Executive Summary
Summary | |
---|---|
Title | Linux kernel vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-1699-1 | First vendor Publication | 2013-01-18 |
Vendor | Ubuntu | Last vendor Modification | 2013-01-18 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 4.9 | Attack Range | Local |
Cvss Impact Score | 6.9 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.10 Summary: Several security issues were fixed in the kernel. Software Description: - linux: Linux kernel Details: Jon Howell reported a flaw in the Linux kernel's KVM (Kernel-based virtual machine) subsystem's handling of the XSAVE CPU feature. On hosts without the XSAVE CPU feature, using qemu userspace, an unprivileged local attacker could exploit this flaw to crash the system. (CVE-2012-4461) A flaw was discovered in the Linux kernel's handling of script execution when module loading is enabled. A local attacker could exploit this flaw to cause a leak of kernel stack contents. (CVE-2012-4530) Florian Weimer discovered that hypervkvpd, which is distributed in the Linux kernel, was not correctly validating source addresses of netlink packets. An untrusted local user can cause a denial of service by causing hypervkvpd to exit. (CVE-2012-5532) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.10: After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well. References: Package Information: |
Original Source
Url : http://www.ubuntu.com/usn/USN-1699-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-200 | Information Exposure |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:17314 | |||
Oval ID: | oval:org.mitre.oval:def:17314 | ||
Title: | USN-1699-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1699-1 CVE-2012-4461 CVE-2012-4530 CVE-2012-5532 | Version: | 7 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17337 | |||
Oval ID: | oval:org.mitre.oval:def:17337 | ||
Title: | USN-1696-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1696-1 CVE-2012-4461 CVE-2012-4530 CVE-2012-5532 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17680 | |||
Oval ID: | oval:org.mitre.oval:def:17680 | ||
Title: | USN-1698-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1698-1 CVE-2012-4530 CVE-2012-5532 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17779 | |||
Oval ID: | oval:org.mitre.oval:def:17779 | ||
Title: | USN-1700-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1700-1 CVE-2012-4530 CVE-2012-5532 | Version: | 7 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17858 | |||
Oval ID: | oval:org.mitre.oval:def:17858 | ||
Title: | USN-1700-2 -- linux-ti-omap4 regression | ||
Description: | USN-1700-1 introduced a regression in the Linux kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1700-2 CVE-2012-4530 CVE-2012-5532 | Version: | 7 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17884 | |||
Oval ID: | oval:org.mitre.oval:def:17884 | ||
Title: | USN-1688-1 -- linux-lts-backport-oneiric vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1688-1 CVE-2012-4461 CVE-2012-4530 | Version: | 7 |
Platform(s): | Ubuntu 10.04 | Product(s): | linux-lts-backport-oneiric |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17894 | |||
Oval ID: | oval:org.mitre.oval:def:17894 | ||
Title: | USN-1696-2 -- linux regression | ||
Description: | USN-1696-1 introduced a regression in the Linux kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1696-2 CVE-2012-4461 CVE-2012-4530 CVE-2012-5532 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17933 | |||
Oval ID: | oval:org.mitre.oval:def:17933 | ||
Title: | USN-1691-1 -- linux-ti-omap4 vulnerability | ||
Description: | The system could be made to leak data on the kernel stack. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1691-1 CVE-2012-4530 | Version: | 7 |
Platform(s): | Ubuntu 11.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18011 | |||
Oval ID: | oval:org.mitre.oval:def:18011 | ||
Title: | USN-1698-2 -- linux-ti-omap4 regression | ||
Description: | USN-1698-1 introduced a regression in the Linux kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1698-2 CVE-2012-4530 CVE-2012-5532 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18036 | |||
Oval ID: | oval:org.mitre.oval:def:18036 | ||
Title: | USN-1704-2 -- linux-lts-quantal - Linux kernel hardware enablement from Quantal regression | ||
Description: | USN-1704-1 introduced a regression in the Linux kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1704-2 CVE-2012-0957 CVE-2012-4461 CVE-2012-4508 CVE-2012-4530 CVE-2012-4565 CVE-2012-5517 CVE-2012-5532 | Version: | 8 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-quantal |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18072 | |||
Oval ID: | oval:org.mitre.oval:def:18072 | ||
Title: | USN-1684-1 -- linux-ec2 vulnerability | ||
Description: | The system could be made to leak sensitive system information. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1684-1 CVE-2012-4530 | Version: | 7 |
Platform(s): | Ubuntu 10.04 | Product(s): | linux-ec2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18124 | |||
Oval ID: | oval:org.mitre.oval:def:18124 | ||
Title: | USN-1699-2 -- linux regression | ||
Description: | USN-1699-1 introduced a regression in the Linux kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1699-2 CVE-2012-4461 CVE-2012-4530 CVE-2012-5532 | Version: | 7 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18186 | |||
Oval ID: | oval:org.mitre.oval:def:18186 | ||
Title: | USN-1726-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1726-1 CVE-2012-2669 CVE-2012-4508 CVE-2012-5532 | Version: | 7 |
Platform(s): | Ubuntu 11.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18283 | |||
Oval ID: | oval:org.mitre.oval:def:18283 | ||
Title: | USN-1689-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1689-1 CVE-2012-4461 CVE-2012-4530 | Version: | 7 |
Platform(s): | Ubuntu 11.10 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21185 | |||
Oval ID: | oval:org.mitre.oval:def:21185 | ||
Title: | RHSA-2013:0807: hypervkvpd security and bug fix update (Low) | ||
Description: | The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.8-rc1, allows local users to cause a denial of service (daemon exit) via a crafted application that sends a Netlink message. NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-2669. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2013:0807-00 CESA-2013:0807 CVE-2012-5532 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | hypervkvpd |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23524 | |||
Oval ID: | oval:org.mitre.oval:def:23524 | ||
Title: | ELSA-2013:0807: hypervkvpd security and bug fix update (Low) | ||
Description: | The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.8-rc1, allows local users to cause a denial of service (daemon exit) via a crafted application that sends a Netlink message. NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-2669. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:0807-00 CVE-2012-5532 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | hypervkvpd |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:26824 | |||
Oval ID: | oval:org.mitre.oval:def:26824 | ||
Title: | DEPRECATED: ELSA-2013-0223 -- kernel security and bug fix update (moderate) | ||
Description: | [2.6.32-279.22.1] - [virt] kvm: invalid opcode oops on SET_SREGS with OSXSAVE bit set (Petr Matousek) [862903 862904] {CVE-2012-4461} - [fs] fuse: optimize __fuse_direct_io() (Brian Foster) [865305 858850] - [fs] fuse: optimize fuse_get_user_pages() (Brian Foster) [865305 858850] - [fs] fuse: use get_user_pages_fast() (Brian Foster) [865305 858850] - [fs] fuse: pass iov[] to fuse_get_user_pages() (Brian Foster) [865305 858850] - [fs] mm: minor cleanup of iov_iter_single_seg_count() (Brian Foster) [865305 858850] - [fs] fuse: use req->page_descs[] for argpages cases (Brian Foster) [865305 858850] to fuse_req (Brian Foster) [865305 858850] - [fs] fuse: rework fuse_do_ioctl() (Brian Foster) [865305 858850] - [fs] fuse: rework fuse_perform_write() (Brian Foster) [865305 858850] - [fs] fuse: rework fuse_readpages() (Brian Foster) [865305 858850] - [fs] fuse: categorize fuse_get_req() (Brian Foster) [865305 858850] - [fs] fuse: general infrastructure for pages[] of variable size (Brian Foster) [865305 858850] - [fs] exec: do not leave bprm->interp on stack (Josh Poimboeuf) [880145 880146] {CVE-2012-4530} - [fs] exec: use -ELOOP for max recursion depth (Josh Poimboeuf) [880145 880146] {CVE-2012-4530} - [scsi] have scsi_internal_device_unblock take new state (Frantisek Hrbata) [878774 854140] - [scsi] add new SDEV_TRANSPORT_OFFLINE state (Chris Leech) [878774 854140] - [kernel] cpu: fix cpu_chain section mismatch (Frederic Weisbecker) [876090 852148] - [kernel] sched: Don't modify cpusets during suspend/resume (Frederic Weisbecker) [876090 852148] - [kernel] sched, cpuset: Drop __cpuexit from cpu hotplug callbacks (Frederic Weisbecker) [876090 852148] - [kernel] sched: adjust when cpu_active and cpuset configurations are updated during cpu on/offlining (Frantisek Hrbata) [876090 852148] - [kernel] cpu: return better errno on cpu hotplug failure (Frederic Weisbecker) [876090 852148] - [kernel] cpu: introduce cpu_notify(), __cpu_notify(), cpu_notify_nofail() (Frederic Weisbecker) [876090 852148] - [fs] nfs: Properly handle the case where the delegation is revoked (Steve Dickson) [846840 842435] - [fs] nfs: Move cl_delegations to the nfs_server struct (Steve Dickson) [846840 842435] - [fs] nfs: Introduce nfs_detach_delegations() (Steve Dickson) [846840 842435] - [fs] nfs: Fix a number of RCU issues in the NFSv4 delegation code (Steve Dickson) [846840 842435] | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-0223 CVE-2012-4398 CVE-2012-4461 CVE-2012-4530 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | kernel |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27059 | |||
Oval ID: | oval:org.mitre.oval:def:27059 | ||
Title: | DEPRECATED: ELSA-2013-0807 -- hypervkvpd security and bug fix update (low) | ||
Description: | [0-0.7.0.1.el5_9.3] - Add support for oracle os [0-0.7.3] - Fix for one more file descriptor leak (rhbz#953502) [0-0.7.2] - Validate Netlink source address (CVE-2012-5532) (rhbz#953560) [0-0.7.1] - Fix for file descriptor leak (rhbz#953502) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-0807 CVE-2012-5532 | Version: | 4 |
Platform(s): | Oracle Linux 5 | Product(s): | hypervkvpd |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-12-18 | Name : Fedora Update for kernel FEDORA-2012-20240 File : nvt/gb_fedora_2012_20240_kernel_fc16.nasl |
2012-12-04 | Name : Fedora Update for kernel FEDORA-2012-19337 File : nvt/gb_fedora_2012_19337_kernel_fc17.nasl |
2012-11-29 | Name : Fedora Update for kernel FEDORA-2012-18691 File : nvt/gb_fedora_2012_18691_kernel_fc16.nasl |
2012-11-23 | Name : Fedora Update for kernel FEDORA-2012-18684 File : nvt/gb_fedora_2012_18684_kernel_fc17.nasl |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0287-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2013-1832-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2013-0674-1.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2013-0008.nasl - Type : ACT_GATHER_INFO |
2014-11-06 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL15797.nasl - Type : ACT_GATHER_INFO |
2014-07-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0566.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-176.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-166.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2507.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2504.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0223.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2013-0807.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2503.nasl - Type : ACT_GATHER_INFO |
2013-06-25 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-176.nasl - Type : ACT_GATHER_INFO |
2013-05-31 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0882.nasl - Type : ACT_GATHER_INFO |
2013-05-15 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2668.nasl - Type : ACT_GATHER_INFO |
2013-05-14 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2013-0807.nasl - Type : ACT_GATHER_INFO |
2013-05-10 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0807.nasl - Type : ACT_GATHER_INFO |
2013-05-10 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130509_hypervkvpd_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-04-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_kernel-8527.nasl - Type : ACT_GATHER_INFO |
2013-04-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_kernel-8518.nasl - Type : ACT_GATHER_INFO |
2013-02-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1726-1.nasl - Type : ACT_GATHER_INFO |
2013-02-13 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1720-1.nasl - Type : ACT_GATHER_INFO |
2013-02-08 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-130125.nasl - Type : ACT_GATHER_INFO |
2013-02-08 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0223.nasl - Type : ACT_GATHER_INFO |
2013-02-07 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130205_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-02-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0223.nasl - Type : ACT_GATHER_INFO |
2013-02-04 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1704-2.nasl - Type : ACT_GATHER_INFO |
2013-02-04 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1699-2.nasl - Type : ACT_GATHER_INFO |
2013-02-04 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1696-2.nasl - Type : ACT_GATHER_INFO |
2013-02-03 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1700-2.nasl - Type : ACT_GATHER_INFO |
2013-02-03 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1698-2.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-121203.nasl - Type : ACT_GATHER_INFO |
2013-01-23 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1704-1.nasl - Type : ACT_GATHER_INFO |
2013-01-18 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1698-1.nasl - Type : ACT_GATHER_INFO |
2013-01-18 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1699-1.nasl - Type : ACT_GATHER_INFO |
2013-01-18 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1696-1.nasl - Type : ACT_GATHER_INFO |
2013-01-18 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1700-1.nasl - Type : ACT_GATHER_INFO |
2013-01-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1691-1.nasl - Type : ACT_GATHER_INFO |
2013-01-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1689-1.nasl - Type : ACT_GATHER_INFO |
2013-01-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1688-1.nasl - Type : ACT_GATHER_INFO |
2013-01-11 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1684-1.nasl - Type : ACT_GATHER_INFO |
2013-01-11 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1683-1.nasl - Type : ACT_GATHER_INFO |
2012-12-18 | Name : The remote Fedora host is missing a security update. File : fedora_2012-20240.nasl - Type : ACT_GATHER_INFO |
2012-12-07 | Name : The remote Fedora host is missing a security update. File : fedora_2012-19804.nasl - Type : ACT_GATHER_INFO |
2012-12-03 | Name : The remote Fedora host is missing a security update. File : fedora_2012-19337.nasl - Type : ACT_GATHER_INFO |
2012-11-29 | Name : The remote Fedora host is missing a security update. File : fedora_2012-18691.nasl - Type : ACT_GATHER_INFO |
2012-11-27 | Name : The remote Fedora host is missing a security update. File : fedora_2012-18740.nasl - Type : ACT_GATHER_INFO |
2012-11-23 | Name : The remote Fedora host is missing a security update. File : fedora_2012-18684.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 12:01:22 |
|
2013-02-18 13:21:44 |
|
2013-02-12 13:19:58 |
|
2013-01-23 13:23:25 |
|
2013-01-18 05:18:53 |
|