Executive Summary
Summary | |
---|---|
Title | Linux kernel (OMAP4) vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-2067-1 | First vendor Publication | 2014-01-03 |
Vendor | Ubuntu | Last vendor Modification | 2014-01-03 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 LTS Summary: Several security issues were fixed in the kernel. Software Description: - linux-ti-omap4: Linux kernel for OMAP4 Details: A flaw was discovered in the Linux kernel's dm snapshot facility. A remote authenticated user could exploit this flaw to obtain sensitive information or modify/corrupt data. (CVE-2013-4299) Hannes Frederic Sowa discovered a flaw in the Linux kernel's UDP Fragmentation Offload (UFO). An unprivileged local user could exploit this flaw to cause a denial of service (system crash) or possibly gain administrative privileges. (CVE-2013-4470) Multiple integer overflow flaws were discovered in the Alchemy LCD frame- buffer drivers in the Linux kernel. An unprivileged local user could exploit this flaw to gain administrative privileges. (CVE-2013-4511) Nico Golde and Fabian Yamaguchi reported a flaw in the Linux kernel's driver for Agere Systems HERMES II Wireless PC Cards. A local user with the CAP_NET_ADMIN capability could exploit this flaw to cause a denial of service or possibly gain adminstrative priviliges. (CVE-2013-4514) Nico Golde and Fabian Yamaguchi reported a flaw in the Linux kernel's driver for Beceem WIMAX chipset based devices. An unprivileged local user could exploit this flaw to obtain sensitive information from kernel memory. (CVE-2013-4515) A flaw in the handling of memory regions of the kernel virtual machine (KVM) subsystem was discovered. A local user with the ability to assign a device could exploit this flaw to cause a denial of service (memory consumption). (CVE-2013-4592) Catalin Marinas reported a flaw in the get_user and put_user API functions in the Linux kernel on ARM platforms. An unprivileged local user could exploit this flaw to gain administrator privileges. (CVE-2013-6282) Nico Golde and Fabian Yamaguchi reported a flaw in the Linux kernel's debugfs filesystem. An administrative local user could exploit this flaw to cause a denial of service (OOPS). (CVE-2013-6378) A flaw was discovered in the Linux kernel's compat ioctls for Adaptec AACRAID scsi raid devices. An unprivileged local user could send administrative commands to these devices potentially compromising the data stored on the device. (CVE-2013-6383) Nico Golde reported a flaw in the Linux kernel's userspace IO (uio) driver. A local user could exploit this flaw to cause a denial of service (memory corruption) or possibly gain privileges. (CVE-2013-6763) Evan Huus reported a buffer overflow in the Linux kernel's radiotap header parsing. A remote attacker could cause a denial of service (buffer over- read) via a specially crafted header. (CVE-2013-7027) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 LTS: After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well. References: Package Information: |
Original Source
Url : http://www.ubuntu.com/usn/USN-2067-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
25 % | CWE-264 | Permissions, Privileges, and Access Controls |
25 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
17 % | CWE-200 | Information Exposure |
17 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
8 % | CWE-399 | Resource Management Errors |
8 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:18748 | |||
Oval ID: | oval:org.mitre.oval:def:18748 | ||
Title: | USN-2016-1 -- linux-ec2 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2016-1 CVE-2013-2147 CVE-2013-2889 CVE-2013-2893 CVE-2013-2897 CVE-2013-4299 | Version: | 5 |
Platform(s): | Ubuntu 10.04 | Product(s): | linux-ec2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19533 | |||
Oval ID: | oval:org.mitre.oval:def:19533 | ||
Title: | USN-2040-1 -- linux-lts-quantal vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2040-1 CVE-2013-4299 CVE-2013-4470 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-quantal |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19618 | |||
Oval ID: | oval:org.mitre.oval:def:19618 | ||
Title: | USN-2044-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2044-1 CVE-2013-4299 CVE-2013-4470 | Version: | 5 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19865 | |||
Oval ID: | oval:org.mitre.oval:def:19865 | ||
Title: | USN-2043-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2043-1 CVE-2013-4299 CVE-2013-4470 | Version: | 5 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19894 | |||
Oval ID: | oval:org.mitre.oval:def:19894 | ||
Title: | USN-2037-1 -- linux-ec2 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2037-1 CVE-2012-2121 CVE-2013-4511 | Version: | 5 |
Platform(s): | Ubuntu 10.04 | Product(s): | linux-ec2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19897 | |||
Oval ID: | oval:org.mitre.oval:def:19897 | ||
Title: | USN-2046-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2046-1 CVE-2013-4299 CVE-2013-4470 | Version: | 5 |
Platform(s): | Ubuntu 13.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20001 | |||
Oval ID: | oval:org.mitre.oval:def:20001 | ||
Title: | USN-2042-1 -- linux-lts-saucy vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2042-1 CVE-2013-4299 CVE-2013-4470 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-saucy |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20412 | |||
Oval ID: | oval:org.mitre.oval:def:20412 | ||
Title: | USN-2072-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2072-1 CVE-2013-2930 CVE-2013-4345 CVE-2013-4511 CVE-2013-4513 CVE-2013-4514 CVE-2013-4515 CVE-2013-6383 CVE-2013-6763 CVE-2013-7027 | Version: | 5 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20590 | |||
Oval ID: | oval:org.mitre.oval:def:20590 | ||
Title: | USN-2049-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2049-1 CVE-2013-4270 CVE-2013-4299 CVE-2013-4343 CVE-2013-4350 CVE-2013-4387 CVE-2013-4470 | Version: | 5 |
Platform(s): | Ubuntu 13.10 | Product(s): | linux |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20666 | |||
Oval ID: | oval:org.mitre.oval:def:20666 | ||
Title: | USN-2069-1 -- linux-lts-raring vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2069-1 CVE-2013-4470 CVE-2013-4511 CVE-2013-4513 CVE-2013-4514 CVE-2013-4515 CVE-2013-4516 CVE-2013-6383 CVE-2013-6763 CVE-2013-7027 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-raring |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20813 | |||
Oval ID: | oval:org.mitre.oval:def:20813 | ||
Title: | USN-2073-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2073-1 CVE-2013-4470 CVE-2013-4511 CVE-2013-4513 CVE-2013-4514 CVE-2013-4515 CVE-2013-4516 CVE-2013-6383 CVE-2013-6763 CVE-2013-7027 | Version: | 5 |
Platform(s): | Ubuntu 13.04 | Product(s): | linux |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20858 | |||
Oval ID: | oval:org.mitre.oval:def:20858 | ||
Title: | USN-2067-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2067-1 CVE-2013-4299 CVE-2013-4470 CVE-2013-4511 CVE-2013-4514 CVE-2013-4515 CVE-2013-4592 CVE-2013-6282 CVE-2013-6378 CVE-2013-6383 CVE-2013-6763 CVE-2013-7027 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20902 | |||
Oval ID: | oval:org.mitre.oval:def:20902 | ||
Title: | USN-2074-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2074-1 CVE-2013-2930 CVE-2013-4345 CVE-2013-4511 CVE-2013-4513 CVE-2013-4514 CVE-2013-4515 CVE-2013-6383 CVE-2013-6763 CVE-2013-7027 | Version: | 5 |
Platform(s): | Ubuntu 13.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:21041 | |||
Oval ID: | oval:org.mitre.oval:def:21041 | ||
Title: | USN-2050-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2050-1 CVE-2013-0343 CVE-2013-2147 CVE-2013-2888 CVE-2013-2889 CVE-2013-2892 CVE-2013-2893 CVE-2013-2895 CVE-2013-2896 CVE-2013-2897 CVE-2013-2899 CVE-2013-4299 CVE-2013-4350 CVE-2013-4387 CVE-2013-4470 | Version: | 5 |
Platform(s): | Ubuntu 13.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:21170 | |||
Oval ID: | oval:org.mitre.oval:def:21170 | ||
Title: | USN-2076-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2076-1 CVE-2013-2930 CVE-2013-4345 CVE-2013-4511 CVE-2013-4513 CVE-2013-4514 CVE-2013-4515 CVE-2013-6383 CVE-2013-6763 CVE-2013-7027 | Version: | 5 |
Platform(s): | Ubuntu 13.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:21245 | |||
Oval ID: | oval:org.mitre.oval:def:21245 | ||
Title: | USN-2066-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2066-1 CVE-2013-4299 CVE-2013-4470 CVE-2013-4511 CVE-2013-4514 CVE-2013-4515 CVE-2013-4592 CVE-2013-6378 CVE-2013-6383 CVE-2013-6763 CVE-2013-7027 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21272 | |||
Oval ID: | oval:org.mitre.oval:def:21272 | ||
Title: | USN-2068-1 -- linux-lts-quantal vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2068-1 CVE-2013-2930 CVE-2013-4345 CVE-2013-4511 CVE-2013-4513 CVE-2013-4514 CVE-2013-4515 CVE-2013-6383 CVE-2013-6763 CVE-2013-7027 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-quantal |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:21306 | |||
Oval ID: | oval:org.mitre.oval:def:21306 | ||
Title: | USN-2071-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2071-1 CVE-2013-2930 CVE-2013-4345 CVE-2013-4511 CVE-2013-4513 CVE-2013-4514 CVE-2013-4515 CVE-2013-6383 CVE-2013-6763 CVE-2013-7027 | Version: | 5 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21338 | |||
Oval ID: | oval:org.mitre.oval:def:21338 | ||
Title: | USN-2065-1 -- linux-ec2 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2065-1 CVE-2013-4345 CVE-2013-4588 CVE-2013-6378 CVE-2013-6763 | Version: | 5 |
Platform(s): | Ubuntu 10.04 | Product(s): | linux-ec2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:24317 | |||
Oval ID: | oval:org.mitre.oval:def:24317 | ||
Title: | USN-2112-1 -- linux-lts-raring vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2112-1 CVE-2013-2929 CVE-2013-2930 CVE-2013-4592 CVE-2013-6378 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-raring |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:26799 | |||
Oval ID: | oval:org.mitre.oval:def:26799 | ||
Title: | SUSE-SU-2014:1105-1 -- Security update for the Linux Kernel | ||
Description: | The SUSE Linux Enterprise Server 11 SP2 LTSS received a roll up update to fix several security and non-security issues. The following security issues have been fixed: * CVE-2014-0055: The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package before 2.6.32-431.11.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly handle vhost_get_vq_desc errors, which allows guest OS users to cause a denial of service (host OS crash) via unspecified vectors. (bnc#870173) * CVE-2014-0077: drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions. (bnc#870576) * CVE-2014-1739: The media_device_enum_entities function in drivers/media/media-device.c in the Linux kernel before 3.14.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call. (bnc#882804) * CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via network traffic that improperly interacts with the WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and tx.c. (bnc#871797) * CVE-2014-2851: Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter. (bnc#873374) * CVE-2014-3144: The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced. (bnc#877257) * CVE-2014-3145: The BPF_S_ANC_NLATTR_NEST extension implementation in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 uses the reverse order in a certain subtraction, which allows local users to cause a denial of service (over-read and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr_nest function before the vulnerability was announced. (bnc#877257) * CVE-2014-3917: kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number. (bnc#880484) * CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000. (bnc#883724) * CVE-2014-4652: Race condition in the tlv handler functionality in the snd_ctl_elem_user_tlv function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allows local users to obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access. (bnc#883795) * CVE-2014-4653: sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access. (bnc#883795) * CVE-2014-4654: The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not check authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE commands, which allows local users to remove kernel controls and cause a denial of service (use-after-free and system crash) by leveraging /dev/snd/controlCX access for an ioctl call. (bnc#883795) * CVE-2014-4655: The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not properly maintain the user_ctl_count value, which allows local users to cause a denial of service (integer overflow and limit bypass) by leveraging /dev/snd/controlCX access for a large number of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls. (bnc#883795) * CVE-2014-4656: Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allow local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflict function. (bnc#883795) * CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet. (bnc#885422) * CVE-2014-4699: The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls. (bnc#885725) * CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction. (bnc#889173) * CVE-2013-4299: Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device. (bnc#846404) The following bugs have been fixed: * pagecachelimit: reduce lru_lock contention for heavy parallel reclaim (bnc#878509, bnc#864464). * pagecachelimit: reduce lru_lock contention for heavy parallel reclaim kabi fixup (bnc#878509, bnc#864464). * ACPI / PAD: call schedule() when need_resched() is true (bnc#866911). * kabi: Fix breakage due to addition of user_ctl_lock (bnc#883795). * cpuset: Fix memory allocator deadlock (bnc#876590). * tcp: allow to disable cwnd moderation in TCP_CA_Loss state (bnc#879921). * tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921). * vlan: more careful checksum features handling (bnc#872634). * bonding: fix vlan_features computing (bnc#872634). * NFSv4: Minor cleanups for nfs4_handle_exception and nfs4_async_handle_error (bnc#889324). * NFS: Do not lose sockets when nfsd shutdown races with connection timeout (bnc#871854). * reiserfs: call truncate_setsize under tailpack mutex (bnc#878115). * reiserfs: drop vmtruncate (bnc#878115). * megaraid_sas: mask off flags in ioctl path (bnc#886474). * block: fix race between request completion and timeout handling (bnc#881051). * drivers/rtc/interface.c: fix infinite loop in initializing the alarm (bnc#871676). * xfrm: check peer pointer for null before calling inet_putpeer() (bnc#877775). * supported.conf: Add firewire/nosy as supported. This driver is the replacement for the ieee1394/pcilynx driver, which was supported. Security Issues: * CVE-2013-4299 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4299> * CVE-2014-0055 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0055> * CVE-2014-0077 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0077> * CVE-2014-1739 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739> * CVE-2014-2706 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706> * CVE-2014-2851 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2851> * CVE-2014-3144 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3144> * CVE-2014-3145 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145> * CVE-2014-3917 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917> * CVE-2014-4508 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508> * CVE-2014-4652 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4652> * CVE-2014-4653 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4653> * CVE-2014-4654 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4654> * CVE-2014-4655 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4655> * CVE-2014-4656 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4656> * CVE-2014-4667 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667> * CVE-2014-4699 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4699> * CVE-2014-5077 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077> | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1105-1 CVE-2014-0055 CVE-2014-0077 CVE-2014-1739 CVE-2014-2706 CVE-2014-2851 CVE-2014-3144 CVE-2014-3145 CVE-2014-3917 CVE-2014-4508 CVE-2014-4652 CVE-2014-4653 CVE-2014-4654 CVE-2014-4655 CVE-2014-4656 CVE-2014-4667 CVE-2014-4699 CVE-2014-5077 CVE-2013-4299 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 | Product(s): | the Linux Kernel |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27289 | |||
Oval ID: | oval:org.mitre.oval:def:27289 | ||
Title: | DEPRECATED: ELSA-2013-1436 -- kernel security and bug fix update (moderate) | ||
Description: | [2.6.32-358.23.2] - [md] dm-snapshot: fix data corruption (Mikulas Patocka) [1004252 1004233] {CVE-2013-4299} | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-1436 CVE-2013-4162 CVE-2013-4299 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | kernel |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27318 | |||
Oval ID: | oval:org.mitre.oval:def:27318 | ||
Title: | ELSA-2014-3021 -- Unbreakable Enterprise kernel security update (important) | ||
Description: | [3.8.13-26.2.4.el6uek] - aacraid: missing capable() check in compat ioctl (Dan Carpenter) [Orabug: 18721961] {CVE-2013-6383} - vhost: fix total length when packets are too short (Michael S. Tsirkin) [Orabug: 18721976] {CVE-2014-0077} | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-3021 CVE-2014-0077 CVE-2013-6383 | Version: | 5 |
Platform(s): | Oracle Linux 6 | Product(s): | dtrace-modules kernel-uek kernel-uek-debug kernel-uek-debug-devel kernel-uek-devel kernel-uek-doc kernel-uek-firmware kernel-uek-headers |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27338 | |||
Oval ID: | oval:org.mitre.oval:def:27338 | ||
Title: | ELSA-2013-2583 -- Unbreakable Enterprise Kernel security update (important) | ||
Description: | [3.8.13-16.2.2.el6uek] - HID: pantherlord: validate output report details (Kees Cook) [Orabug: 17841973] {CVE-2013-2892} - HID: zeroplus: validate output report details (Kees Cook) [Orabug: 17841968] {CVE-2013-2889} - HID: provide a helper for validating hid reports (Kees Cook) [Orabug: 17841968] {CVE-2013-2889} - KVM: Fix iommu map/unmap to handle memory slot moves (Alex Williamson) [Orabug: 17841960] {CVE-2013-4592} - ansi_cprng: Fix off by one error in non-block size request (Jerry Snitselaar) [Orabug: 17837997] {CVE-2013-4345} - HID: validate HID report id size (Kees Cook) [Orabug: 17841940] {CVE-2013-2888} - ipv6: remove max_addresses check from ipv6_create_tempaddr (Hannes Frederic Sowa) [Orabug: 17841911] {CVE-2013-0343} - ipv6: udp packets following an UFO enqueued packet need also be handled by UFO (Hannes Frederic Sowa) [Orabug: 17841928] {CVE-2013-4387} | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-2583 CVE-2013-0343 CVE-2013-4345 CVE-2013-2888 CVE-2013-2889 CVE-2013-2892 CVE-2013-4387 CVE-2013-4592 | Version: | 5 |
Platform(s): | Oracle Linux 6 | Product(s): | dtrace-modules kernel-uek dtrace-modules-3.8.13-16.2.2.el6uek-provider-headers kernel-uek-debug kernel-uek-debug-devel kernel-uek-devel kernel-uek-doc kernel-uek-firmware kernel-uek-headers |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27431 | |||
Oval ID: | oval:org.mitre.oval:def:27431 | ||
Title: | ELSA-2013-2584 -- Unbreakable Enterprise Kernel security update (important) | ||
Description: | [2.6.39-400.211.2] - fs/compat_ioctl.c: VIDEO_SET_SPU_PALETTE missing error check (Kees Cook) [Orabug: 17842208] {CVE-2013-1928} - Bluetooth: RFCOMM - Fix info leak via getsockname() (Mathias Krause) [Orabug: 17842129] {CVE-2012-6545} - Bluetooth: RFCOMM - Fix info leak in ioctl(RFCOMMGETDEVLIST) (Mathias Krause) [Orabug: 17842105] {CVE-2012-6545} - llc: Fix missing msg_namelen update in llc_ui_recvmsg() (Mathias Krause) [Orabug: 17842095] {CVE-2013-3231} - HID: pantherlord: validate output report details (Kees Cook) [Orabug: 17842084] {CVE-2013-2892} - HID: zeroplus: validate output report details (Kees Cook) [Orabug: 17842081] {CVE-2013-2889} - HID: provide a helper for validating hid reports (Kees Cook) [Orabug: 17842081] {CVE-2013-2889} - KVM: Fix iommu map/unmap to handle memory slot moves (Jerry Snitselaar) [Orabug: 17842075] {CVE-2013-4592} - ansi_cprng: Fix off by one error in non-block size request (Jerry Snitselaar) [Orabug: 17842072] {CVE-2013-4345} - HID: validate HID report id size (Kees Cook) [Orabug: 17842063] {CVE-2013-2888} - ipv6: remove max_addresses check from ipv6_create_tempaddr (Hannes Frederic Sowa) [Orabug: 17842056] {CVE-2013-0343} - ipv6: udp packets following an UFO enqueued packet need also be handled by UFO (Hannes Frederic Sowa) [Orabug: 17842050] {CVE-2013-4387} | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-2584 CVE-2012-6545 CVE-2013-3231 CVE-2013-0343 CVE-2013-4345 CVE-2013-1928 CVE-2013-2888 CVE-2013-2889 CVE-2013-2892 CVE-2013-4387 CVE-2013-4592 | Version: | 3 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | kernel-uek kernel-uek-debug kernel-uek-debug-devel kernel-uek-devel kernel-uek-doc kernel-uek-firmware |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2014-02-11 | Linux ARM - Local Root Exploit |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-18 | Linux kernel ARM put_user write outside process address space privilege escal... RuleID : 28999 - Revision : 3 - Type : OS-LINUX |
2014-01-18 | Linux kernel ARM put_user write outside process address space privilege escal... RuleID : 28998 - Revision : 3 - Type : OS-LINUX |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-04-03 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2017-0057.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0140-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0189-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0287-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0536-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0832-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-1105-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-0652-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-0812-1.nasl - Type : ACT_GATHER_INFO |
2014-11-12 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-1645.nasl - Type : ACT_GATHER_INFO |
2014-11-11 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2014-0815.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1450.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2013-1460.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1519.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2013-1527.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1783.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2013-1802.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1860.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0284.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0476.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2014-0629.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0634.nasl - Type : ACT_GATHER_INFO |
2014-08-08 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-155.nasl - Type : ACT_GATHER_INFO |
2014-07-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1490.nasl - Type : ACT_GATHER_INFO |
2014-07-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0100.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-140709.nasl - Type : ACT_GATHER_INFO |
2014-06-23 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0771.nasl - Type : ACT_GATHER_INFO |
2014-06-23 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3042.nasl - Type : ACT_GATHER_INFO |
2014-06-23 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3043.nasl - Type : ACT_GATHER_INFO |
2014-06-20 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0771.nasl - Type : ACT_GATHER_INFO |
2014-06-20 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0771.nasl - Type : ACT_GATHER_INFO |
2014-06-20 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140619_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-113.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-114.nasl - Type : ACT_GATHER_INFO |
2014-06-06 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2233-1.nasl - Type : ACT_GATHER_INFO |
2014-06-06 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2234-1.nasl - Type : ACT_GATHER_INFO |
2014-05-20 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3034.nasl - Type : ACT_GATHER_INFO |
2014-05-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3021.nasl - Type : ACT_GATHER_INFO |
2014-05-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3022.nasl - Type : ACT_GATHER_INFO |
2014-05-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3023.nasl - Type : ACT_GATHER_INFO |
2014-05-09 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0475.nasl - Type : ACT_GATHER_INFO |
2014-05-09 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0475.nasl - Type : ACT_GATHER_INFO |
2014-05-09 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0475.nasl - Type : ACT_GATHER_INFO |
2014-05-09 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140507_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2014-04-27 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2906.nasl - Type : ACT_GATHER_INFO |
2014-04-16 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-140408.nasl - Type : ACT_GATHER_INFO |
2014-03-28 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-140321.nasl - Type : ACT_GATHER_INFO |
2014-03-14 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0285.nasl - Type : ACT_GATHER_INFO |
2014-03-14 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0285-1.nasl - Type : ACT_GATHER_INFO |
2014-03-14 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0285.nasl - Type : ACT_GATHER_INFO |
2014-03-14 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140312_kernel_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2014-03-13 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0285.nasl - Type : ACT_GATHER_INFO |
2014-03-06 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2128-1.nasl - Type : ACT_GATHER_INFO |
2014-03-06 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2129-1.nasl - Type : ACT_GATHER_INFO |
2014-02-19 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2107-1.nasl - Type : ACT_GATHER_INFO |
2014-02-19 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2108-1.nasl - Type : ACT_GATHER_INFO |
2014-02-19 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2111-1.nasl - Type : ACT_GATHER_INFO |
2014-02-19 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2112-1.nasl - Type : ACT_GATHER_INFO |
2014-02-19 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2114-1.nasl - Type : ACT_GATHER_INFO |
2014-02-13 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3002.nasl - Type : ACT_GATHER_INFO |
2014-02-05 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-140124.nasl - Type : ACT_GATHER_INFO |
2014-02-05 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-140125.nasl - Type : ACT_GATHER_INFO |
2014-01-28 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-140116.nasl - Type : ACT_GATHER_INFO |
2014-01-05 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2064-1.nasl - Type : ACT_GATHER_INFO |
2014-01-05 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2065-1.nasl - Type : ACT_GATHER_INFO |
2014-01-05 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2066-1.nasl - Type : ACT_GATHER_INFO |
2014-01-05 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2068-1.nasl - Type : ACT_GATHER_INFO |
2014-01-05 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2069-1.nasl - Type : ACT_GATHER_INFO |
2014-01-05 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2070-1.nasl - Type : ACT_GATHER_INFO |
2014-01-05 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2071-1.nasl - Type : ACT_GATHER_INFO |
2014-01-05 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2073-1.nasl - Type : ACT_GATHER_INFO |
2014-01-05 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2075-1.nasl - Type : ACT_GATHER_INFO |
2013-12-18 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-291.nasl - Type : ACT_GATHER_INFO |
2013-12-18 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2587.nasl - Type : ACT_GATHER_INFO |
2013-12-18 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2589.nasl - Type : ACT_GATHER_INFO |
2013-12-17 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2588.nasl - Type : ACT_GATHER_INFO |
2013-12-17 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20131121_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-12-17 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20131212_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-12-13 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-1801.nasl - Type : ACT_GATHER_INFO |
2013-12-13 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1801.nasl - Type : ACT_GATHER_INFO |
2013-12-13 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1801.nasl - Type : ACT_GATHER_INFO |
2013-12-10 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-252.nasl - Type : ACT_GATHER_INFO |
2013-12-10 | Name : The remote Fedora host is missing a security update. File : fedora_2013-22695.nasl - Type : ACT_GATHER_INFO |
2013-12-09 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2049-1.nasl - Type : ACT_GATHER_INFO |
2013-12-08 | Name : The remote Fedora host is missing a security update. File : fedora_2013-22669.nasl - Type : ACT_GATHER_INFO |
2013-12-05 | Name : The remote Fedora host is missing a security update. File : fedora_2013-22531.nasl - Type : ACT_GATHER_INFO |
2013-12-04 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2036-1.nasl - Type : ACT_GATHER_INFO |
2013-12-04 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2037-1.nasl - Type : ACT_GATHER_INFO |
2013-12-04 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2040-1.nasl - Type : ACT_GATHER_INFO |
2013-12-04 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2041-1.nasl - Type : ACT_GATHER_INFO |
2013-12-04 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2042-1.nasl - Type : ACT_GATHER_INFO |
2013-12-04 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2043-1.nasl - Type : ACT_GATHER_INFO |
2013-12-04 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2045-1.nasl - Type : ACT_GATHER_INFO |
2013-11-29 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2583.nasl - Type : ACT_GATHER_INFO |
2013-11-29 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2584.nasl - Type : ACT_GATHER_INFO |
2013-11-27 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1645.nasl - Type : ACT_GATHER_INFO |
2013-11-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1645.nasl - Type : ACT_GATHER_INFO |
2013-11-13 | Name : The remote Fedora host is missing a security update. File : fedora_2013-20748.nasl - Type : ACT_GATHER_INFO |
2013-11-11 | Name : The remote Fedora host is missing a security update. File : fedora_2013-20705.nasl - Type : ACT_GATHER_INFO |
2013-11-11 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-265.nasl - Type : ACT_GATHER_INFO |
2013-11-09 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2015-1.nasl - Type : ACT_GATHER_INFO |
2013-11-09 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2016-1.nasl - Type : ACT_GATHER_INFO |
2013-11-05 | Name : The remote Fedora host is missing a security update. File : fedora_2013-20547.nasl - Type : ACT_GATHER_INFO |
2013-10-25 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2577.nasl - Type : ACT_GATHER_INFO |
2013-10-24 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-233.nasl - Type : ACT_GATHER_INFO |
2013-10-24 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-1449.nasl - Type : ACT_GATHER_INFO |
2013-10-24 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1449-1.nasl - Type : ACT_GATHER_INFO |
2013-10-24 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1449.nasl - Type : ACT_GATHER_INFO |
2013-10-24 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20131022_kernel_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-10-23 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1449.nasl - Type : ACT_GATHER_INFO |
2013-10-20 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2575.nasl - Type : ACT_GATHER_INFO |
2013-10-20 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2576.nasl - Type : ACT_GATHER_INFO |
2013-10-18 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-1436.nasl - Type : ACT_GATHER_INFO |
2013-10-18 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20131016_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-10-17 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1436.nasl - Type : ACT_GATHER_INFO |
2013-10-17 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1436.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-01-03 13:18:23 |
|