Executive Summary
Summary | |
---|---|
Title | kernel-rt security and bug fix update |
Informations | |||
---|---|---|---|
Name | RHSA-2013:0829 | First vendor Publication | 2013-05-20 |
Vendor | RedHat | Last vendor Modification | 2013-05-20 |
Severity (Vendor) | Important | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated kernel-rt packages that fix several security issues and multiple bugs are now available for Red Hat Enterprise MRG 2.3. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: MRG Realtime for RHEL 6 Server v.2 - noarch, x86_64 3. Description: Security fixes: * It was found that the kernel-rt update RHBA-2012:0044 introduced an integer conversion issue in the Linux kernel's Performance Events implementation. This led to a user-supplied index into the perf_swevent_enabled array not being validated properly, resulting in out-of-bounds kernel memory access. A local, unprivileged user could use this flaw to escalate their privileges. (CVE-2013-2094, Important) A public exploit for CVE-2013-2094 that affects Red Hat Enterprise MRG 2 is available. Refer to Red Hat Knowledge Solution 373743, linked to in the References, for further information and mitigation instructions for users who are unable to immediately apply this update. * An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way the Intel i915 driver in the Linux kernel handled the allocation of the buffer used for relocation copies. A local user with console access could use this flaw to cause a denial of service or escalate their privileges. (CVE-2013-0913, Important) * It was found that the Linux kernel used effective user and group IDs instead of real ones when passing messages with SCM_CREDENTIALS ancillary data. A local, unprivileged user could leverage this flaw with a set user ID (setuid) application, allowing them to escalate their privileges. (CVE-2013-1979, Important) * A race condition in install_user_keyrings(), leading to a NULL pointer dereference, was found in the key management facility. A local, unprivileged user could use this flaw to cause a denial of service. (CVE-2013-1792, Moderate) * A NULL pointer dereference flaw was found in the Linux kernel's XFS file system implementation. A local user who is able to mount an XFS file system could use this flaw to cause a denial of service. (CVE-2013-1819, Moderate) * An information leak was found in the Linux kernel's POSIX signals implementation. A local, unprivileged user could use this flaw to bypass the Address Space Layout Randomization (ASLR) security feature. (CVE-2013-0914, Low) * A use-after-free flaw was found in the tmpfs implementation. A local user able to mount and unmount a tmpfs file system could use this flaw to cause a denial of service or, potentially, escalate their privileges. (CVE-2013-1767, Low) * A NULL pointer dereference flaw was found in the Linux kernel's USB Inside Out Edgeport Serial Driver implementation. A local user with physical access to a system and with access to a USB device's tty file could use this flaw to cause a denial of service. (CVE-2013-1774, Low) * A format string flaw was found in the ext3_msg() function in the Linux kernel's ext3 file system implementation. A local user who is able to mount an ext3 file system could use this flaw to cause a denial of service or, potentially, escalate their privileges. (CVE-2013-1848, Low) * A heap-based buffer overflow flaw was found in the Linux kernel's cdc-wdm driver, used for USB CDC WCM device management. An attacker with physical access to a system could use this flaw to cause a denial of service or, potentially, escalate their privileges. (CVE-2013-1860, Low) * A heap-based buffer overflow in the way the tg3 Ethernet driver parsed the vital product data (VPD) of devices could allow an attacker with physical access to a system to cause a denial of service or, potentially, escalate their privileges. (CVE-2013-1929, Low) * Information leaks in the Linux kernel's cryptographic API could allow a local user who has the CAP_NET_ADMIN capability to leak kernel stack memory to user-space. (CVE-2013-2546, CVE-2013-2547, CVE-2013-2548, Low) * Information leaks in the Linux kernel could allow a local, unprivileged user to leak kernel stack memory to user-space. (CVE-2013-2634, CVE-2013-2635, CVE-2013-3076, CVE-2013-3222, CVE-2013-3224, CVE-2013-3225, CVE-2013-3231, Low) Red Hat would like to thank Andy Lutomirski for reporting CVE-2013-1979. CVE-2013-1792 was discovered by Mateusz Guzik of Red Hat EMEA GSS SEG Team. 4. Solution: This update also fixes multiple bugs. Documentation for these changes will be available shortly from the Technical Notes document linked to in the References section. Users should upgrade to these updated packages, which upgrade the kernel-rt kernel to version kernel-rt-3.6.11.2-rt33, correct these issues, and fix the bugs noted in the Red Hat Enterprise MRG 2 Technical Notes. The system must be rebooted for this update to take effect. Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system. 5. Bugs fixed (http://bugzilla.redhat.com/): 915592 - CVE-2013-1767 Kernel: tmpfs: fix use-after-free of mempolicy object 916191 - CVE-2013-1774 Kernel: USB io_ti driver NULL pointer dereference in routine chase_port 916646 - CVE-2013-1792 Kernel: keys: race condition in install_user_keyrings() 918009 - CVE-2013-1819 kernel: xfs: _xfs_buf_find oops on blocks beyond the filesystem end 918098 - build id problem - needed for systemtap and perf annotations 918512 - kernel: crypto: info leaks in report API 920471 - CVE-2013-0913 Kernel: drm/i915: heap writing overflow 920499 - CVE-2013-0914 Kernel: sa_restorer information leak 920783 - CVE-2013-1848 kernel: ext3: format string issues 921970 - CVE-2013-1860 kernel: usb: cdc-wdm buffer overflow triggered by device 924689 - CVE-2013-2634 kernel: Information leak in the Data Center Bridging (DCB) component 924690 - CVE-2013-2635 kernel: Information leak in the RTNETLINK component 927026 - disable NO_HZ by default missing from v3.6-rt 949932 - CVE-2013-1929 Kernel: tg3: buffer overflow in VPD firmware parsing 955216 - CVE-2013-3222 Kernel: atm: update msg_namelen in vcc_recvmsg() 955599 - CVE-2013-3224 Kernel: Bluetooth: possible info leak in bt_sock_recvmsg() 955629 - CVE-2013-1979 kernel: net: incorrect SCM_CREDENTIALS passing 955649 - CVE-2013-3225 Kernel: Bluetooth: RFCOMM - missing msg_namelen update in rfcomm_sock_recvmsg 956094 - CVE-2013-3231 Kernel: llc: Fix missing msg_namelen update in llc_ui_recvmsg 956162 - CVE-2013-3076 Kernel: crypto: algif - suppress sending source address information in recvmsg 962792 - CVE-2013-2094 kernel: perf_swevent_enabled array out-of-bound access |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2013-0829.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
24 % | CWE-200 | Information Exposure |
14 % | CWE-399 | Resource Management Errors |
14 % | CWE-310 | Cryptographic Issues |
14 % | CWE-264 | Permissions, Privileges, and Access Controls |
10 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
10 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
10 % | CWE-20 | Improper Input Validation |
5 % | CWE-362 | Race Condition |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:17404 | |||
Oval ID: | oval:org.mitre.oval:def:17404 | ||
Title: | USN-1828-1 -- linux-lts-quantal vulnerability | ||
Description: | The system could be made to run programs as an administrator. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1828-1 CVE-2013-2094 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-quantal |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17453 | |||
Oval ID: | oval:org.mitre.oval:def:17453 | ||
Title: | USN-1787-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1787-1 CVE-2013-0914 CVE-2013-1767 CVE-2013-1792 | Version: | 7 |
Platform(s): | Ubuntu 11.10 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17686 | |||
Oval ID: | oval:org.mitre.oval:def:17686 | ||
Title: | USN-1795-1 -- linux-lts-quantal vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1795-1 CVE-2013-0228 CVE-2013-0914 CVE-2013-1767 CVE-2013-1792 CVE-2013-2546 CVE-2013-2547 CVE-2013-2548 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-quantal |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17897 | |||
Oval ID: | oval:org.mitre.oval:def:17897 | ||
Title: | USN-1794-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1794-1 CVE-2013-0914 CVE-2013-1767 CVE-2013-1792 CVE-2013-2546 CVE-2013-2547 CVE-2013-2548 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17993 | |||
Oval ID: | oval:org.mitre.oval:def:17993 | ||
Title: | USN-1796-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1796-1 CVE-2013-0228 CVE-2013-0914 CVE-2013-1767 CVE-2013-1792 CVE-2013-2546 CVE-2013-2547 CVE-2013-2548 | Version: | 7 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18071 | |||
Oval ID: | oval:org.mitre.oval:def:18071 | ||
Title: | USN-1781-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1781-1 CVE-2013-0228 CVE-2013-0268 CVE-2013-0311 CVE-2013-0313 CVE-2013-0349 CVE-2013-1772 CVE-2013-1774 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18181 | |||
Oval ID: | oval:org.mitre.oval:def:18181 | ||
Title: | USN-1809-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1809-1 CVE-2012-6548 CVE-2012-6549 CVE-2013-0913 CVE-2013-1796 CVE-2013-1797 CVE-2013-1798 CVE-2013-1848 CVE-2013-1860 CVE-2013-2206 CVE-2013-2634 CVE-2013-2635 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18195 | |||
Oval ID: | oval:org.mitre.oval:def:18195 | ||
Title: | USN-1812-1 -- linux-lts-quantal vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1812-1 CVE-2012-6548 CVE-2012-6549 CVE-2013-0913 CVE-2013-1796 CVE-2013-1797 CVE-2013-1798 CVE-2013-1848 CVE-2013-1860 CVE-2013-2206 CVE-2013-2634 CVE-2013-2635 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-quantal |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18241 | |||
Oval ID: | oval:org.mitre.oval:def:18241 | ||
Title: | USN-1767-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1767-1 CVE-2013-0190 CVE-2013-0216 CVE-2013-0217 CVE-2013-0228 CVE-2013-0231 CVE-2013-0268 CVE-2013-0311 CVE-2013-0313 CVE-2013-0349 CVE-2013-1772 CVE-2013-1774 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18242 | |||
Oval ID: | oval:org.mitre.oval:def:18242 | ||
Title: | USN-1826-1 -- linux vulnerability | ||
Description: | The system could be made to run programs as an administrator. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1826-1 CVE-2013-2094 | Version: | 7 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18266 | |||
Oval ID: | oval:org.mitre.oval:def:18266 | ||
Title: | USN-1827-1 -- linux vulnerability | ||
Description: | The system could be made to run programs as an administrator. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1827-1 CVE-2013-2094 | Version: | 7 |
Platform(s): | Ubuntu 13.04 | Product(s): | linux |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18280 | |||
Oval ID: | oval:org.mitre.oval:def:18280 | ||
Title: | USN-1811-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1811-1 CVE-2012-6548 CVE-2012-6549 CVE-2013-0913 CVE-2013-1848 CVE-2013-1860 CVE-2013-2206 CVE-2013-2634 CVE-2013-2635 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18296 | |||
Oval ID: | oval:org.mitre.oval:def:18296 | ||
Title: | USN-1813-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1813-1 CVE-2012-6548 CVE-2012-6549 CVE-2013-0913 CVE-2013-1796 CVE-2013-1797 CVE-2013-1798 CVE-2013-1848 CVE-2013-1860 CVE-2013-2206 CVE-2013-2634 CVE-2013-2635 | Version: | 7 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18305 | |||
Oval ID: | oval:org.mitre.oval:def:18305 | ||
Title: | USN-1814-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1814-1 CVE-2012-6548 CVE-2012-6549 CVE-2013-0913 CVE-2013-1848 CVE-2013-1860 CVE-2013-2206 CVE-2013-2634 CVE-2013-2635 | Version: | 7 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18310 | |||
Oval ID: | oval:org.mitre.oval:def:18310 | ||
Title: | USN-1825-1 -- linux vulnerability | ||
Description: | The system could be made to run programs as an administrator. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1825-1 CVE-2013-2094 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18315 | |||
Oval ID: | oval:org.mitre.oval:def:18315 | ||
Title: | USN-1829-1 -- linux-ec2 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1829-1 CVE-2012-6549 CVE-2013-1826 CVE-2013-1860 CVE-2013-1928 CVE-2013-2634 | Version: | 7 |
Platform(s): | Ubuntu 10.04 | Product(s): | linux-ec2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18322 | |||
Oval ID: | oval:org.mitre.oval:def:18322 | ||
Title: | USN-1793-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1793-1 CVE-2013-0914 CVE-2013-1767 CVE-2013-1792 CVE-2013-2546 CVE-2013-2547 CVE-2013-2548 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18323 | |||
Oval ID: | oval:org.mitre.oval:def:18323 | ||
Title: | USN-1788-1 -- linux-lts-backport-oneiric vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1788-1 CVE-2013-0914 CVE-2013-1767 CVE-2013-1792 | Version: | 7 |
Platform(s): | Ubuntu 10.04 | Product(s): | linux-lts-backport-oneiric |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18336 | |||
Oval ID: | oval:org.mitre.oval:def:18336 | ||
Title: | USN-1797-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1797-1 CVE-2013-0228 CVE-2013-0914 CVE-2013-1767 CVE-2013-1792 CVE-2013-2546 CVE-2013-2547 CVE-2013-2548 | Version: | 7 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18356 | |||
Oval ID: | oval:org.mitre.oval:def:18356 | ||
Title: | USN-1798-1 -- linux-ec2 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1798-1 CVE-2012-6537 CVE-2012-6539 CVE-2012-6540 CVE-2013-0914 CVE-2013-1767 CVE-2013-1792 | Version: | 7 |
Platform(s): | Ubuntu 10.04 | Product(s): | linux-ec2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19173 | |||
Oval ID: | oval:org.mitre.oval:def:19173 | ||
Title: | USN-1975-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1975-1 CVE-2013-4254 CVE-2013-1819 | Version: | 5 |
Platform(s): | Ubuntu 13.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19233 | |||
Oval ID: | oval:org.mitre.oval:def:19233 | ||
Title: | USN-1968-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1968-1 CVE-2013-4254 CVE-2013-1819 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19306 | |||
Oval ID: | oval:org.mitre.oval:def:19306 | ||
Title: | USN-1969-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1969-1 CVE-2013-4254 CVE-2013-1819 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:27454 | |||
Oval ID: | oval:org.mitre.oval:def:27454 | ||
Title: | ELSA-2013-2519 -- Unbreakable Enterprise kernel Security update (important) | ||
Description: | [2.6.39-400.21.2] - KVM: x86: Convert MSR_KVM_SYSTEM_TIME to use gfn_to_hva_cache functions (CVE-2013-1797) (Andy Honig) [Orabug: 16711660] {CVE-2013-1797} - Bluetooth: Fix incorrect strncpy() in hidp_setup_hid() (Anderson Lizardo) [Orabug: 16711065] {CVE-2013-0349} - USB: io_ti: Fix NULL dereference in chase_port() (Wolfgang Frisch) [Orabug: 16425358] {CVE-2013-1774} - keys: fix race with concurrent install_user_keyrings() (David Howells) [Orabug: 16493354] {CVE-2013-1792} - KVM: Fix bounds checking in ioapic indirect register reads (CVE-2013-1798) (Andy Honig) [Orabug: 16710951] {CVE-2013-1798} - KVM: x86: fix for buffer overflow in handling of MSR_KVM_SYSTEM_TIME (CVE-2013-1796) (Andy Honig) [Orabug: 16710806] {CVE-2013-1796} - tmpfs: fix use-after-free of mempolicy object (Greg Thelen) [Orabug: 16515833] {CVE-2013-1767} | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-2519 CVE-2013-1774 CVE-2013-1796 CVE-2013-1797 CVE-2013-0349 CVE-2013-1767 CVE-2013-1798 CVE-2013-1792 | Version: | 3 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | kernel-uek kernel-uek-debug kernel-uek-debug-devel kernel-uek-devel kernel-uek-doc kernel-uek-firmware |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27667 | |||
Oval ID: | oval:org.mitre.oval:def:27667 | ||
Title: | DEPRECATED: ELSA-2013-0830 -- kernel security update (important) | ||
Description: | [2.6.32-358.6.2] - [kernel] perf: fix perf_swevent_enabled array out-of-bound access (Petr Matousek) [962793 962794] {CVE-2013-2094} | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-0830 CVE-2013-2094 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | kernel |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2013-06-11 | Linux kernel perf_swevent_init - Local root Exploit |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2013-1832-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0287-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0536-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-1138-1.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_libdrm_20140731.nasl - Type : ACT_GATHER_INFO |
2014-11-12 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-1645.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0832.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0928.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1026.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2013-1076.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2013-1527.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2014-0339.nasl - Type : ACT_GATHER_INFO |
2014-10-23 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-140924.nasl - Type : ACT_GATHER_INFO |
2014-10-23 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-bigsmp-201409-140924.nasl - Type : ACT_GATHER_INFO |
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL14445.nasl - Type : ACT_GATHER_INFO |
2014-07-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0829.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-1034.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-398.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-440.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-452.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-454.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-512.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-813.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-113.nasl - Type : ACT_GATHER_INFO |
2014-03-26 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0328.nasl - Type : ACT_GATHER_INFO |
2014-03-26 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0328.nasl - Type : ACT_GATHER_INFO |
2014-03-26 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0328.nasl - Type : ACT_GATHER_INFO |
2014-03-26 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140325_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2014-03-20 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-190.nasl - Type : ACT_GATHER_INFO |
2013-12-17 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20131121_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-11-29 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2584.nasl - Type : ACT_GATHER_INFO |
2013-11-29 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2585.nasl - Type : ACT_GATHER_INFO |
2013-11-27 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1645.nasl - Type : ACT_GATHER_INFO |
2013-11-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1645.nasl - Type : ACT_GATHER_INFO |
2013-10-01 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-218.nasl - Type : ACT_GATHER_INFO |
2013-09-28 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1968-1.nasl - Type : ACT_GATHER_INFO |
2013-09-28 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1970-1.nasl - Type : ACT_GATHER_INFO |
2013-09-28 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1972-1.nasl - Type : ACT_GATHER_INFO |
2013-09-21 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-130827.nasl - Type : ACT_GATHER_INFO |
2013-09-21 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-130828.nasl - Type : ACT_GATHER_INFO |
2013-09-18 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2546.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-200.nasl - Type : ACT_GATHER_INFO |
2013-07-19 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2537.nasl - Type : ACT_GATHER_INFO |
2013-07-19 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2538.nasl - Type : ACT_GATHER_INFO |
2013-07-18 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-1051.nasl - Type : ACT_GATHER_INFO |
2013-07-18 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130716_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-07-18 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-130702.nasl - Type : ACT_GATHER_INFO |
2013-07-17 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1051.nasl - Type : ACT_GATHER_INFO |
2013-07-17 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1051.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-194.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0744.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0830.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1034-1.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1034.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2513.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2519.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2520.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2523.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2524.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2525.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2534.nasl - Type : ACT_GATHER_INFO |
2013-07-11 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-1034.nasl - Type : ACT_GATHER_INFO |
2013-07-11 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130710_kernel_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-07-10 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1034.nasl - Type : ACT_GATHER_INFO |
2013-06-25 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-176.nasl - Type : ACT_GATHER_INFO |
2013-06-18 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-130604.nasl - Type : ACT_GATHER_INFO |
2013-06-16 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1876-1.nasl - Type : ACT_GATHER_INFO |
2013-06-16 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1877-1.nasl - Type : ACT_GATHER_INFO |
2013-06-16 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1878-1.nasl - Type : ACT_GATHER_INFO |
2013-06-16 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1880-1.nasl - Type : ACT_GATHER_INFO |
2013-06-16 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1881-1.nasl - Type : ACT_GATHER_INFO |
2013-05-31 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0882.nasl - Type : ACT_GATHER_INFO |
2013-05-31 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1849-1.nasl - Type : ACT_GATHER_INFO |
2013-05-29 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2013-140-01.nasl - Type : ACT_GATHER_INFO |
2013-05-25 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1833-1.nasl - Type : ACT_GATHER_INFO |
2013-05-25 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1834-1.nasl - Type : ACT_GATHER_INFO |
2013-05-25 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1835-1.nasl - Type : ACT_GATHER_INFO |
2013-05-25 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1837-1.nasl - Type : ACT_GATHER_INFO |
2013-05-22 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-130515.nasl - Type : ACT_GATHER_INFO |
2013-05-21 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0830.nasl - Type : ACT_GATHER_INFO |
2013-05-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0840.nasl - Type : ACT_GATHER_INFO |
2013-05-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0841.nasl - Type : ACT_GATHER_INFO |
2013-05-17 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2669.nasl - Type : ACT_GATHER_INFO |
2013-05-17 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0830.nasl - Type : ACT_GATHER_INFO |
2013-05-17 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130516_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-05-17 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1829-1.nasl - Type : ACT_GATHER_INFO |
2013-05-16 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1824-1.nasl - Type : ACT_GATHER_INFO |
2013-05-16 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1825-1.nasl - Type : ACT_GATHER_INFO |
2013-05-16 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1826-1.nasl - Type : ACT_GATHER_INFO |
2013-05-16 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1827-1.nasl - Type : ACT_GATHER_INFO |
2013-05-16 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1828-1.nasl - Type : ACT_GATHER_INFO |
2013-05-15 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2668.nasl - Type : ACT_GATHER_INFO |
2013-05-08 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-130426.nasl - Type : ACT_GATHER_INFO |
2013-05-04 | Name : The remote Fedora host is missing a security update. File : fedora_2013-6999.nasl - Type : ACT_GATHER_INFO |
2013-05-03 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1813-1.nasl - Type : ACT_GATHER_INFO |
2013-05-03 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1815-1.nasl - Type : ACT_GATHER_INFO |
2013-05-02 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1809-1.nasl - Type : ACT_GATHER_INFO |
2013-05-02 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1812-1.nasl - Type : ACT_GATHER_INFO |
2013-04-29 | Name : The remote Fedora host is missing a security update. File : fedora_2013-6537.nasl - Type : ACT_GATHER_INFO |
2013-04-26 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1808-1.nasl - Type : ACT_GATHER_INFO |
2013-04-25 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0744.nasl - Type : ACT_GATHER_INFO |
2013-04-25 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130423_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-04-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0744.nasl - Type : ACT_GATHER_INFO |
2013-04-22 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1805-1.nasl - Type : ACT_GATHER_INFO |
2013-04-12 | Name : The remote Fedora host is missing a security update. File : fedora_2013-5368.nasl - Type : ACT_GATHER_INFO |
2013-04-09 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1792-1.nasl - Type : ACT_GATHER_INFO |
2013-04-09 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1793-1.nasl - Type : ACT_GATHER_INFO |
2013-04-09 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1795-1.nasl - Type : ACT_GATHER_INFO |
2013-04-09 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1796-1.nasl - Type : ACT_GATHER_INFO |
2013-04-09 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1798-1.nasl - Type : ACT_GATHER_INFO |
2013-04-04 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1788-1.nasl - Type : ACT_GATHER_INFO |
2013-04-03 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1787-1.nasl - Type : ACT_GATHER_INFO |
2013-04-01 | Name : The remote Fedora host is missing a security update. File : fedora_2013-4357.nasl - Type : ACT_GATHER_INFO |
2013-03-24 | Name : The remote Fedora host is missing a security update. File : fedora_2013-4240.nasl - Type : ACT_GATHER_INFO |
2013-03-22 | Name : The remote Fedora host is missing a security update. File : fedora_2013-3909.nasl - Type : ACT_GATHER_INFO |
2013-03-20 | Name : The remote Fedora host is missing a security update. File : fedora_2013-4012.nasl - Type : ACT_GATHER_INFO |
2013-03-19 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1767-1.nasl - Type : ACT_GATHER_INFO |
2013-03-17 | Name : The remote Fedora host is missing a security update. File : fedora_2013-3893.nasl - Type : ACT_GATHER_INFO |
2013-03-11 | Name : The remote Fedora host is missing a security update. File : fedora_2013-3630.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-07-23 13:25:11 |
|
2013-06-07 21:29:05 |
|
2013-05-21 00:18:26 |
|