Executive Summary

Summary
Title Linux kernel regression
Informations
Name USN-1699-2 First vendor Publication 2013-02-01
Vendor Ubuntu Last vendor Modification 2013-02-01
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:N/I:N/A:C)
Cvss Base Score 4.9 Attack Range Local
Cvss Impact Score 6.9 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.10

Summary:

USN-1699-1 introduced a regression in the Linux kernel.

Software Description: - linux: Linux kernel

Details:

USN-1699-1 fixed vulnerabilities in the Linux kernel. Due to an unrelated regression inotify/fanotify stopped working after upgrading. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Jon Howell reported a flaw in the Linux kernel's KVM (Kernel-based virtual
machine) subsystem's handling of the XSAVE CPU feature. On hosts without the
XSAVE CPU feature, using qemu userspace, an unprivileged local attacker could
exploit this flaw to crash the system. (CVE-2012-4461)

A flaw was discovered in the Linux kernel's handling of script execution
when module loading is enabled. A local attacker could exploit this flaw to
cause a leak of kernel stack contents. (CVE-2012-4530)

Florian Weimer discovered that hypervkvpd, which is distributed in the
Linux kernel, was not correctly validating source addresses of netlink
packets. An untrusted local user can cause a denial of service by causing
hypervkvpd to exit. (CVE-2012-5532)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.10:
linux-image-3.5.0-23-generic 3.5.0-23.35
linux-image-3.5.0-23-highbank 3.5.0-23.35
linux-image-3.5.0-23-omap 3.5.0-23.35
linux-image-3.5.0-23-powerpc-smp 3.5.0-23.35
linux-image-3.5.0-23-powerpc64-smp 3.5.0-23.35

After a standard system update you need to reboot your computer to make all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well.

References:
http://www.ubuntu.com/usn/usn-1699-2
http://www.ubuntu.com/usn/usn-1699-1
https://launchpad.net/bugs/XXXXXX

Package Information:
https://launchpad.net/ubuntu/+source/linux/3.5.0-23.35

Original Source

Url : http://www.ubuntu.com/usn/USN-1699-2

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-200 Information Exposure

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:17314
 
Oval ID: oval:org.mitre.oval:def:17314
Title: USN-1699-1 -- linux vulnerabilities
Description: Several security issues were fixed in the kernel.
Family: unix Class: patch
Reference(s): USN-1699-1
CVE-2012-4461
CVE-2012-4530
CVE-2012-5532
Version: 7
Platform(s): Ubuntu 12.10
Product(s): linux
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:17337
 
Oval ID: oval:org.mitre.oval:def:17337
Title: USN-1696-1 -- linux vulnerabilities
Description: Several security issues were fixed in the kernel.
Family: unix Class: patch
Reference(s): USN-1696-1
CVE-2012-4461
CVE-2012-4530
CVE-2012-5532
Version: 7
Platform(s): Ubuntu 12.04
Product(s): linux
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:17680
 
Oval ID: oval:org.mitre.oval:def:17680
Title: USN-1698-1 -- linux-ti-omap4 vulnerabilities
Description: Several security issues were fixed in the kernel.
Family: unix Class: patch
Reference(s): USN-1698-1
CVE-2012-4530
CVE-2012-5532
Version: 7
Platform(s): Ubuntu 12.04
Product(s): linux-ti-omap4
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:17779
 
Oval ID: oval:org.mitre.oval:def:17779
Title: USN-1700-1 -- linux-ti-omap4 vulnerabilities
Description: Several security issues were fixed in the kernel.
Family: unix Class: patch
Reference(s): USN-1700-1
CVE-2012-4530
CVE-2012-5532
Version: 7
Platform(s): Ubuntu 12.10
Product(s): linux-ti-omap4
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:17858
 
Oval ID: oval:org.mitre.oval:def:17858
Title: USN-1700-2 -- linux-ti-omap4 regression
Description: USN-1700-1 introduced a regression in the Linux kernel.
Family: unix Class: patch
Reference(s): USN-1700-2
CVE-2012-4530
CVE-2012-5532
Version: 7
Platform(s): Ubuntu 12.10
Product(s): linux-ti-omap4
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:17884
 
Oval ID: oval:org.mitre.oval:def:17884
Title: USN-1688-1 -- linux-lts-backport-oneiric vulnerabilities
Description: Several security issues were fixed in the kernel.
Family: unix Class: patch
Reference(s): USN-1688-1
CVE-2012-4461
CVE-2012-4530
Version: 7
Platform(s): Ubuntu 10.04
Product(s): linux-lts-backport-oneiric
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:17894
 
Oval ID: oval:org.mitre.oval:def:17894
Title: USN-1696-2 -- linux regression
Description: USN-1696-1 introduced a regression in the Linux kernel.
Family: unix Class: patch
Reference(s): USN-1696-2
CVE-2012-4461
CVE-2012-4530
CVE-2012-5532
Version: 7
Platform(s): Ubuntu 12.04
Product(s): linux
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:17933
 
Oval ID: oval:org.mitre.oval:def:17933
Title: USN-1691-1 -- linux-ti-omap4 vulnerability
Description: The system could be made to leak data on the kernel stack.
Family: unix Class: patch
Reference(s): USN-1691-1
CVE-2012-4530
Version: 7
Platform(s): Ubuntu 11.10
Product(s): linux-ti-omap4
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18011
 
Oval ID: oval:org.mitre.oval:def:18011
Title: USN-1698-2 -- linux-ti-omap4 regression
Description: USN-1698-1 introduced a regression in the Linux kernel.
Family: unix Class: patch
Reference(s): USN-1698-2
CVE-2012-4530
CVE-2012-5532
Version: 7
Platform(s): Ubuntu 12.04
Product(s): linux-ti-omap4
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18036
 
Oval ID: oval:org.mitre.oval:def:18036
Title: USN-1704-2 -- linux-lts-quantal - Linux kernel hardware enablement from Quantal regression
Description: USN-1704-1 introduced a regression in the Linux kernel.
Family: unix Class: patch
Reference(s): USN-1704-2
CVE-2012-0957
CVE-2012-4461
CVE-2012-4508
CVE-2012-4530
CVE-2012-4565
CVE-2012-5517
CVE-2012-5532
Version: 8
Platform(s): Ubuntu 12.04
Product(s): linux-lts-quantal
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18072
 
Oval ID: oval:org.mitre.oval:def:18072
Title: USN-1684-1 -- linux-ec2 vulnerability
Description: The system could be made to leak sensitive system information.
Family: unix Class: patch
Reference(s): USN-1684-1
CVE-2012-4530
Version: 7
Platform(s): Ubuntu 10.04
Product(s): linux-ec2
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18124
 
Oval ID: oval:org.mitre.oval:def:18124
Title: USN-1699-2 -- linux regression
Description: USN-1699-1 introduced a regression in the Linux kernel.
Family: unix Class: patch
Reference(s): USN-1699-2
CVE-2012-4461
CVE-2012-4530
CVE-2012-5532
Version: 7
Platform(s): Ubuntu 12.10
Product(s): linux
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18186
 
Oval ID: oval:org.mitre.oval:def:18186
Title: USN-1726-1 -- linux-ti-omap4 vulnerabilities
Description: Several security issues were fixed in the kernel.
Family: unix Class: patch
Reference(s): USN-1726-1
CVE-2012-2669
CVE-2012-4508
CVE-2012-5532
Version: 7
Platform(s): Ubuntu 11.10
Product(s): linux-ti-omap4
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18273
 
Oval ID: oval:org.mitre.oval:def:18273
Title: USN-1683-1 -- linux vulnerability
Description: The system could be made to leak sensitive system information.
Family: unix Class: patch
Reference(s): USN-1683-1
CVE-2012-4530
Version: 7
Platform(s): Ubuntu 10.04
Product(s): linux
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18283
 
Oval ID: oval:org.mitre.oval:def:18283
Title: USN-1689-1 -- linux vulnerabilities
Description: Several security issues were fixed in the kernel.
Family: unix Class: patch
Reference(s): USN-1689-1
CVE-2012-4461
CVE-2012-4530
Version: 7
Platform(s): Ubuntu 11.10
Product(s): linux
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:20850
 
Oval ID: oval:org.mitre.oval:def:20850
Title: RHSA-2013:0223: kernel security and bug fix update (Moderate)
Description: The load_script function in fs/binfmt_script.c in the Linux kernel before 3.7.2 does not properly handle recursion, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
Family: unix Class: patch
Reference(s): RHSA-2013:0223-01
CESA-2013:0223
CVE-2012-4398
CVE-2012-4461
CVE-2012-4530
Version: 45
Platform(s): Red Hat Enterprise Linux 6
CentOS Linux 6
Product(s): kernel
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21185
 
Oval ID: oval:org.mitre.oval:def:21185
Title: RHSA-2013:0807: hypervkvpd security and bug fix update (Low)
Description: The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.8-rc1, allows local users to cause a denial of service (daemon exit) via a crafted application that sends a Netlink message. NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-2669.
Family: unix Class: patch
Reference(s): RHSA-2013:0807-00
CESA-2013:0807
CVE-2012-5532
Version: 4
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Product(s): hypervkvpd
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23524
 
Oval ID: oval:org.mitre.oval:def:23524
Title: ELSA-2013:0807: hypervkvpd security and bug fix update (Low)
Description: The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.8-rc1, allows local users to cause a denial of service (daemon exit) via a crafted application that sends a Netlink message. NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-2669.
Family: unix Class: patch
Reference(s): ELSA-2013:0807-00
CVE-2012-5532
Version: 6
Platform(s): Oracle Linux 5
Product(s): hypervkvpd
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23832
 
Oval ID: oval:org.mitre.oval:def:23832
Title: ELSA-2013:0223: kernel security and bug fix update (Moderate)
Description: The load_script function in fs/binfmt_script.c in the Linux kernel before 3.7.2 does not properly handle recursion, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
Family: unix Class: patch
Reference(s): ELSA-2013:0223-01
CVE-2012-4398
CVE-2012-4461
CVE-2012-4530
Version: 17
Platform(s): Oracle Linux 6
Product(s): kernel
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26226
 
Oval ID: oval:org.mitre.oval:def:26226
Title: SUSE-SU-2013:0259-1 -- kernel update for SLE11 SP2
Description: The SUSE Linux Enterprise 11 SP2 kernel was updated to 3.0.58, fixing various bugs and security issues.
Family: unix Class: patch
Reference(s): SUSE-SU-2013:0259-1
CVE-2012-4565
CVE-2012-0957
CVE-2012-4530
Version: 3
Platform(s): SUSE Linux Enterprise Server 11
SUSE Linux Enterprise Desktop 11
Product(s): SLE11 SP2
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26824
 
Oval ID: oval:org.mitre.oval:def:26824
Title: DEPRECATED: ELSA-2013-0223 -- kernel security and bug fix update (moderate)
Description: [2.6.32-279.22.1] - [virt] kvm: invalid opcode oops on SET_SREGS with OSXSAVE bit set (Petr Matousek) [862903 862904] {CVE-2012-4461} - [fs] fuse: optimize __fuse_direct_io() (Brian Foster) [865305 858850] - [fs] fuse: optimize fuse_get_user_pages() (Brian Foster) [865305 858850] - [fs] fuse: use get_user_pages_fast() (Brian Foster) [865305 858850] - [fs] fuse: pass iov[] to fuse_get_user_pages() (Brian Foster) [865305 858850] - [fs] mm: minor cleanup of iov_iter_single_seg_count() (Brian Foster) [865305 858850] - [fs] fuse: use req->page_descs[] for argpages cases (Brian Foster) [865305 858850] to fuse_req (Brian Foster) [865305 858850] - [fs] fuse: rework fuse_do_ioctl() (Brian Foster) [865305 858850] - [fs] fuse: rework fuse_perform_write() (Brian Foster) [865305 858850] - [fs] fuse: rework fuse_readpages() (Brian Foster) [865305 858850] - [fs] fuse: categorize fuse_get_req() (Brian Foster) [865305 858850] - [fs] fuse: general infrastructure for pages[] of variable size (Brian Foster) [865305 858850] - [fs] exec: do not leave bprm->interp on stack (Josh Poimboeuf) [880145 880146] {CVE-2012-4530} - [fs] exec: use -ELOOP for max recursion depth (Josh Poimboeuf) [880145 880146] {CVE-2012-4530} - [scsi] have scsi_internal_device_unblock take new state (Frantisek Hrbata) [878774 854140] - [scsi] add new SDEV_TRANSPORT_OFFLINE state (Chris Leech) [878774 854140] - [kernel] cpu: fix cpu_chain section mismatch (Frederic Weisbecker) [876090 852148] - [kernel] sched: Don't modify cpusets during suspend/resume (Frederic Weisbecker) [876090 852148] - [kernel] sched, cpuset: Drop __cpuexit from cpu hotplug callbacks (Frederic Weisbecker) [876090 852148] - [kernel] sched: adjust when cpu_active and cpuset configurations are updated during cpu on/offlining (Frantisek Hrbata) [876090 852148] - [kernel] cpu: return better errno on cpu hotplug failure (Frederic Weisbecker) [876090 852148] - [kernel] cpu: introduce cpu_notify(), __cpu_notify(), cpu_notify_nofail() (Frederic Weisbecker) [876090 852148] - [fs] nfs: Properly handle the case where the delegation is revoked (Steve Dickson) [846840 842435] - [fs] nfs: Move cl_delegations to the nfs_server struct (Steve Dickson) [846840 842435] - [fs] nfs: Introduce nfs_detach_delegations() (Steve Dickson) [846840 842435] - [fs] nfs: Fix a number of RCU issues in the NFSv4 delegation code (Steve Dickson) [846840 842435]
Family: unix Class: patch
Reference(s): ELSA-2013-0223
CVE-2012-4398
CVE-2012-4461
CVE-2012-4530
Version: 4
Platform(s): Oracle Linux 6
Product(s): kernel
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27059
 
Oval ID: oval:org.mitre.oval:def:27059
Title: DEPRECATED: ELSA-2013-0807 -- hypervkvpd security and bug fix update (low)
Description: [0-0.7.0.1.el5_9.3] - Add support for oracle os [0-0.7.3] - Fix for one more file descriptor leak (rhbz#953502) [0-0.7.2] - Validate Netlink source address (CVE-2012-5532) (rhbz#953560) [0-0.7.1] - Fix for file descriptor leak (rhbz#953502)
Family: unix Class: patch
Reference(s): ELSA-2013-0807
CVE-2012-5532
Version: 4
Platform(s): Oracle Linux 5
Product(s): hypervkvpd
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Os 1802

OpenVAS Exploits

Date Description
2012-12-18 Name : Fedora Update for kernel FEDORA-2012-20240
File : nvt/gb_fedora_2012_20240_kernel_fc16.nasl
2012-12-04 Name : Fedora Update for kernel FEDORA-2012-19337
File : nvt/gb_fedora_2012_19337_kernel_fc17.nasl
2012-11-29 Name : Fedora Update for kernel FEDORA-2012-18691
File : nvt/gb_fedora_2012_18691_kernel_fc16.nasl
2012-11-23 Name : Fedora Update for kernel FEDORA-2012-18684
File : nvt/gb_fedora_2012_18684_kernel_fc17.nasl

Nessus® Vulnerability Scanner

Date Description
2015-05-20 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2014-0287-1.nasl - Type : ACT_GATHER_INFO
2015-05-20 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2013-1832-1.nasl - Type : ACT_GATHER_INFO
2015-05-20 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2013-0674-1.nasl - Type : ACT_GATHER_INFO
2014-11-26 Name : The remote OracleVM host is missing one or more security updates.
File : oraclevm_OVMSA-2013-0008.nasl - Type : ACT_GATHER_INFO
2014-11-06 Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL15797.nasl - Type : ACT_GATHER_INFO
2014-07-22 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-0566.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2013-176.nasl - Type : ACT_GATHER_INFO
2013-09-04 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2013-166.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2013-2507.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2013-2504.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2013-0223.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing a security update.
File : oraclelinux_ELSA-2013-0807.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2013-2503.nasl - Type : ACT_GATHER_INFO
2013-06-25 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2013-176.nasl - Type : ACT_GATHER_INFO
2013-05-31 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-0882.nasl - Type : ACT_GATHER_INFO
2013-05-15 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2668.nasl - Type : ACT_GATHER_INFO
2013-05-14 Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2013-0807.nasl - Type : ACT_GATHER_INFO
2013-05-10 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-0807.nasl - Type : ACT_GATHER_INFO
2013-05-10 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20130509_hypervkvpd_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2013-04-13 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_kernel-8527.nasl - Type : ACT_GATHER_INFO
2013-04-13 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_kernel-8518.nasl - Type : ACT_GATHER_INFO
2013-02-15 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1726-1.nasl - Type : ACT_GATHER_INFO
2013-02-13 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1720-1.nasl - Type : ACT_GATHER_INFO
2013-02-08 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_kernel-130125.nasl - Type : ACT_GATHER_INFO
2013-02-08 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2013-0223.nasl - Type : ACT_GATHER_INFO
2013-02-07 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20130205_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2013-02-06 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-0223.nasl - Type : ACT_GATHER_INFO
2013-02-04 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-1704-2.nasl - Type : ACT_GATHER_INFO
2013-02-04 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1699-2.nasl - Type : ACT_GATHER_INFO
2013-02-04 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1696-2.nasl - Type : ACT_GATHER_INFO
2013-02-03 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1700-2.nasl - Type : ACT_GATHER_INFO
2013-02-03 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1698-2.nasl - Type : ACT_GATHER_INFO
2013-01-25 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_kernel-121203.nasl - Type : ACT_GATHER_INFO
2013-01-23 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-1704-1.nasl - Type : ACT_GATHER_INFO
2013-01-18 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1698-1.nasl - Type : ACT_GATHER_INFO
2013-01-18 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1699-1.nasl - Type : ACT_GATHER_INFO
2013-01-18 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1696-1.nasl - Type : ACT_GATHER_INFO
2013-01-18 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1700-1.nasl - Type : ACT_GATHER_INFO
2013-01-15 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1691-1.nasl - Type : ACT_GATHER_INFO
2013-01-15 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1689-1.nasl - Type : ACT_GATHER_INFO
2013-01-15 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1688-1.nasl - Type : ACT_GATHER_INFO
2013-01-11 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-1684-1.nasl - Type : ACT_GATHER_INFO
2013-01-11 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1683-1.nasl - Type : ACT_GATHER_INFO
2012-12-18 Name : The remote Fedora host is missing a security update.
File : fedora_2012-20240.nasl - Type : ACT_GATHER_INFO
2012-12-07 Name : The remote Fedora host is missing a security update.
File : fedora_2012-19804.nasl - Type : ACT_GATHER_INFO
2012-12-03 Name : The remote Fedora host is missing a security update.
File : fedora_2012-19337.nasl - Type : ACT_GATHER_INFO
2012-11-29 Name : The remote Fedora host is missing a security update.
File : fedora_2012-18691.nasl - Type : ACT_GATHER_INFO
2012-11-27 Name : The remote Fedora host is missing a security update.
File : fedora_2012-18740.nasl - Type : ACT_GATHER_INFO
2012-11-23 Name : The remote Fedora host is missing a security update.
File : fedora_2012-18684.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2014-02-17 12:01:22
  • Multiple Updates
2013-02-18 13:21:44
  • Multiple Updates
2013-02-01 13:19:26
  • First insertion