Executive Summary
Summary | |
---|---|
Title | Linux kernel vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-2282-1 | First vendor Publication | 2014-07-16 |
Vendor | Ubuntu | Last vendor Modification | 2014-07-16 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 6.9 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 3.4 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 10.04 LTS Summary: Several security issues were fixed in the kernel. Software Description: - linux: Linux kernel Details: Sasha Levin reported a flaw in the Linux kernel's point-to-point protocol (PPP) when used with the Layer Two Tunneling Protocol (L2TP). A local user could exploit this flaw to gain administrative privileges. (CVE-2014-4943) A flaw was discovered in the Linux kernel's audit subsystem when auditing certain syscalls. A local attacker could exploit this flaw to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS). (CVE-2014-3917) Don Bailey discovered a flaw in the LZO decompress algorithm used by the Linux kernel. An attacker could exploit this flaw to cause a denial of service (memory corruption or OOPS). (CVE-2014-4608) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 10.04 LTS: After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well. References: Package Information: |
Original Source
Url : http://www.ubuntu.com/usn/USN-2282-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
33 % | CWE-269 | Improper Privilege Management |
33 % | CWE-200 | Information Exposure |
33 % | CWE-190 | Integer Overflow or Wraparound (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:24485 | |||
Oval ID: | oval:org.mitre.oval:def:24485 | ||
Title: | RHSA-2014:0923: kernel security update (Important) | ||
Description: | The kernel packages contain the Linux kernel, the core of any Linux operating system. * It was found that the Linux kernel's ptrace subsystem allowed a traced process' instruction pointer to be set to a non-canonical memory address without forcing the non-sysret code path when returning to user space. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-4699, Important) Note: The CVE-2014-4699 issue only affected systems using an Intel CPU. * A flaw was found in the way the pppol2tp_setsockopt() and pppol2tp_getsockopt() functions in the Linux kernel's PPP over L2TP implementation handled requests with a non-SOL_PPPOL2TP socket option level. A local, unprivileged user could use this flaw to escalate their privileges on the system. (CVE-2014-4943, Important) Red Hat would like to thank Andy Lutomirski for reporting CVE-2014-4699, and Sasha Levin for reporting CVE-2014-4943. All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:0923-00 CESA-2014:0923 CVE-2014-4699 CVE-2014-4943 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 7 CentOS Linux 7 | Product(s): | kernel |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24968 | |||
Oval ID: | oval:org.mitre.oval:def:24968 | ||
Title: | USN-2286-1 -- linux-lts-raring vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2286-1 CVE-2014-4943 CVE-2014-0131 CVE-2014-1739 CVE-2014-3144 CVE-2014-3145 CVE-2014-3917 CVE-2014-4014 CVE-2014-4608 | Version: | 3 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-raring |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:25055 | |||
Oval ID: | oval:org.mitre.oval:def:25055 | ||
Title: | USN-2284-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2284-1 CVE-2014-4943 CVE-2014-0131 CVE-2014-4608 | Version: | 3 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:25118 | |||
Oval ID: | oval:org.mitre.oval:def:25118 | ||
Title: | USN-2285-1 -- linux-lts-quantal vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2285-1 CVE-2014-4943 CVE-2014-0131 CVE-2014-1739 CVE-2014-3917 CVE-2014-4014 CVE-2014-4027 CVE-2014-4608 | Version: | 3 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-quantal |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:25123 | |||
Oval ID: | oval:org.mitre.oval:def:25123 | ||
Title: | USN-2281-1 -- linux-ec2 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2281-1 CVE-2014-4943 CVE-2014-3917 CVE-2014-4608 | Version: | 3 |
Platform(s): | Ubuntu 10.04 | Product(s): | linux-ec2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:25252 | |||
Oval ID: | oval:org.mitre.oval:def:25252 | ||
Title: | USN-2283-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2283-1 CVE-2014-4943 CVE-2014-0131 CVE-2014-4608 | Version: | 3 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25359 | |||
Oval ID: | oval:org.mitre.oval:def:25359 | ||
Title: | RHSA-2014:0924: kernel security update (Important) | ||
Description: | The kernel packages contain the Linux kernel, the core of any Linux operating system. * It was found that the Linux kernel's ptrace subsystem allowed a traced process' instruction pointer to be set to a non-canonical memory address without forcing the non-sysret code path when returning to user space. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-4699, Important) Note: The CVE-2014-4699 issue only affected systems using an Intel CPU. * A flaw was found in the way the pppol2tp_setsockopt() and pppol2tp_getsockopt() functions in the Linux kernel's PPP over L2TP implementation handled requests with a non-SOL_PPPOL2TP socket option level. A local, unprivileged user could use this flaw to escalate their privileges on the system. (CVE-2014-4943, Important) Red Hat would like to thank Andy Lutomirski for reporting CVE-2014-4699, and Sasha Levin for reporting CVE-2014-4943. All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:0924-00 CESA-2014:0924 CVE-2014-4699 CVE-2014-4943 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 6 CentOS Linux 6 | Product(s): | kernel |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26034 | |||
Oval ID: | oval:org.mitre.oval:def:26034 | ||
Title: | USN-2314-1 -- linux vulnerability | ||
Description: | The system could be made to crash under certain conditions. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2314-1 CVE-2014-3917 | Version: | 3 |
Platform(s): | Ubuntu 14.04 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26185 | |||
Oval ID: | oval:org.mitre.oval:def:26185 | ||
Title: | USN-2313-1 -- linux-lts-trusty vulnerability | ||
Description: | The system could be made to crash under certain conditions. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2313-1 CVE-2014-3917 | Version: | 3 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-trusty |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:26193 | |||
Oval ID: | oval:org.mitre.oval:def:26193 | ||
Title: | DSA-2992-1 -- linux - security update | ||
Description: | Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2992-1 CVE-2014-3534 CVE-2014-4667 CVE-2014-4943 | Version: | 5 |
Platform(s): | Debian GNU/Linux 7 Debian GNU/kFreeBSD 7 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26538 | |||
Oval ID: | oval:org.mitre.oval:def:26538 | ||
Title: | ELSA-2014-3074 -- Unbreakable Enterprise kernel security update (Important) | ||
Description: | [2.6.39-400.215.10.el6uek] - auditsc: audit_krule mask accesses need bounds checking (Andy Lutomirski) [Orabug: 19590597] {CVE-2014-3917} [2.6.39-400.215.9.el6uek] - oracleasm: Add support for new error return codes from block/SCSI (Martin K. Petersen) [Orabug: 18438934] [2.6.39-400.215.8.el6uek] - ib_ipoib: CSUM support in connected mode (Yuval Shaia) [Orabug: 18692878] - net: Reduce high cpu usage in bonding driver by do_csum (Venkat Venkatsubra) [Orabug: 18141731] - [random] Partially revert 6d7c7e49: random: make 'add_interrupt_randomness() (John Sobecki) [Orabug: 17740293] - oracleasm: claim FMODE_EXCL access on disk during asm_open (Srinivas Eeda) [Orabug: 19453460] - notify block layer when using temporary change to cache_type (Vaughan Cao) [Orabug: 19448451] - sd: Fix parsing of 'temporary ' cache mode prefix (Ben Hutchings) [Orabug: 19448451] - sd: fix array cache flushing bug causing performance problems (James Bottomley) [Orabug: 19448451] - block: fix max discard sectors limit (James Bottomley) [Orabug: 18961244] - xen-netback: fix deadlock in high memory pressure (Junxiao Bi) [Orabug: 18959416] - sdp: fix keepalive functionality (shamir rabinovitch) [Orabug: 18728784] - SELinux: Fix possible NULL pointer dereference in selinux_inode_permission() (Steven Rostedt) [Orabug: 18552029] - refcount: take rw_lock in ocfs2_reflink (Wengang Wang) [Orabug: 18406219] - ipv6: check return value for dst_alloc (Madalin Bucur) [Orabug: 17865160] - cciss: bug fix to prevent cciss from loading in kdump crash kernel (Mike Miller) [Orabug: 17740446] - configfs: fix race between dentry put and lookup (Junxiao Bi) [Orabug: 17627075] | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-3074 CVE-2014-3917 | Version: | 3 |
Platform(s): | Oracle Linux 6 Oracle Linux 5 | Product(s): | kernel-uek |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26754 | |||
Oval ID: | oval:org.mitre.oval:def:26754 | ||
Title: | ELSA-2014-1143 -- kernel security and bug fix update (Moderate) | ||
Description: | The kernel packages contain the Linux kernel, the core of any Linux operating system. * An out-of-bounds memory access flaw was found in the Linux kernel's system call auditing implementation. On a system with existing audit rules defined, a local, unprivileged user could use this flaw to leak kernel memory to user space or, potentially, crash the system. (CVE-2014-3917, Moderate) This update also fixes the following bugs: * A bug in the journaling code (jbd and jbd2) could, under very heavy workload of fsync() operations, trigger a BUG_ON and result in a kernel oops. Also, fdatasync() could fail to immediately write out changes in the file size only. These problems have been resolved by backporting a series of patches that fixed these problems in the respective code on Red Hat Enterprise Linux 6. This update also improves performance of ext3 and ext4 file systems. (BZ#1116027) * Due to a bug in the ext4 code, the fdatasync() system call did not force the inode size change to be written to the disk if it was the only metadata change in the file. This could result in the wrong inode size and possible data loss if the system terminated unexpectedly. The code handling inode updates has been fixed and fdatasync() now writes data to the disk as expected in this situation. (BZ#1117665) * A workaround to a DMA read problem in the tg3 driver was incorrectly applied to the whole Broadcom 5719 and 5720 chipset family. This workaround is valid only to the A0 revision of the 5719 chips and for other revisions and chips causes occasional Tx timeouts. This update correctly applies the aforementioned workaround only to the A0 revision of the 5719 chips. (BZ#1121017) * Due to a bug in the page writeback code, the system could become unresponsive when being under memory pressure and heavy NFS load. This update fixes the code responsible for handling of dirty pages, and dirty page write outs no longer flood the work queue. (BZ#1125246) All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-1143 CVE-2014-3917 | Version: | 3 |
Platform(s): | Oracle Linux 5 | Product(s): | kernel |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26762 | |||
Oval ID: | oval:org.mitre.oval:def:26762 | ||
Title: | RHSA-2014:1281: kernel security and bug fix update (Moderate) | ||
Description: | The kernel packages contain the Linux kernel, the core of any Linux operating system. * An out-of-bounds memory access flaw was found in the Linux kernel's system call auditing implementation. On a system with existing audit rules defined, a local, unprivileged user could use this flaw to leak kernel memory to user space or, potentially, crash the system. (CVE-2014-3917, Moderate) This update also fixes the following bugs: * A bug in the mtip32xx driver could prevent the Micron P420m PCIe SSD devices with unaligned I/O access from completing the submitted I/O requests. This resulted in a livelock situation and rendered the Micron P420m PCIe SSD devices unusable. To fix this problem, mtip32xx now checks whether an I/O access is unaligned and if so, it uses the correct semaphore. (BZ#1125776) * A series of patches has been backported to improve the functionality of a touch pad on the latest Lenovo laptops in Red Hat Enterprise Linux 7. (BZ#1122559) * Due to a bug in the bnx2x driver, a network adapter could be unable to recover from EEH error injection. The network adapter had to be taken offline and rebooted in order to function properly again. With this update, the bnx2x driver has been corrected and network adapters now recover from EEH errors as expected. (BZ#1107722) * Previously, if an hrtimer interrupt was delayed, all future pending hrtimer events that were queued on the same processor were also delayed until the initial hrtimer event was handled. This could cause all hrtimer processing to stop for a significant period of time. To prevent this problem, the kernel has been modified to handle all expired hrtimer events when handling the initially delayed hrtimer event. (BZ#1113175) * A previous change to the nouveau driver introduced a bit shift error, which resulted in a wrong display resolution being set with some models of NVIDIA controllers. With this update, the erroneous code has been corrected, and the affected NVIDIA controllers can now set the correct display resolution. (BZ#1114869) * Due to a NULL pointer dereference bug in the be2net driver, the system could experience a kernel oops and reboot when disabling a network adapter after a permanent failure. This problem has been fixed by introducing a flag to keep track of the setup state. The failing adapter can now be disabled successfully without a kernel crash. (BZ#1122558) * Previously, the Huge Translation Lookaside Buffer (HugeTLB) allowed access to huge pages access by default. However, huge pages may be unsupported in some environments, such as a KVM guest on a PowerPC architecture, and an attempt to access a huge page in memory would result in a kernel oops. This update ensures that HugeTLB denies access to huge pages if the huge pages are not supported on the system. (BZ#1122115) * If an NVMe device becomes ready but fails to create I/O queues, the nvme driver creates a character device handle to manage such a device. Previously, a character device could be created before a device reference counter was initialized, which resulted in a kernel oops. This problem has been fixed by calling the relevant initialization function earlier in the code. (BZ#1119720) * On some firmware versions of the BladeEngine 3 (BE3) controller, interrupts remain disabled after a hardware reset. This was a problem for all Emulex-based network adapters using such a BE3 controller because these adapters would fail to recover from an EEH error if it occurred. To resolve this problem, the be2net driver has been modified to enable the interrupts in the eeh_resume handler explicitly. (BZ#1121712) All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:1281-00 CESA-2014:1281 CVE-2014-3917 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 7 CentOS Linux 7 | Product(s): | kernel |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-04-03 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2017-0057.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-0812-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-0481-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-1138-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-1105-1.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-103.nasl - Type : ACT_GATHER_INFO |
2015-03-24 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-150306.nasl - Type : ACT_GATHER_INFO |
2015-03-13 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2015-0290.nasl - Type : ACT_GATHER_INFO |
2015-01-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2015-0062.nasl - Type : ACT_GATHER_INFO |
2014-12-26 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-141217.nasl - Type : ACT_GATHER_INFO |
2014-12-26 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-141202.nasl - Type : ACT_GATHER_INFO |
2014-12-22 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-793.nasl - Type : ACT_GATHER_INFO |
2014-12-22 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-791.nasl - Type : ACT_GATHER_INFO |
2014-11-25 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2421-1.nasl - Type : ACT_GATHER_INFO |
2014-11-25 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2420-1.nasl - Type : ACT_GATHER_INFO |
2014-11-25 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2419-1.nasl - Type : ACT_GATHER_INFO |
2014-11-25 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2417-1.nasl - Type : ACT_GATHER_INFO |
2014-11-25 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2416-1.nasl - Type : ACT_GATHER_INFO |
2014-11-12 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-1392.nasl - Type : ACT_GATHER_INFO |
2014-11-11 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1025.nasl - Type : ACT_GATHER_INFO |
2014-11-11 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0925.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2014-1168.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2014-0979.nasl - Type : ACT_GATHER_INFO |
2014-11-04 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20141014_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2014-10-23 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-bigsmp-201409-140924.nasl - Type : ACT_GATHER_INFO |
2014-10-23 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-140924.nasl - Type : ACT_GATHER_INFO |
2014-10-22 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-1392.nasl - Type : ACT_GATHER_INFO |
2014-10-14 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1392.nasl - Type : ACT_GATHER_INFO |
2014-10-12 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2014-368.nasl - Type : ACT_GATHER_INFO |
2014-09-23 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-1281.nasl - Type : ACT_GATHER_INFO |
2014-09-23 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-1281.nasl - Type : ACT_GATHER_INFO |
2014-09-23 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1281.nasl - Type : ACT_GATHER_INFO |
2014-09-11 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1167.nasl - Type : ACT_GATHER_INFO |
2014-09-11 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3074.nasl - Type : ACT_GATHER_INFO |
2014-09-11 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3073.nasl - Type : ACT_GATHER_INFO |
2014-09-11 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3072.nasl - Type : ACT_GATHER_INFO |
2014-09-10 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140909_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2014-09-10 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-1167.nasl - Type : ACT_GATHER_INFO |
2014-09-10 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-1167.nasl - Type : ACT_GATHER_INFO |
2014-09-05 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-1143.nasl - Type : ACT_GATHER_INFO |
2014-09-05 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140903_kernel_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2014-09-05 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-1143-1.nasl - Type : ACT_GATHER_INFO |
2014-09-05 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-1143.nasl - Type : ACT_GATHER_INFO |
2014-09-04 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1143.nasl - Type : ACT_GATHER_INFO |
2014-09-03 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2334-1.nasl - Type : ACT_GATHER_INFO |
2014-08-23 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3070.nasl - Type : ACT_GATHER_INFO |
2014-08-14 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2314-1.nasl - Type : ACT_GATHER_INFO |
2014-08-14 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2313-1.nasl - Type : ACT_GATHER_INFO |
2014-08-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-493.nasl - Type : ACT_GATHER_INFO |
2014-08-08 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-155.nasl - Type : ACT_GATHER_INFO |
2014-08-04 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-478.nasl - Type : ACT_GATHER_INFO |
2014-07-30 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0923.nasl - Type : ACT_GATHER_INFO |
2014-07-30 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2992.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote Fedora host is missing a security update. File : fedora_2014-8487.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0924.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0923.nasl - Type : ACT_GATHER_INFO |
2014-07-25 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140723_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2014-07-25 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3049.nasl - Type : ACT_GATHER_INFO |
2014-07-24 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0923.nasl - Type : ACT_GATHER_INFO |
2014-07-24 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0924.nasl - Type : ACT_GATHER_INFO |
2014-07-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0924.nasl - Type : ACT_GATHER_INFO |
2014-07-23 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0913.nasl - Type : ACT_GATHER_INFO |
2014-07-21 | Name : The remote Fedora host is missing a security update. File : fedora_2014-8519.nasl - Type : ACT_GATHER_INFO |
2014-07-20 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3048.nasl - Type : ACT_GATHER_INFO |
2014-07-20 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3047.nasl - Type : ACT_GATHER_INFO |
2014-07-20 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3046.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2287-1.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-140709.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2281-1.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2282-1.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2283-1.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2285-1.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2286-1.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2288-1.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2289-1.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2290-1.nasl - Type : ACT_GATHER_INFO |
2014-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2014-7863.nasl - Type : ACT_GATHER_INFO |
2014-06-27 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_d1f5e12afd5a11e3a108080027ef73ec.nasl - Type : ACT_GATHER_INFO |
2014-06-17 | Name : The remote Fedora host is missing a security update. File : fedora_2014-7320.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-124.nasl - Type : ACT_GATHER_INFO |
2014-06-06 | Name : The remote Fedora host is missing a security update. File : fedora_2014-7033.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-07-24 00:27:09 |
|
2014-07-20 00:25:53 |
|
2014-07-18 13:24:38 |
|
2014-07-17 05:22:41 |
|