.nasl |
2012-12-18 | Name : Fedora Update for kernel FEDORA-2012-20240 File : nvt/gb_fedora_2012_20240_kernel_fc16.nasl |
2012-11-29 | Name : Fedora Update for kernel FEDORA-2012-18691 File : nvt/gb_fedora_2012_18691_kernel_fc16.nasl |
2012-11-06 | Name : Fedora Update for kernel FEDORA-2012-17479 File : nvt/gb_fedora_2012_17479_kernel_fc16.nasl |
2012-09-04 | Name : Fedora Update for kernel FEDORA-2012-12684 File : nvt/gb_fedora_2012_12684_kernel_fc16.nasl |
2012-08-31 | Name : VMSA-2012-0013 VMware vSphere and vCOps updates to third party libraries. File : nvt/gb_VMSA-2012-0013.nasl |
2012-08-06 | Name : Fedora Update for kernel FEDORA-2012-11348 File : nvt/gb_fedora_2012_11348_kernel_fc16.nasl |
2012-08-02 | Name : SuSE Update for kernel openSUSE-SU-2012:0206-1 (kernel) File : nvt/gb_suse_2012_0206_1.nasl |
2012-08-02 | Name : SuSE Update for kernel openSUSE-SU-2012:0236-1 (kernel) File : nvt/gb_suse_2012_0236_1.nasl |
2012-07-30 | Name : CentOS Update for kernel CESA-2011:1386 centos5 x86_64 File : nvt/gb_CESA-2011_1386_kernel_centos5_x86_64.nasl |
2012-07-30 | Name : CentOS Update for kernel CESA-2011:1479 centos5 x86_64 File : nvt/gb_CESA-2011_1479_kernel_centos5_x86_64.nasl |
2012-07-30 | Name : CentOS Update for kernel CESA-2012:0007 centos5 File : nvt/gb_CESA-2012_0007_kernel_centos5.nasl |
2012-07-30 | Name : CentOS Update for kernel CESA-2012:0350 centos6 File : nvt/gb_CESA-2012_0350_kernel_centos6.nasl |
2012-07-09 | Name : RedHat Update for kernel RHSA-2011:1350-01 File : nvt/gb_RHSA-2011_1350-01_kernel.nasl |
2012-07-09 | Name : RedHat Update for kernel RHSA-2011:1465-01 File : nvt/gb_RHSA-2011_1465-01_kernel.nasl |
2012-07-09 | Name : RedHat Update for Red Hat Enterprise Linux 6 kernel RHSA-2011:1530-03 File : nvt/gb_RHSA-2011_1530-03_Red_Hat_Enterprise_Linux_6_kernel.nasl |
2012-07-09 | Name : RedHat Update for kernel RHSA-2012:0350-01 File : nvt/gb_RHSA-2012_0350-01_kernel.nasl |
2012-06-25 | Name : Fedora Update for kernel FEDORA-2012-8931 File : nvt/gb_fedora_2012_8931_kernel_fc15.nasl |
2012-06-15 | Name : Fedora Update for kernel FEDORA-2012-8890 File : nvt/gb_fedora_2012_8890_kernel_fc16.nasl |
2012-05-17 | Name : Fedora Update for kernel FEDORA-2012-7594 File : nvt/gb_fedora_2012_7594_kernel_fc15.nasl |
2012-05-14 | Name : Fedora Update for kernel FEDORA-2012-7538 File : nvt/gb_fedora_2012_7538_kernel_fc16.nasl |
2012-04-26 | Name : Fedora Update for kernel FEDORA-2012-6406 File : nvt/gb_fedora_2012_6406_kernel_fc15.nasl |
2012-04-02 | Name : VMSA-2012-0006 VMware ESXi and ESX address several security issues File : nvt/gb_VMSA-2012-0006.nasl |
2012-04-02 | Name : Fedora Update for kernel FEDORA-2011-12823 File : nvt/gb_fedora_2011_12823_kernel_fc16.nasl |
2012-04-02 | Name : Fedora Update for kernel FEDORA-2011-15959 File : nvt/gb_fedora_2011_15959_kernel_fc16.nasl |
2012-04-02 | Name : Fedora Update for kernel FEDORA-2011-16237 File : nvt/gb_fedora_2011_16237_kernel_fc16.nasl |
2012-04-02 | Name : Fedora Update for kernel FEDORA-2011-17381 File : nvt/gb_fedora_2011_17381_kernel_fc16.nasl |
2012-04-02 | Name : Fedora Update for kernel FEDORA-2012-0145 File : nvt/gb_fedora_2012_0145_kernel_fc16.nasl |
2012-04-02 | Name : Fedora Update for kernel FEDORA-2012-0363 File : nvt/gb_fedora_2012_0363_kernel_fc16.nasl |
2012-04-02 | Name : Fedora Update for kernel FEDORA-2012-0480 File : nvt/gb_fedora_2012_0480_kernel_fc16.nasl |
2012-04-02 | Name : Fedora Update for kernel FEDORA-2012-0876 File : nvt/gb_fedora_2012_0876_kernel_fc16.nasl |
2012-04-02 | Name : Fedora Update for kernel FEDORA-2012-3030 File : nvt/gb_fedora_2012_3030_kernel_fc16.nasl |
2012-04-02 | Name : Fedora Update for kernel FEDORA-2012-3712 File : nvt/gb_fedora_2012_3712_kernel_fc16.nasl |
2012-03-29 | Name : Fedora Update for kernel FEDORA-2012-3715 File : nvt/gb_fedora_2012_3715_kernel_fc15.nasl |
2012-03-22 | Name : Fedora Update for kernel FEDORA-2012-4410 File : nvt/gb_fedora_2012_4410_kernel_fc16.nasl |
2012-03-19 | Name : Fedora Update for kernel FEDORA-2012-1497 File : nvt/gb_fedora_2012_1497_kernel_fc16.nasl |
2012-03-19 | Name : Fedora Update for kernel FEDORA-2012-3350 File : nvt/gb_fedora_2012_3350_kernel_fc16.nasl |
2012-03-16 | Name : Fedora Update for kernel FEDORA-2012-3356 File : nvt/gb_fedora_2012_3356_kernel_fc15.nasl |
2012-03-16 | Name : Ubuntu Update for linux-ti-omap4 USN-1260-1 File : nvt/gb_ubuntu_USN_1260_1.nasl |
2012-03-16 | Name : Ubuntu Update for linux USN-1275-1 File : nvt/gb_ubuntu_USN_1275_1.nasl |
2012-03-16 | Name : Ubuntu Update for linux-ti-omap4 USN-1287-1 File : nvt/gb_ubuntu_USN_1287_1.nasl |
2012-03-16 | Name : Ubuntu Update for linux USN-1322-1 File : nvt/gb_ubuntu_USN_1322_1.nasl |
2012-03-16 | Name : Ubuntu Update for linux-ti-omap4 USN-1330-1 File : nvt/gb_ubuntu_USN_1330_1.nasl |
2012-03-07 | Name : Fedora Update for kernel FEDORA-2012-2753 File : nvt/gb_fedora_2012_2753_kernel_fc15.nasl |
2012-03-07 | Name : Ubuntu Update for linux-lts-backport-natty USN-1386-1 File : nvt/gb_ubuntu_USN_1386_1.nasl |
2012-03-07 | Name : Ubuntu Update for linux-lts-backport-maverick USN-1387-1 File : nvt/gb_ubuntu_USN_1387_1.nasl |
2012-02-21 | Name : Ubuntu Update for linux USN-1361-1 File : nvt/gb_ubuntu_USN_1361_1.nasl |
2012-02-21 | Name : Ubuntu Update for linux USN-1362-1 File : nvt/gb_ubuntu_USN_1362_1.nasl |
2012-02-13 | Name : Fedora Update for kernel FEDORA-2012-1503 File : nvt/gb_fedora_2012_1503_kernel_fc15.nasl |
2012-01-25 | Name : Fedora Update for kernel FEDORA-2012-0861 File : nvt/gb_fedora_2012_0861_kernel_fc15.nasl |
2012-01-25 | Name : Ubuntu Update for linux-lts-backport-natty USN-1337-1 File : nvt/gb_ubuntu_USN_1337_1.nasl |
2012-01-25 | Name : Ubuntu Update for linux-lts-backport-oneiric USN-1340-1 File : nvt/gb_ubuntu_USN_1340_1.nasl |
2012-01-25 | Name : Ubuntu Update for linux USN-1341-1 File : nvt/gb_ubuntu_USN_1341_1.nasl |
2012-01-25 | Name : Ubuntu Update for linux USN-1344-1 File : nvt/gb_ubuntu_USN_1344_1.nasl |
2012-01-25 | Name : Ubuntu Update for linux USN-1345-1 File : nvt/gb_ubuntu_USN_1345_1.nasl |
2012-01-16 | Name : Fedora Update for kernel FEDORA-2012-0492 File : nvt/gb_fedora_2012_0492_kernel_fc15.nasl |
2012-01-16 | Name : Ubuntu Update for linux-mvl-dove USN-1328-1 File : nvt/gb_ubuntu_USN_1328_1.nasl |
2012-01-16 | Name : Ubuntu Update for linux-ti-omap4 USN-1329-1 File : nvt/gb_ubuntu_USN_1329_1.nasl |
2012-01-16 | Name : Ubuntu Update for linux-lts-backport-maverick USN-1332-1 File : nvt/gb_ubuntu_USN_1332_1.nasl |
2012-01-13 | Name : RedHat Update for kernel RHSA-2012:0007-01 File : nvt/gb_RHSA-2012_0007-01_kernel.nasl |
2012-01-13 | Name : Ubuntu Update for linux USN-1323-1 File : nvt/gb_ubuntu_USN_1323_1.nasl |
2012-01-13 | Name : Ubuntu Update for linux-ec2 USN-1324-1 File : nvt/gb_ubuntu_USN_1324_1.nasl |
2012-01-13 | Name : Ubuntu Update for linux-ti-omap4 USN-1325-1 File : nvt/gb_ubuntu_USN_1325_1.nasl |
2012-01-09 | Name : Ubuntu Update for linux-fsl-imx51 USN-1318-1 File : nvt/gb_ubuntu_USN_1318_1.nasl |
2012-01-09 | Name : Ubuntu Update for linux-ti-omap4 USN-1319-1 File : nvt/gb_ubuntu_USN_1319_1.nasl |
2011-12-23 | Name : Ubuntu Update for linux USN-1311-1 File : nvt/gb_ubuntu_USN_1311_1.nasl |
2011-12-23 | Name : Ubuntu Update for linux USN-1312-1 File : nvt/gb_ubuntu_USN_1312_1.nasl |
2011-12-23 | Name : Ubuntu Update for linux-lts-backport-oneiric USN-1313-1 File : nvt/gb_ubuntu_USN_1313_1.nasl |
2011-12-16 | Name : Ubuntu Update for linux-ec2 USN-1299-1 File : nvt/gb_ubuntu_USN_1299_1.nasl |
2011-12-16 | Name : Ubuntu Update for linux-fsl-imx51 USN-1300-1 File : nvt/gb_ubuntu_USN_1300_1.nasl |
2011-12-16 | Name : Ubuntu Update for linux-lts-backport-natty USN-1301-1 File : nvt/gb_ubuntu_USN_1301_1.nasl |
2011-12-16 | Name : Ubuntu Update for linux-ti-omap4 USN-1302-1 File : nvt/gb_ubuntu_USN_1302_1.nasl |
2011-12-16 | Name : Ubuntu Update for linux-mvl-dove USN-1303-1 File : nvt/gb_ubuntu_USN_1303_1.nasl |
2011-12-16 | Name : Ubuntu Update for linux-ti-omap4 USN-1304-1 File : nvt/gb_ubuntu_USN_1304_1.nasl |
2011-12-12 | Name : Fedora Update for kernel FEDORA-2011-16621 File : nvt/gb_fedora_2011_16621_kernel_fc15.nasl |
2011-12-09 | Name : Ubuntu Update for linux USN-1291-1 File : nvt/gb_ubuntu_USN_1291_1.nasl |
2011-12-09 | Name : Ubuntu Update for linux-lts-backport-maverick USN-1292-1 File : nvt/gb_ubuntu_USN_1292_1.nasl |
2011-12-09 | Name : Ubuntu Update for linux USN-1293-1 File : nvt/gb_ubuntu_USN_1293_1.nasl |
2011-12-09 | Name : Ubuntu Update for linux-lts-backport-oneiric USN-1294-1 File : nvt/gb_ubuntu_USN_1294_1.nasl |
2011-12-05 | Name : Ubuntu Update for linux USN-1286-1 File : nvt/gb_ubuntu_USN_1286_1.nasl |
2011-12-02 | Name : CentOS Update for kernel CESA-2011:1479 centos5 i386 File : nvt/gb_CESA-2011_1479_kernel_centos5_i386.nasl |
2011-12-02 | Name : RedHat Update for kernel RHSA-2011:1479-01 File : nvt/gb_RHSA-2011_1479-01_kernel.nasl |
2011-12-02 | Name : Fedora Update for kernel FEDORA-2011-16346 File : nvt/gb_fedora_2011_16346_kernel_fc14.nasl |
2011-12-02 | Name : Ubuntu Update for linux USN-1285-1 File : nvt/gb_ubuntu_USN_1285_1.nasl |
2011-11-25 | Name : Ubuntu Update for linux-lts-backport-natty USN-1279-1 File : nvt/gb_ubuntu_USN_1279_1.nasl |
2011-11-25 | Name : Ubuntu Update for linux-ti-omap4 USN-1281-1 File : nvt/gb_ubuntu_USN_1281_1.nasl |
2011-11-18 | Name : Fedora Update for kernel FEDORA-2011-15856 File : nvt/gb_fedora_2011_15856_kernel_fc15.nasl |
2011-11-11 | Name : Ubuntu Update for linux USN-1253-1 File : nvt/gb_ubuntu_USN_1253_1.nasl |
2011-11-11 | Name : Ubuntu Update for linux-lts-backport-natty USN-1256-1 File : nvt/gb_ubuntu_USN_1256_1.nasl |
2011-11-08 | Name : Fedora Update for kernel FEDORA-2011-15241 File : nvt/gb_fedora_2011_15241_kernel_fc14.nasl |
2011-10-31 | Name : Fedora Update for kernel FEDORA-2011-14747 File : nvt/gb_fedora_2011_14747_kernel_fc14.nasl |
2011-10-31 | Name : Ubuntu Update for linux-ec2 USN-1239-1 File : nvt/gb_ubuntu_USN_1239_1.nasl |
2011-10-31 | Name : Ubuntu Update for linux-mvl-dove USN-1240-1 File : nvt/gb_ubuntu_USN_1240_1.nasl |
2011-10-31 | Name : Ubuntu Update for linux-fsl-imx51 USN-1241-1 File : nvt/gb_ubuntu_USN_1241_1.nasl |
2011-10-31 | Name : Ubuntu Update for linux-lts-backport-maverick USN-1242-1 File : nvt/gb_ubuntu_USN_1242_1.nasl |
2011-10-31 | Name : Ubuntu Update for linux USN-1243-1 File : nvt/gb_ubuntu_USN_1243_1.nasl |
2011-10-31 | Name : Ubuntu Update for linux-ti-omap4 USN-1244-1 File : nvt/gb_ubuntu_USN_1244_1.nasl |
2011-10-31 | Name : Ubuntu Update for linux-mvl-dove USN-1245-1 File : nvt/gb_ubuntu_USN_1245_1.nasl |
2011-10-31 | Name : Ubuntu Update for linux USN-1246-1 File : nvt/gb_ubuntu_USN_1246_1.nasl |
2011-10-21 | Name : CentOS Update for kernel CESA-2011:1386 centos5 i386 File : nvt/gb_CESA-2011_1386_kernel_centos5_i386.nasl |
2011-10-21 | Name : RedHat Update for kernel RHSA-2011:1386-01 File : nvt/gb_RHSA-2011_1386-01_kernel.nasl |
2011-10-21 | Name : Ubuntu Update for linux USN-1236-1 File : nvt/gb_ubuntu_USN_1236_1.nasl |
2011-10-14 | Name : Ubuntu Update for linux USN-1227-1 File : nvt/gb_ubuntu_USN_1227_1.nasl |
2011-10-14 | Name : Ubuntu Update for linux-ti-omap4 USN-1228-1 File : nvt/gb_ubuntu_USN_1228_1.nasl |
2011-10-10 | Name : Fedora Update for kernel FEDORA-2011-12874 File : nvt/gb_fedora_2011_12874_kernel_fc14.nasl |
2011-10-10 | Name : Fedora Update for kernel FEDORA-2011-13809 File : nvt/gb_fedora_2011_13809_kernel_fc15.nasl |
2011-10-10 | Name : Ubuntu Update for linux USN-1225-1 File : nvt/gb_ubuntu_USN_1225_1.nasl |
2011-09-30 | Name : Ubuntu Update for linux-ec2 USN-1216-1 File : nvt/gb_ubuntu_USN_1216_1.nasl |
2011-09-30 | Name : Ubuntu Update for linux USN-1218-1 File : nvt/gb_ubuntu_USN_1218_1.nasl |
2011-09-30 | Name : Ubuntu Update for linux-lts-backport-maverick USN-1219-1 File : nvt/gb_ubuntu_USN_1219_1.nasl |
2011-09-30 | Name : Ubuntu Update for linux-ti-omap4 USN-1220-1 File : nvt/gb_ubuntu_USN_1220_1.nasl |
2011-09-23 | Name : RedHat Update for kernel RHSA-2011:1321-01 File : nvt/gb_RHSA-2011_1321-01_kernel.nasl |
2011-09-16 | Name : Ubuntu Update for linux-mvl-dove USN-1203-1 File : nvt/gb_ubuntu_USN_1203_1.nasl |
2011-09-16 | Name : Ubuntu Update for linux-mvl-dove USN-1208-1 File : nvt/gb_ubuntu_USN_1208_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
78302 | Linux Kernel m_stop() Implementation Local DoS |
77450 | Linux Kernel security/keys/user_defined.c user_update() Function NULL Pointer... |
77295 | Linux Kernel UFO IPv6 UDP Datagram Parsing Remote DoS |
77293 | Linux Kernel b43 Driver Wireless Interface Frame Parsing Remote DoS |
77292 | Linux Kernel tpm_read() Local TPM Command Result Disclosure |
77092 | Linux Kernel fs/jbd/journal.c journal_get_superblock() ext3 Image Handling Lo... |
76796 | Linux Kernel taskstats Access Restriction Weakness Local Information Disclosure |
76639 | Linux Kernel NULL Pointer Dereference ghash Algorithm Local DoS |
76259 | Linux Kernel fs/fuse/dev.fuse_notify_inval_entry() Function FUSE_NOTIFY_INVAL... |
76176 | Linux Kernel Multiple Function Local Information Disclosure |
75716 | Linux Kernel Sequence Number Generation Weakness Remote Packet Injection |
75580 | Linux Kernel CIFS Share Mounting DIFS Referral BUG_ON() Remote DoS |
74910 | Linux Kernel fs/cifs/cifssmb.c CIFSFindNext() Function Signedness Error CIFS ... |
74138 | Linux Kernel GRO include/linux/netdevice.h skb_gro_header_slow() Function Rem... |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2012-09-27 | IAVM : 2012-A-0153 - Multiple Vulnerabilities in VMware ESX 4.0 and ESXi 4.0 Severity : Category I - VMSKEY : V0033884 |
2012-09-13 | IAVM : 2012-A-0148 - Multiple Vulnerabilities in VMware ESXi 4.1 and ESX 4.1 Severity : Category I - VMSKEY : V0033794 |
2012-08-16 | IAVM : 2012-A-0136 - Multiple Vulnerabilities in Juniper Network Management Products Severity : Category I - VMSKEY : V0033662 |
2012-05-03 | IAVM : 2012-A-0073 - Multiple Vulnerabilities in VMware ESXi 4.1 and ESX 4.1 Severity : Category I - VMSKEY : V0032171 |
2012-04-12 | IAVM : 2012-A-0056 - Multiple Vulnerabilities in VMWare ESX 4.0 and ESXi 4.0 Severity : Category I - VMSKEY : V0031979 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-03-03 | Name : The remote VMware ESXi / ESX host is missing a security-related patch. File : vmware_VMSA-2012-0006_remote.nasl - Type : ACT_GATHER_INFO |
2016-03-03 | Name : The remote VMware ESX host is missing a security-related patch. File : vmware_VMSA-2012-0008_remote.nasl - Type : ACT_GATHER_INFO |
2016-02-29 | Name : The remote VMware ESX / ESXi host is missing a security-related patch. File : vmware_VMSA-2012-0013_remote.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2012-1391-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2013-1832-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0536-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-0812-1.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2013-0039.nasl - Type : ACT_GATHER_INFO |
2014-11-17 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2011-1408.nasl - Type : ACT_GATHER_INFO |
2014-11-17 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0422.nasl - Type : ACT_GATHER_INFO |
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL15301.nasl - Type : ACT_GATHER_INFO |
2014-07-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0010.nasl - Type : ACT_GATHER_INFO |
2014-07-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0333.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-756.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_kernel-111026.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_kernel-120104.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_kernel-111026.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_kernel-120104.nasl - Type : ACT_GATHER_INFO |
2013-09-13 | Name : The remote host has a predictable TCP sequence number generator. File : juniper_nsm_psn_2012_08_688.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2011-16.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2011-22.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2011-26.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2012-55.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-1350.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-1386.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-1465.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-1479.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-2029.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-2033.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-2037.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-0007.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-0350.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-2003.nasl - Type : ACT_GATHER_INFO |
2013-06-29 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2011-1479.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-1321.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-1419.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0116.nasl - Type : ACT_GATHER_INFO |
2012-10-24 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_kernel-8324.nasl - Type : ACT_GATHER_INFO |
2012-10-24 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_kernel-8325.nasl - Type : ACT_GATHER_INFO |
2012-08-31 | Name : The remote VMware ESXi / ESX host is missing one or more security-related pat... File : vmware_VMSA-2012-0013.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20111005_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20111020_kernel_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20111122_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20111129_kernel_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20111206_Scientific_Linux_6_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120110_kernel_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120306_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-05-17 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_kernel-7729.nasl - Type : ACT_GATHER_INFO |
2012-05-17 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_kernel-7811.nasl - Type : ACT_GATHER_INFO |
2012-04-28 | Name : The remote VMware ESX host is missing one or more security-related patches. File : vmware_VMSA-2012-0008.nasl - Type : ACT_GATHER_INFO |
2012-04-24 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-120418.nasl - Type : ACT_GATHER_INFO |
2012-03-30 | Name : The remote VMware ESXi / ESX host is missing one or more security-related pat... File : vmware_VMSA-2012-0006.nasl - Type : ACT_GATHER_INFO |
2012-03-08 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-0350.nasl - Type : ACT_GATHER_INFO |
2012-03-07 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0350.nasl - Type : ACT_GATHER_INFO |
2012-03-07 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1386-1.nasl - Type : ACT_GATHER_INFO |
2012-03-07 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1387-1.nasl - Type : ACT_GATHER_INFO |
2012-02-14 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1361-1.nasl - Type : ACT_GATHER_INFO |
2012-02-14 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1362-1.nasl - Type : ACT_GATHER_INFO |
2012-02-07 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-120129.nasl - Type : ACT_GATHER_INFO |
2012-02-07 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-120130.nasl - Type : ACT_GATHER_INFO |
2012-01-25 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1344-1.nasl - Type : ACT_GATHER_INFO |
2012-01-25 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1345-1.nasl - Type : ACT_GATHER_INFO |
2012-01-24 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1336-1.nasl - Type : ACT_GATHER_INFO |
2012-01-24 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1337-1.nasl - Type : ACT_GATHER_INFO |
2012-01-24 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1340-1.nasl - Type : ACT_GATHER_INFO |
2012-01-24 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1341-1.nasl - Type : ACT_GATHER_INFO |
2012-01-18 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2389.nasl - Type : ACT_GATHER_INFO |
2012-01-13 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1328-1.nasl - Type : ACT_GATHER_INFO |
2012-01-13 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1329-1.nasl - Type : ACT_GATHER_INFO |
2012-01-13 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1330-1.nasl - Type : ACT_GATHER_INFO |
2012-01-13 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1332-1.nasl - Type : ACT_GATHER_INFO |
2012-01-12 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-0007.nasl - Type : ACT_GATHER_INFO |
2012-01-12 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1323-1.nasl - Type : ACT_GATHER_INFO |
2012-01-12 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1324-1.nasl - Type : ACT_GATHER_INFO |
2012-01-12 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1325-1.nasl - Type : ACT_GATHER_INFO |
2012-01-11 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0007.nasl - Type : ACT_GATHER_INFO |
2012-01-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1322-1.nasl - Type : ACT_GATHER_INFO |
2012-01-06 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1318-1.nasl - Type : ACT_GATHER_INFO |
2012-01-06 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1319-1.nasl - Type : ACT_GATHER_INFO |
2011-12-20 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1311-1.nasl - Type : ACT_GATHER_INFO |
2011-12-20 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1312-1.nasl - Type : ACT_GATHER_INFO |
2011-12-20 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1313-1.nasl - Type : ACT_GATHER_INFO |
2011-12-14 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-111202.nasl - Type : ACT_GATHER_INFO |
2011-12-14 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1299-1.nasl - Type : ACT_GATHER_INFO |
2011-12-14 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1300-1.nasl - Type : ACT_GATHER_INFO |
2011-12-14 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1301-1.nasl - Type : ACT_GATHER_INFO |
2011-12-14 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1302-1.nasl - Type : ACT_GATHER_INFO |
2011-12-14 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1303-1.nasl - Type : ACT_GATHER_INFO |
2011-12-14 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1304-1.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-110930.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_kernel-7812.nasl - Type : ACT_GATHER_INFO |
2011-12-12 | Name : The remote Fedora host is missing a security update. File : fedora_2011-16621.nasl - Type : ACT_GATHER_INFO |
2011-12-09 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1291-1.nasl - Type : ACT_GATHER_INFO |
2011-12-09 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1292-1.nasl - Type : ACT_GATHER_INFO |
2011-12-09 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1293-1.nasl - Type : ACT_GATHER_INFO |
2011-12-09 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1294-1.nasl - Type : ACT_GATHER_INFO |
2011-12-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-1530.nasl - Type : ACT_GATHER_INFO |
2011-12-06 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1287-1.nasl - Type : ACT_GATHER_INFO |
2011-12-05 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1286-1.nasl - Type : ACT_GATHER_INFO |
2011-11-30 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-1479.nasl - Type : ACT_GATHER_INFO |
2011-11-30 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1285-1.nasl - Type : ACT_GATHER_INFO |
2011-11-29 | Name : The remote Fedora host is missing a security update. File : fedora_2011-16346.nasl - Type : ACT_GATHER_INFO |
2011-11-26 | Name : The remote Fedora host is missing a security update. File : fedora_2011-16237.nasl - Type : ACT_GATHER_INFO |
2011-11-26 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1279-1.nasl - Type : ACT_GATHER_INFO |
2011-11-26 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1281-1.nasl - Type : ACT_GATHER_INFO |
2011-11-23 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-1465.nasl - Type : ACT_GATHER_INFO |
2011-11-22 | Name : The remote Fedora host is missing a security update. File : fedora_2011-15959.nasl - Type : ACT_GATHER_INFO |
2011-11-22 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1275-1.nasl - Type : ACT_GATHER_INFO |
2011-11-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1260-1.nasl - Type : ACT_GATHER_INFO |
2011-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1256-1.nasl - Type : ACT_GATHER_INFO |
2011-11-09 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1253-1.nasl - Type : ACT_GATHER_INFO |
2011-11-07 | Name : The remote Fedora host is missing a security update. File : fedora_2011-15241.nasl - Type : ACT_GATHER_INFO |
2011-10-31 | Name : The remote Fedora host is missing a security update. File : fedora_2011-14747.nasl - Type : ACT_GATHER_INFO |
2011-10-26 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1239-1.nasl - Type : ACT_GATHER_INFO |
2011-10-26 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1240-1.nasl - Type : ACT_GATHER_INFO |
2011-10-26 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1241-1.nasl - Type : ACT_GATHER_INFO |
2011-10-26 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1242-1.nasl - Type : ACT_GATHER_INFO |
2011-10-26 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1243-1.nasl - Type : ACT_GATHER_INFO |
2011-10-26 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1244-1.nasl - Type : ACT_GATHER_INFO |
2011-10-26 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1245-1.nasl - Type : ACT_GATHER_INFO |
2011-10-26 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1246-1.nasl - Type : ACT_GATHER_INFO |
2011-10-24 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_kernel-7734.nasl - Type : ACT_GATHER_INFO |
2011-10-21 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2011-1386.nasl - Type : ACT_GATHER_INFO |
2011-10-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-1386.nasl - Type : ACT_GATHER_INFO |
2011-10-21 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1236-1.nasl - Type : ACT_GATHER_INFO |
2011-10-13 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1228-1.nasl - Type : ACT_GATHER_INFO |
2011-10-12 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1227-1.nasl - Type : ACT_GATHER_INFO |
2011-10-10 | Name : The remote Fedora host is missing a security update. File : fedora_2011-12874.nasl - Type : ACT_GATHER_INFO |
2011-10-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-1350.nasl - Type : ACT_GATHER_INFO |
2011-10-05 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1225-1.nasl - Type : ACT_GATHER_INFO |
2011-09-30 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1218-1.nasl - Type : ACT_GATHER_INFO |
2011-09-30 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1219-1.nasl - Type : ACT_GATHER_INFO |
2011-09-30 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1220-1.nasl - Type : ACT_GATHER_INFO |
2011-09-27 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1216-1.nasl - Type : ACT_GATHER_INFO |
2011-09-26 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2310.nasl - Type : ACT_GATHER_INFO |
2011-09-26 | Name : The remote Fedora host is missing a security update. File : fedora_2011-12823.nasl - Type : ACT_GATHER_INFO |
2011-09-23 | Name : It may be possible to predict TCP/IP Initial Sequence Numbers for the remote ... File : linux_isn.nasl - Type : ACT_GATHER_INFO |
2011-09-22 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1211-1.nasl - Type : ACT_GATHER_INFO |
2011-09-15 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1208-1.nasl - Type : ACT_GATHER_INFO |
2011-09-14 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1201-1.nasl - Type : ACT_GATHER_INFO |
2011-09-14 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1203-1.nasl - Type : ACT_GATHER_INFO |
2011-09-09 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2303.nasl - Type : ACT_GATHER_INFO |
2011-08-20 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1193-1.nasl - Type : ACT_GATHER_INFO |
2011-07-18 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1168-1.nasl - Type : ACT_GATHER_INFO |
2011-07-14 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1159-1.nasl - Type : ACT_GATHER_INFO |
2011-07-14 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1161-1.nasl - Type : ACT_GATHER_INFO |
2011-07-14 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1167-1.nasl - Type : ACT_GATHER_INFO |
2011-07-06 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1162-1.nasl - Type : ACT_GATHER_INFO |
2011-06-29 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1160-1.nasl - Type : ACT_GATHER_INFO |
2011-06-13 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1141-1.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-07-23 13:25:07 |
|