Executive Summary
Informations | |||
---|---|---|---|
Name | MDVSA-2013:176 | First vendor Publication | 2013-06-24 |
Vendor | Mandriva | Last vendor Modification | 2013-06-24 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple vulnerabilities has been found and corrected in the Linux kernel: The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application. (CVE-2013-1979) The nr_recvmsg function in net/netrom/af_netrom.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3232) net/tipc/socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure and a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3235) The rose_recvmsg function in net/rose/af_rose.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3234) The llcp_sock_recvmsg function in net/nfc/llcp/sock.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable and a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3233) The llc_ui_recvmsg function in net/llc/af_llc.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3231) The iucv_sock_recvmsg function in net/iucv/af_iucv.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3229) The irda_recvmsg_dgram function in net/irda/af_irda.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3228) The caif_seqpkt_recvmsg function in net/caif/caif_socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3227) The rfcomm_sock_recvmsg function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3225) The bt_sock_recvmsg function in net/bluetooth/af_bluetooth.c in the Linux kernel before 3.9-rc7 does not properly initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3224) The ax25_recvmsg function in net/ax25/af_ax25.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3223) The vcc_recvmsg function in net/atm/common.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3222) Integer overflow in the fb_mmap function in drivers/video/fbmem.c in the Linux kernel before 3.8.9, as used in a certain Motorola build of Android 4.1.2 and other products, allows local users to create a read-write memory mapping for the entirety of kernel memory, and consequently gain privileges, via crafted /dev/graphics/fb0 mmap2 system calls, as demonstrated by the Motochopper pwn program. (CVE-2013-2596) arch/x86/kernel/cpu/perf_event_intel.c in the Linux kernel before 3.8.9, when the Performance Events Subsystem is enabled, specifies an incorrect bitmask, which allows local users to cause a denial of service (general protection fault and system crash) by attempting to set a reserved bit. (CVE-2013-2146) The perf_swevent_init function in kernel/events/core.c in the Linux kernel before 3.8.9 uses an incorrect integer data type, which allows local users to gain privileges via a crafted perf_event_open system call. (CVE-2013-2094) The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel through 3.8.4 does not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application. (CVE-2013-1798) Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation. (CVE-2013-1797) The kvm_set_msr_common function in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 does not ensure a required time_page alignment during an MSR_KVM_SYSTEM_TIME operation, which allows guest OS users to cause a denial of service (buffer overflow and host OS memory corruption) or possibly have unspecified other impact via a crafted application. (CVE-2013-1796) The do_tkill function in kernel/signal.c in the Linux kernel before 3.8.9 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via a crafted application that makes a (1) tkill or (2) tgkill system call. (CVE-2013-2141) Heap-based buffer overflow in the tg3_read_vpd function in drivers/net/ethernet/broadcom/tg3.c in the Linux kernel before 3.8.6 allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via crafted firmware that specifies a long string in the Vital Product Data (VPD) data structure. (CVE-2013-1929) The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.8-rc1, allows local users to cause a denial of service (daemon exit) via a crafted application that sends a Netlink message. NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-2669. (CVE-2012-5532) The udf_encode_fh function in fs/udf/namei.c in the Linux kernel before 3.6 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory via a crafted application. (CVE-2012-6548) The isofs_export_encode_fh function in fs/isofs/export.c in the Linux kernel before 3.6 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory via a crafted application. (CVE-2012-6549) net/dcb/dcbnl.c in the Linux kernel before 3.8.4 does not initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application. (CVE-2013-2634) The rtnl_fill_ifinfo function in net/core/rtnetlink.c in the Linux kernel before 3.8.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel stack memory via a crafted application. (CVE-2013-2635) fs/ext3/super.c in the Linux kernel before 3.8.4 uses incorrect arguments to functions in certain circumstances related to printk input, which allows local users to conduct format-string attacks and possibly gain privileges via a crafted application. (CVE-2013-1848) The flush_signal_handlers function in kernel/signal.c in the Linux kernel before 3.8.4 preserves the value of the sa_restorer field across an exec operation, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application containing a sigaction system call. (CVE-2013-0914) Heap-based buffer overflow in the wdm_in_callback function in drivers/usb/class/cdc-wdm.c in the Linux kernel before 3.8.4 allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted cdc-wdm USB device. (CVE-2013-1860) Race condition in the install_user_keyrings function in security/keys/process_keys.c in the Linux kernel before 3.8.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) via crafted keyctl system calls that trigger keyring operations in simultaneous threads. (CVE-2013-1792) The report API in the crypto user configuration API in the Linux kernel through 3.8.2 uses an incorrect C library function for copying strings, which allows local users to obtain sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability. (CVE-2013-2546) The crypto_report_one function in crypto/crypto_user.c in the report API in the crypto user configuration API in the Linux kernel through 3.8.2 does not initialize certain structure members, which allows local users to obtain sensitive information from kernel heap memory by leveraging the CAP_NET_ADMIN capability. (CVE-2013-2547) The crypto_report_one function in crypto/crypto_user.c in the report API in the crypto user configuration API in the Linux kernel through 3.8.2 uses an incorrect length value during a copy operation, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability. (CVE-2013-2548) The translate_desc function in drivers/vhost/vhost.c in the Linux kernel before 3.7 does not properly handle cross-region descriptors, which allows guest OS users to obtain host OS privileges by leveraging KVM guest OS privileges. (CVE-2013-0311) Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in the Linux kernel before 3.7.10 allows local users to gain privileges via a large family value in a Netlink message. (CVE-2013-1763) The __skb_recv_datagram function in net/core/datagram.c in the Linux kernel before 3.8 does not properly handle the MSG_PEEK flag with zero-length data, which allows local users to cause a denial of service (infinite loop and system hang) via a crafted application. (CVE-2013-0290) Use-after-free vulnerability in the shmem_remount_fs function in mm/shmem.c in the Linux kernel before 3.7.10 allows local users to gain privileges or cause a denial of service (system crash) by remounting a tmpfs filesystem without specifying a required mpol (aka mempolicy) mount option. (CVE-2013-1767) The xen_iret function in arch/x86/xen/xen-asm_32.S in the Linux kernel before 3.7.9 on 32-bit Xen paravirt_ops platforms does not properly handle an invalid value in the DS segment register, which allows guest OS users to gain guest OS privileges via a crafted application. (CVE-2013-0228) Memory leak in drivers/net/xen-netback/netback.c in the Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (memory consumption) by triggering certain error conditions. (CVE-2013-0217) The Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (loop) by triggering ring pointer corruption. (CVE-2013-0216) The __tun_chr_ioctl function in drivers/net/tun.c in the Linux kernel before 3.6 does not initialize a certain structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted application. (CVE-2012-6547) The updated packages provides a solution for these security issues. |
Original Source
Url : http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
38 % | CWE-200 | Information Exposure |
18 % | CWE-20 | Improper Input Validation |
15 % | CWE-399 | Resource Management Errors |
8 % | CWE-310 | Cryptographic Issues |
8 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
8 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
5 % | CWE-264 | Permissions, Privileges, and Access Controls |
2 % | CWE-362 | Race Condition |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:17139 | |||
Oval ID: | oval:org.mitre.oval:def:17139 | ||
Title: | USN-1881-1 -- Linux kernel vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | usn-1881-1 CVE-2013-1979 CVE-2013-0160 CVE-2013-2141 CVE-2013-2146 CVE-2013-3076 CVE-2013-3222 CVE-2013-3223 CVE-2013-3224 CVE-2013-3225 CVE-2013-3227 CVE-2013-3228 CVE-2013-3229 CVE-2013-3230 CVE-2013-3231 CVE-2013-3232 CVE-2013-3233 CVE-2013-3234 CVE-2013-3235 | Version: | 7 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17229 | |||
Oval ID: | oval:org.mitre.oval:def:17229 | ||
Title: | USN-1882-1 -- Linux kernel (OMAP4) vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | usn-1882-1 CVE-2013-2850 CVE-2013-1979 CVE-2013-0160 CVE-2013-2141 CVE-2013-2146 CVE-2013-3076 CVE-2013-3222 CVE-2013-3223 CVE-2013-3224 CVE-2013-3225 CVE-2013-3227 CVE-2013-3228 CVE-2013-3229 CVE-2013-3230 CVE-2013-3231 CVE-2013-3232 CVE-2013-3233 CVE-2013-3234 CVE-2013-3235 | Version: | 7 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17234 | |||
Oval ID: | oval:org.mitre.oval:def:17234 | ||
Title: | USN-1880-1 -- Linux kernel (Quantal HWE) vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | usn-1880-1 CVE-2013-1979 CVE-2013-0160 CVE-2013-2141 CVE-2013-2146 CVE-2013-3076 CVE-2013-3222 CVE-2013-3223 CVE-2013-3224 CVE-2013-3225 CVE-2013-3227 CVE-2013-3228 CVE-2013-3229 CVE-2013-3230 CVE-2013-3231 CVE-2013-3232 CVE-2013-3233 CVE-2013-3234 CVE-2013-3235 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-quantal |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17305 | |||
Oval ID: | oval:org.mitre.oval:def:17305 | ||
Title: | USN-1877-1 -- Linux kernel (EC2) vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | usn-1877-1 CVE-2013-1798 CVE-2013-3222 CVE-2013-3223 CVE-2013-3224 CVE-2013-3225 CVE-2013-3228 CVE-2013-3229 CVE-2013-3231 CVE-2013-3232 CVE-2013-3234 CVE-2013-3235 | Version: | 7 |
Platform(s): | Ubuntu 10.04 | Product(s): | linux-ec2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17314 | |||
Oval ID: | oval:org.mitre.oval:def:17314 | ||
Title: | USN-1699-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1699-1 CVE-2012-4461 CVE-2012-4530 CVE-2012-5532 | Version: | 7 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17333 | |||
Oval ID: | oval:org.mitre.oval:def:17333 | ||
Title: | USN-1849-1 -- Linux kernel (Raring HWE) vulnerability | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | usn-1849-1 CVE-2013-2850 CVE-2013-2094 CVE-2013-2141 CVE-2013-2146 CVE-2013-3076 CVE-2013-3222 CVE-2013-3223 CVE-2013-3224 CVE-2013-3225 CVE-2013-3226 CVE-2013-3227 CVE-2013-3228 CVE-2013-3229 CVE-2013-3230 CVE-2013-3231 CVE-2013-3232 CVE-2013-3233 CVE-2013-3234 CVE-2013-3235 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-raring |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17337 | |||
Oval ID: | oval:org.mitre.oval:def:17337 | ||
Title: | USN-1696-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1696-1 CVE-2012-4461 CVE-2012-4530 CVE-2012-5532 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17345 | |||
Oval ID: | oval:org.mitre.oval:def:17345 | ||
Title: | USN-1883-1 -- Linux kernel (OMAP4) vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | usn-1883-1 CVE-2013-2850 CVE-2013-1979 CVE-2013-0160 CVE-2013-2141 CVE-2013-3076 CVE-2013-3222 CVE-2013-3223 CVE-2013-3224 CVE-2013-3225 CVE-2013-3227 CVE-2013-3228 CVE-2013-3229 CVE-2013-3230 CVE-2013-3231 CVE-2013-3232 CVE-2013-3233 CVE-2013-3234 CVE-2013-3235 | Version: | 7 |
Platform(s): | Ubuntu 13.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17382 | |||
Oval ID: | oval:org.mitre.oval:def:17382 | ||
Title: | USN-1879-1 -- Linux kernel (OMAP4) vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | usn-1879-1 CVE-2013-2850 CVE-2013-0160 CVE-2013-2146 CVE-2013-3076 CVE-2013-3222 CVE-2013-3223 CVE-2013-3224 CVE-2013-3225 CVE-2013-3227 CVE-2013-3228 CVE-2013-3229 CVE-2013-3231 CVE-2013-3232 CVE-2013-3234 CVE-2013-3235 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17404 | |||
Oval ID: | oval:org.mitre.oval:def:17404 | ||
Title: | USN-1828-1 -- linux-lts-quantal vulnerability | ||
Description: | The system could be made to run programs as an administrator. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1828-1 CVE-2013-2094 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-quantal |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17453 | |||
Oval ID: | oval:org.mitre.oval:def:17453 | ||
Title: | USN-1787-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1787-1 CVE-2013-0914 CVE-2013-1767 CVE-2013-1792 | Version: | 7 |
Platform(s): | Ubuntu 11.10 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17680 | |||
Oval ID: | oval:org.mitre.oval:def:17680 | ||
Title: | USN-1698-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1698-1 CVE-2012-4530 CVE-2012-5532 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17686 | |||
Oval ID: | oval:org.mitre.oval:def:17686 | ||
Title: | USN-1795-1 -- linux-lts-quantal vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1795-1 CVE-2013-0228 CVE-2013-0914 CVE-2013-1767 CVE-2013-1792 CVE-2013-2546 CVE-2013-2547 CVE-2013-2548 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-quantal |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17718 | |||
Oval ID: | oval:org.mitre.oval:def:17718 | ||
Title: | USN-1808-1 -- linux-ec2 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1808-1 CVE-2012-6542 CVE-2012-6544 CVE-2012-6545 CVE-2012-6546 CVE-2012-6548 CVE-2013-0228 CVE-2013-0349 CVE-2013-1774 CVE-2013-1796 | Version: | 7 |
Platform(s): | Ubuntu 10.04 | Product(s): | linux-ec2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17779 | |||
Oval ID: | oval:org.mitre.oval:def:17779 | ||
Title: | USN-1700-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1700-1 CVE-2012-4530 CVE-2012-5532 | Version: | 7 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17858 | |||
Oval ID: | oval:org.mitre.oval:def:17858 | ||
Title: | USN-1700-2 -- linux-ti-omap4 regression | ||
Description: | USN-1700-1 introduced a regression in the Linux kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1700-2 CVE-2012-4530 CVE-2012-5532 | Version: | 7 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17894 | |||
Oval ID: | oval:org.mitre.oval:def:17894 | ||
Title: | USN-1696-2 -- linux regression | ||
Description: | USN-1696-1 introduced a regression in the Linux kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1696-2 CVE-2012-4461 CVE-2012-4530 CVE-2012-5532 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17897 | |||
Oval ID: | oval:org.mitre.oval:def:17897 | ||
Title: | USN-1794-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1794-1 CVE-2013-0914 CVE-2013-1767 CVE-2013-1792 CVE-2013-2546 CVE-2013-2547 CVE-2013-2548 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17929 | |||
Oval ID: | oval:org.mitre.oval:def:17929 | ||
Title: | USN-1749-1 -- linux-lts-quantal vulnerability | ||
Description: | The system could be made to crash or run programs as an administrator. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1749-1 CVE-2013-1763 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-quantal |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17993 | |||
Oval ID: | oval:org.mitre.oval:def:17993 | ||
Title: | USN-1796-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1796-1 CVE-2013-0228 CVE-2013-0914 CVE-2013-1767 CVE-2013-1792 CVE-2013-2546 CVE-2013-2547 CVE-2013-2548 | Version: | 7 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18011 | |||
Oval ID: | oval:org.mitre.oval:def:18011 | ||
Title: | USN-1698-2 -- linux-ti-omap4 regression | ||
Description: | USN-1698-1 introduced a regression in the Linux kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1698-2 CVE-2012-4530 CVE-2012-5532 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18036 | |||
Oval ID: | oval:org.mitre.oval:def:18036 | ||
Title: | USN-1704-2 -- linux-lts-quantal - Linux kernel hardware enablement from Quantal regression | ||
Description: | USN-1704-1 introduced a regression in the Linux kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1704-2 CVE-2012-0957 CVE-2012-4461 CVE-2012-4508 CVE-2012-4530 CVE-2012-4565 CVE-2012-5517 CVE-2012-5532 | Version: | 8 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-quantal |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18124 | |||
Oval ID: | oval:org.mitre.oval:def:18124 | ||
Title: | USN-1699-2 -- linux regression | ||
Description: | USN-1699-1 introduced a regression in the Linux kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1699-2 CVE-2012-4461 CVE-2012-4530 CVE-2012-5532 | Version: | 7 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18134 | |||
Oval ID: | oval:org.mitre.oval:def:18134 | ||
Title: | USN-1751-1 -- linux-ti-omap4 vulnerability | ||
Description: | The system could be made to crash or run programs as an administrator. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1751-1 CVE-2013-1763 | Version: | 7 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18181 | |||
Oval ID: | oval:org.mitre.oval:def:18181 | ||
Title: | USN-1809-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1809-1 CVE-2012-6548 CVE-2012-6549 CVE-2013-0913 CVE-2013-1796 CVE-2013-1797 CVE-2013-1798 CVE-2013-1848 CVE-2013-1860 CVE-2013-2206 CVE-2013-2634 CVE-2013-2635 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18186 | |||
Oval ID: | oval:org.mitre.oval:def:18186 | ||
Title: | USN-1726-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1726-1 CVE-2012-2669 CVE-2012-4508 CVE-2012-5532 | Version: | 7 |
Platform(s): | Ubuntu 11.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18195 | |||
Oval ID: | oval:org.mitre.oval:def:18195 | ||
Title: | USN-1812-1 -- linux-lts-quantal vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1812-1 CVE-2012-6548 CVE-2012-6549 CVE-2013-0913 CVE-2013-1796 CVE-2013-1797 CVE-2013-1798 CVE-2013-1848 CVE-2013-1860 CVE-2013-2206 CVE-2013-2634 CVE-2013-2635 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-quantal |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18242 | |||
Oval ID: | oval:org.mitre.oval:def:18242 | ||
Title: | USN-1826-1 -- linux vulnerability | ||
Description: | The system could be made to run programs as an administrator. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1826-1 CVE-2013-2094 | Version: | 7 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18266 | |||
Oval ID: | oval:org.mitre.oval:def:18266 | ||
Title: | USN-1827-1 -- linux vulnerability | ||
Description: | The system could be made to run programs as an administrator. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1827-1 CVE-2013-2094 | Version: | 7 |
Platform(s): | Ubuntu 13.04 | Product(s): | linux |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18276 | |||
Oval ID: | oval:org.mitre.oval:def:18276 | ||
Title: | USN-1750-1 -- linux vulnerabilities | ||
Description: | The system could be made to crash or run programs as an administrator. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1750-1 CVE-2013-1763 | Version: | 7 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18280 | |||
Oval ID: | oval:org.mitre.oval:def:18280 | ||
Title: | USN-1811-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1811-1 CVE-2012-6548 CVE-2012-6549 CVE-2013-0913 CVE-2013-1848 CVE-2013-1860 CVE-2013-2206 CVE-2013-2634 CVE-2013-2635 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18296 | |||
Oval ID: | oval:org.mitre.oval:def:18296 | ||
Title: | USN-1813-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1813-1 CVE-2012-6548 CVE-2012-6549 CVE-2013-0913 CVE-2013-1796 CVE-2013-1797 CVE-2013-1798 CVE-2013-1848 CVE-2013-1860 CVE-2013-2206 CVE-2013-2634 CVE-2013-2635 | Version: | 7 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18305 | |||
Oval ID: | oval:org.mitre.oval:def:18305 | ||
Title: | USN-1814-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1814-1 CVE-2012-6548 CVE-2012-6549 CVE-2013-0913 CVE-2013-1848 CVE-2013-1860 CVE-2013-2206 CVE-2013-2634 CVE-2013-2635 | Version: | 7 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18310 | |||
Oval ID: | oval:org.mitre.oval:def:18310 | ||
Title: | USN-1825-1 -- linux vulnerability | ||
Description: | The system could be made to run programs as an administrator. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1825-1 CVE-2013-2094 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18315 | |||
Oval ID: | oval:org.mitre.oval:def:18315 | ||
Title: | USN-1829-1 -- linux-ec2 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1829-1 CVE-2012-6549 CVE-2013-1826 CVE-2013-1860 CVE-2013-1928 CVE-2013-2634 | Version: | 7 |
Platform(s): | Ubuntu 10.04 | Product(s): | linux-ec2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18322 | |||
Oval ID: | oval:org.mitre.oval:def:18322 | ||
Title: | USN-1793-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1793-1 CVE-2013-0914 CVE-2013-1767 CVE-2013-1792 CVE-2013-2546 CVE-2013-2547 CVE-2013-2548 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18323 | |||
Oval ID: | oval:org.mitre.oval:def:18323 | ||
Title: | USN-1788-1 -- linux-lts-backport-oneiric vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1788-1 CVE-2013-0914 CVE-2013-1767 CVE-2013-1792 | Version: | 7 |
Platform(s): | Ubuntu 10.04 | Product(s): | linux-lts-backport-oneiric |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18336 | |||
Oval ID: | oval:org.mitre.oval:def:18336 | ||
Title: | USN-1797-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1797-1 CVE-2013-0228 CVE-2013-0914 CVE-2013-1767 CVE-2013-1792 CVE-2013-2546 CVE-2013-2547 CVE-2013-2548 | Version: | 7 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18356 | |||
Oval ID: | oval:org.mitre.oval:def:18356 | ||
Title: | USN-1798-1 -- linux-ec2 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1798-1 CVE-2012-6537 CVE-2012-6539 CVE-2012-6540 CVE-2013-0914 CVE-2013-1767 CVE-2013-1792 | Version: | 7 |
Platform(s): | Ubuntu 10.04 | Product(s): | linux-ec2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18375 | |||
Oval ID: | oval:org.mitre.oval:def:18375 | ||
Title: | USN-1837-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1837-1 CVE-2013-2141 CVE-2013-2146 CVE-2013-3076 CVE-2013-3222 CVE-2013-3223 CVE-2013-3224 CVE-2013-3225 CVE-2013-3226 CVE-2013-3227 CVE-2013-3228 CVE-2013-3229 CVE-2013-3230 CVE-2013-3231 CVE-2013-3232 CVE-2013-3233 CVE-2013-3234 CVE-2013-3235 | Version: | 7 |
Platform(s): | Ubuntu 13.04 | Product(s): | linux |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20911 | |||
Oval ID: | oval:org.mitre.oval:def:20911 | ||
Title: | RHSA-2013:0727: kvm security update (Important) | ||
Description: | The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel through 3.8.4 does not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2013:0727-00 CESA-2013:0727 CVE-2013-1796 CVE-2013-1797 CVE-2013-1798 | Version: | 45 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | kvm |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21185 | |||
Oval ID: | oval:org.mitre.oval:def:21185 | ||
Title: | RHSA-2013:0807: hypervkvpd security and bug fix update (Low) | ||
Description: | The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.8-rc1, allows local users to cause a denial of service (daemon exit) via a crafted application that sends a Netlink message. NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-2669. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2013:0807-00 CESA-2013:0807 CVE-2012-5532 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | hypervkvpd |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22550 | |||
Oval ID: | oval:org.mitre.oval:def:22550 | ||
Title: | ELSA-2013:0727: kvm security update (Important) | ||
Description: | The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel through 3.8.4 does not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:0727-00 CVE-2013-1796 CVE-2013-1797 CVE-2013-1798 | Version: | 17 |
Platform(s): | Oracle Linux 5 | Product(s): | kvm |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23524 | |||
Oval ID: | oval:org.mitre.oval:def:23524 | ||
Title: | ELSA-2013:0807: hypervkvpd security and bug fix update (Low) | ||
Description: | The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.8-rc1, allows local users to cause a denial of service (daemon exit) via a crafted application that sends a Netlink message. NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-2669. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:0807-00 CVE-2012-5532 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | hypervkvpd |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:26661 | |||
Oval ID: | oval:org.mitre.oval:def:26661 | ||
Title: | ELSA-2013-1034-1 -- kernel security and bug fix update (low) | ||
Description: | kernel [2.6.18-348.12.1.0.1] - [oprofile] x86, mm: Add __get_user_pages_fast() [orabug 14277030] - [oprofile] export __get_user_pages_fast() function [orabug 14277030] - [oprofile] oprofile, x86: Fix nmi-unsafe callgraph support [orabug 14277030] - [oprofile] oprofile: use KM_NMI slot for kmap_atomic [orabug 14277030] - [oprofile] oprofile: i386 add get_user_pages_fast support [orabug 14277030] - [kernel] Initialize the local uninitialized variable stats. [orabug 14051367] - [fs] JBD:make jbd support 512B blocks correctly for ocfs2. [orabug 13477763] - [x86 ] fix fpu context corrupt when preempt in signal context [orabug 14038272] - [mm] fix hugetlb page leak (Dave McCracken) [orabug 12375075] - fix ia64 build error due to add-support-above-32-vcpus.patch(Zhenzhong Duan) - [x86] use dynamic vcpu_info remap to support more than 32 vcpus (Zhenzhong Duan) - [x86] Fix lvt0 reset when hvm boot up with noapic param - [scsi] remove printks when doing I/O to a dead device (John Sobecki, Chris Mason) [orabug 12342275] - [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 12561346] - [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566] - [net] net: Redo the broken redhat netconsole over bonding (Tina Yang) [orabug 12740042] - [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646] - fix filp_close() race (Joe Jin) [orabug 10335998] - make xenkbd.abs_pointer=1 by default [orabug 67188919] - [xen] check to see if hypervisor supports memory reservation change (Chuck Anderson) [orabug 7556514] - [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki) [orabug 10315433] - [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258] - [mm] Patch shrink_zone to yield during severe mempressure events, avoiding hangs and evictions (John Sobecki,Chris Mason) [orabug 6086839] - [mm] Enhance shrink_zone patch allow full swap utilization, and also be NUMA-aware (John Sobecki,Chris Mason,Herbert van den Bergh) [orabug 9245919] - fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042] - [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson) [orabug 9107465] - [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson) [orabug 9764220] - Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615] - fix overcommit memory to use percpu_counter for (KOSAKI Motohiro, Guru Anbalagane) [orabug 6124033] - [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208] - [ib] fix memory corruption (Andy Grover) [orabug 9972346] - [usb] USB: fix __must_check warnings in drivers/usb/core/ (Junxiao Bi) [orabug 14795203] - [usb] usbcore: fix endpoint device creation (Junxiao Bi) [orabug 14795203] - [usb] usbcore: fix refcount bug in endpoint removal (Junxiao Bi) [orabug 14795203] | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-1034-1 CVE-2013-1929 CVE-2012-6544 CVE-2012-6545 CVE-2013-0914 CVE-2013-3222 CVE-2013-3224 CVE-2013-3231 CVE-2013-3235 | Version: | 5 |
Platform(s): | Oracle Linux 5 | Product(s): | kernel ocfs2 oracleasm kernel-PAE kernel-PAE-devel kernel-debug kernel-debug-devel kernel-devel kernel-doc kernel-headers kernel-xen kernel-xen-devel |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27059 | |||
Oval ID: | oval:org.mitre.oval:def:27059 | ||
Title: | DEPRECATED: ELSA-2013-0807 -- hypervkvpd security and bug fix update (low) | ||
Description: | [0-0.7.0.1.el5_9.3] - Add support for oracle os [0-0.7.3] - Fix for one more file descriptor leak (rhbz#953502) [0-0.7.2] - Validate Netlink source address (CVE-2012-5532) (rhbz#953560) [0-0.7.1] - Fix for file descriptor leak (rhbz#953502) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-0807 CVE-2012-5532 | Version: | 4 |
Platform(s): | Oracle Linux 5 | Product(s): | hypervkvpd |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:27090 | |||
Oval ID: | oval:org.mitre.oval:def:27090 | ||
Title: | DEPRECATED: ELSA-2013-0727 -- kvm security update (important) | ||
Description: | [kvm-83-262.0.1.el5_9.3] - Added kvm-add-oracle-workaround-for-libvirt-bug.patch - Added kvm-Introduce-oel-machine-type.patch [kvm-83-262.el5_3] - kvm-kernel-kvm-accept-unaligned-MSR_KVM_SYSTEM_TIME-writes.patch [bz#947363] - Resolves: bz#947363 (RHEL.5.8.32 guest hang when installing) [kvm-83-262.el5_2] - kvm-kernel-KVM-Fix-for-buffer-overflow-in-handling-of-MSR_KVM_S.patch [bz#917018] - kvm-kernel-KVM-Convert-MSR_KVM_SYSTEM_TIME-to-use-kvm_write_gue.patch [bz#917022] - kvm-kernel-KVM-Fix-bounds-checking-in-ioapic-indirect-register-.patch [bz#917028] - kvm-kernel-do-not-GP-on-unaligned-MSR_KVM_SYSTEM_TIME-write.patch [bz#bz917019] - Resolves: bz#917018 (CVE-2013-1796 kernel: kvm: buffer overflow in handling of MSR_KVM_SYSTEM_TIME [rhel-5.9.z]) - Resolves: bz#917022 (CVE-2013-1797 kernel: kvm: after free issue with the handling of MSR_KVM_SYSTEM_TIME [rhel-5.9.z]) - Resolves: bz#917028 (CVE-2013-1798 kernel: kvm: out-of-bounds access in ioapic indirect register reads [rhel-5.9.z]) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-0727 CVE-2013-1796 CVE-2013-1798 CVE-2013-1797 | Version: | 4 |
Platform(s): | Oracle Linux 5 | Product(s): | kvm |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:27136 | |||
Oval ID: | oval:org.mitre.oval:def:27136 | ||
Title: | ELSA-2014-3082 -- Unbreakable Enterprise kernel security update (important) | ||
Description: | [2.6.39-400.215.11] - ALSA: control: Don't access controls outside of protected regions (Lars-Peter Clausen) [Orabug: 19817786] {CVE-2014-4653} {CVE-2014-4654} {CVE-2014-4655} - ALSA: control: Fix replacing user controls (Lars-Peter Clausen) [Orabug: 19817748] {CVE-2014-4653} {CVE-2014-4654} {CVE-2014-4655} - kvm: iommu: fix the third parameter of kvm_iommu_put_pages (CVE-2014-3601) (Michael S. Tsirkin) [Orabug: 19817647] {CVE-2014-3601} - mm: try_to_unmap_cluster() should lock_page() before mlocking (Vlastimil Babka) [Orabug: 19817323] {CVE-2014-3122} - vm: convert fb_mmap to vm_iomap_memory() helper (Linus Torvalds) [Orabug: 19816563] {CVE-2013-2596} - vm: add vm_iomap_memory() helper function (Linus Torvalds) [Orabug: 19816563] {CVE-2013-2596} - net: sctp: inherit auth_capable on INIT collisions (Daniel Borkmann) [Orabug: 19816068] {CVE-2014-5077} | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-3082 CVE-2014-4653 CVE-2014-4654 CVE-2014-4655 CVE-2014-5077 CVE-2014-3601 CVE-2014-3122 CVE-2013-2596 | Version: | 3 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | kernel-uek kernel-uek-debug kernel-uek-debug-devel kernel-uek-devel kernel-uek-doc kernel-uek-firmware |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27402 | |||
Oval ID: | oval:org.mitre.oval:def:27402 | ||
Title: | DEPRECATED: ELSA-2013-1173 -- kernel security and bug fix update (important) | ||
Description: | [2.6.32-358.18.1] - [x86] perf/x86: Fix offcore_rsp valid mask for SNB/IVB (Nikola Pajkovsky) [971314 971315] {CVE-2013-2146} - [net] br: fix schedule while atomic issue in br_features_recompute() (Jiri Pirko) [990464 980876] - [scsi] isci: Fix a race condition in the SSP task management path (David Milburn) [990470 978609] - [bluetooth] L2CAP - Fix info leak via getsockname() (Jacob Tanenbaum) [922417 922418] {CVE-2012-6544} - [bluetooth] HCI - Fix info leak in getsockopt() (Jacob Tanenbaum) [922417 922418] {CVE-2012-6544} - [net] tuntap: initialize vlan_features (Vlad Yasevich) [984524 951458] - [net] af_key: initialize satype in key_notify_policy_flush() (Thomas Graf) [981225 981227] {CVE-2013-2237} - [usb] uhci: fix for suspend of virtual HP controller (Gopal) [982697 960026] - [usb] uhci: Remove PCI dependencies from uhci-hub (Gopal) [982697 960026] - [netdrv] bnx2x: Change MDIO clock settings (Michal Schmidt) [982116 901747] - [scsi] st: Take additional queue ref in st_probe (Tomas Henzl) [979293 927988] - [kernel] audit: wait_for_auditd() should use TASK_UNINTERRUPTIBLE (Oleg Nesterov) [982472 962976] - [kernel] audit: avoid negative sleep durations (Oleg Nesterov) [982472 962976] - [fs] ext4/jbd2: dont wait (forever) for stale tid caused by wraparound (Eric Sandeen) [963557 955807] - [fs] jbd: dont wait (forever) for stale tid caused by wraparound (Eric Sandeen) [963557 955807] - [fs] ext4: fix waiting and sending of a barrier in ext4_sync_file() (Eric Sandeen) [963557 955807] - [fs] jbd2: Add function jbd2_trans_will_send_data_barrier() (Eric Sandeen) [963557 955807] - [fs] jbd2: fix sending of data flush on journal commit (Eric Sandeen) [963557 955807] - [fs] ext4: fix fdatasync() for files with only i_size changes (Eric Sandeen) [963557 955807] - [fs] ext4: Initialize fsync transaction ids in ext4_new_inode() (Eric Sandeen) [963557 955807] - [fs] ext4: Rewrite __jbd2_log_start_commit logic to match upstream (Eric Sandeen) [963557 955807] - [net] bridge: Set vlan_features to allow offloads on vlans (Vlad Yasevich) [984524 951458] - [virt] virtio-net: initialize vlan_features (Vlad Yasevich) [984524 951458] - [mm] swap: avoid read_swap_cache_async() race to deadlock while waiting on discard I/O completion (Rafael Aquini) [977668 827548] - [dma] ioat: Fix excessive CPU utilization (John Feeney) [982758 883575] - [fs] vfs: revert most of dcache remove d_mounted (Ian Kent) [974597 907512] - [fs] xfs: don't free EFIs before the EFDs are committed (Carlos Maiolino) [975578 947582] - [fs] xfs: pass shutdown method into xfs_trans_ail_delete_bulk (Carlos Maiolino) [975576 805407] - [net] ipv6: bind() use stronger condition for bind_conflict (Flavio Leitner) [989923 917872] - [net] tcp: bind() use stronger condition for bind_conflict (Flavio Leitner) [977680 894683] - [x86] remove BUG_ON(TS_USEDFPU) in __sanitize_i387_state() (Oleg Nesterov) [956054 920445] - [fs] coredump: ensure the fpu state is flushed for proper multi-threaded core dump (Oleg Nesterov) [956054 920445] | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-1173 CVE-2012-6544 CVE-2013-2206 CVE-2013-2224 CVE-2013-2232 CVE-2013-2237 CVE-2013-2146 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | kernel |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27454 | |||
Oval ID: | oval:org.mitre.oval:def:27454 | ||
Title: | ELSA-2013-2519 -- Unbreakable Enterprise kernel Security update (important) | ||
Description: | [2.6.39-400.21.2] - KVM: x86: Convert MSR_KVM_SYSTEM_TIME to use gfn_to_hva_cache functions (CVE-2013-1797) (Andy Honig) [Orabug: 16711660] {CVE-2013-1797} - Bluetooth: Fix incorrect strncpy() in hidp_setup_hid() (Anderson Lizardo) [Orabug: 16711065] {CVE-2013-0349} - USB: io_ti: Fix NULL dereference in chase_port() (Wolfgang Frisch) [Orabug: 16425358] {CVE-2013-1774} - keys: fix race with concurrent install_user_keyrings() (David Howells) [Orabug: 16493354] {CVE-2013-1792} - KVM: Fix bounds checking in ioapic indirect register reads (CVE-2013-1798) (Andy Honig) [Orabug: 16710951] {CVE-2013-1798} - KVM: x86: fix for buffer overflow in handling of MSR_KVM_SYSTEM_TIME (CVE-2013-1796) (Andy Honig) [Orabug: 16710806] {CVE-2013-1796} - tmpfs: fix use-after-free of mempolicy object (Greg Thelen) [Orabug: 16515833] {CVE-2013-1767} | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-2519 CVE-2013-1774 CVE-2013-1796 CVE-2013-1797 CVE-2013-0349 CVE-2013-1767 CVE-2013-1798 CVE-2013-1792 | Version: | 3 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | kernel-uek kernel-uek-debug kernel-uek-debug-devel kernel-uek-devel kernel-uek-doc kernel-uek-firmware |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27517 | |||
Oval ID: | oval:org.mitre.oval:def:27517 | ||
Title: | ELSA-2013-2503 -- Unbreakable Enterprise kernel security update (moderate) | ||
Description: | [2.6.39-300.28.1] - kmod: make __request_module() killable (Oleg Nesterov) [Orabug: 16286305] {CVE-2012-4398} - kmod: introduce call_modprobe() helper (Oleg Nesterov) [Orabug: 16286305] {CVE-2012-4398} - usermodehelper: implement UMH_KILLABLE (Oleg Nesterov) [Orabug: 16286305] {CVE-2012-4398} - usermodehelper: introduce umh_complete(sub_info) (Oleg Nesterov) [Orabug: 16286305] {CVE-2012-4398} - KVM: x86: invalid opcode oops on SET_SREGS with OSXSAVE bit set (CVE-2012-4461) (Jerry Snitselaar) [Orabug: 16286290] {CVE-2012-4461} - exec: do not leave bprm->interp on stack (Kees Cook) [Orabug: 16286267] {CVE-2012-4530} - exec: use -ELOOP for max recursion depth (Kees Cook) [Orabug: 16286267] {CVE-2012-4530} | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-2503 CVE-2012-4398 CVE-2012-4461 CVE-2012-4530 CVE-2013-0190 CVE-2013-0231 CVE-2013-0216 CVE-2013-0217 | Version: | 3 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | kernel-uek kernel-uek-debug kernel-uek-debug-devel kernel-uek-devel kernel-uek-doc kernel-uek-firmware |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27616 | |||
Oval ID: | oval:org.mitre.oval:def:27616 | ||
Title: | DEPRECATED: ELSA-2013-0747 -- kernel security and bug fix update (moderate) | ||
Description: | kernel [2.6.18-348.4.1] - [virt] xen-netback: backports (Andrew Jones) [910884 910885] {CVE-2013-0216} - [virt] xen-netback: netif_schedulable should take a netif (Andrew Jones) [910884 910885] {CVE-2013-0216} - [virt] pciback: rate limit error mess from pciback_enable_msi() (Igor Mammedov) [910876 910877] {CVE-2013-0231} - [net] be2net: remove BUG_ON() in be_mcc_compl_is_new() (Ivan Vecera) [923910 907524] - [net] ipv4: Update MTU to all related cache entries (Amerigo Wang) [923353 905190] - [net] annotate rt_hash_code() users (Amerigo Wang) [923353 905190] - [net] xfrm_user: fix info leak in copy_to_user_state() (Thomas Graf) [922426 922427] {CVE-2012-6537} - [net] xfrm_user: fix info leak in copy_to_user_policy() (Thomas Graf) [922426 922427] {CVE-2012-6537} - [net] xfrm_user: fix info leak in copy_to_user_tmpl() (Thomas Graf) [922426 922427] {CVE-2012-6537} - [net] atm: fix info leak in getsockopt(SO_ATMPVC) (Thomas Graf) [922384 922385] {CVE-2012-6546} - [net] atm: fix info leak via getsockname() (Thomas Graf) [922384 922385] {CVE-2012-6546} - [net] tun: fix ioctl() based info leaks (Thomas Graf) [922348 922349] {CVE-2012-6547} - [net] llc, zero sockaddr_llc struct (Thomas Graf) [922327 922329] {CVE-2012-6542} - [net] llc: fix info leak via getsockname() (Thomas Graf) [922327 922329] {CVE-2012-6542} - [net] xfrm_user: return error pointer instead of NULL (Thomas Graf) [919386 919387] {CVE-2013-1826} - [net] ixgbevf: allocate room for mailbox MSI-X interrupt's name (Laszlo Ersek) [924134 862862] - [fs] knfsd: allow nfsd READDIR to return 64bit cookies (Niels de Vos) [924087 918952] | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-0747 CVE-2013-0231 CVE-2013-1826 CVE-2012-6542 CVE-2012-6546 CVE-2012-6547 CVE-2012-6537 CVE-2013-0216 | Version: | 4 |
Platform(s): | Oracle Linux 5 | Product(s): | kernel |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27667 | |||
Oval ID: | oval:org.mitre.oval:def:27667 | ||
Title: | DEPRECATED: ELSA-2013-0830 -- kernel security update (important) | ||
Description: | [2.6.32-358.6.2] - [kernel] perf: fix perf_swevent_enabled array out-of-bound access (Petr Matousek) [962793 962794] {CVE-2013-2094} | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-0830 CVE-2013-2094 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | kernel |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
SAINT Exploits
Description | Link |
---|---|
Linux kernel __sock_diag_rcv_msg Netlink message privilege elevation | More info here |
ExploitDB Exploits
id | Description |
---|---|
2013-02-24 | Linux Kernel 3.3-3.8 - SOCK_DIAG Local Root Exploit |
2013-06-11 | Linux kernel perf_swevent_init - Local root Exploit |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-03-17 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2016-0450.nasl - Type : ACT_GATHER_INFO |
2016-03-16 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2016-0450.nasl - Type : ACT_GATHER_INFO |
2016-03-16 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2016-0450.nasl - Type : ACT_GATHER_INFO |
2016-03-16 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20160315_kernel_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2013-0674-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2013-1832-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0189-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0287-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0536-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-1138-1.nasl - Type : ACT_GATHER_INFO |
2015-04-15 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2015-0803.nasl - Type : ACT_GATHER_INFO |
2015-04-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2015-0782.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-103.nasl - Type : ACT_GATHER_INFO |
2015-03-18 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2015-0695.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2013-0010.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2013-0015.nasl - Type : ACT_GATHER_INFO |
2014-11-12 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-1645.nasl - Type : ACT_GATHER_INFO |
2014-11-12 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-1392.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2013-0579.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2013-0636.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2013-0746.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0832.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0928.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1026.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2013-1076.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2013-1181.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2013-1527.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2013-1802.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2014-0339.nasl - Type : ACT_GATHER_INFO |
2014-11-04 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20141014_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2014-10-24 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL15732.nasl - Type : ACT_GATHER_INFO |
2014-10-23 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-140924.nasl - Type : ACT_GATHER_INFO |
2014-10-23 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-bigsmp-201409-140924.nasl - Type : ACT_GATHER_INFO |
2014-10-22 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-1392.nasl - Type : ACT_GATHER_INFO |
2014-10-20 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3082.nasl - Type : ACT_GATHER_INFO |
2014-10-20 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3083.nasl - Type : ACT_GATHER_INFO |
2014-10-14 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1392.nasl - Type : ACT_GATHER_INFO |
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL14445.nasl - Type : ACT_GATHER_INFO |
2014-07-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0622.nasl - Type : ACT_GATHER_INFO |
2014-07-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0829.nasl - Type : ACT_GATHER_INFO |
2014-07-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1264.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-799.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-1034.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-175.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-176.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-398.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-440.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-452.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-454.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-512.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-113.nasl - Type : ACT_GATHER_INFO |
2014-03-26 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0328.nasl - Type : ACT_GATHER_INFO |
2014-03-26 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0328.nasl - Type : ACT_GATHER_INFO |
2014-03-26 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0328.nasl - Type : ACT_GATHER_INFO |
2014-03-26 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140325_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2014-03-20 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-190.nasl - Type : ACT_GATHER_INFO |
2014-02-05 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-140124.nasl - Type : ACT_GATHER_INFO |
2014-02-05 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-140125.nasl - Type : ACT_GATHER_INFO |
2013-12-18 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2589.nasl - Type : ACT_GATHER_INFO |
2013-12-17 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20131121_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-12-17 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20131212_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-12-13 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-1801.nasl - Type : ACT_GATHER_INFO |
2013-12-13 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1801.nasl - Type : ACT_GATHER_INFO |
2013-12-13 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1801.nasl - Type : ACT_GATHER_INFO |
2013-11-29 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2584.nasl - Type : ACT_GATHER_INFO |
2013-11-29 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2585.nasl - Type : ACT_GATHER_INFO |
2013-11-27 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1645.nasl - Type : ACT_GATHER_INFO |
2013-11-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1645.nasl - Type : ACT_GATHER_INFO |
2013-10-24 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-233.nasl - Type : ACT_GATHER_INFO |
2013-10-01 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-218.nasl - Type : ACT_GATHER_INFO |
2013-09-30 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2766.nasl - Type : ACT_GATHER_INFO |
2013-09-28 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-1292.nasl - Type : ACT_GATHER_INFO |
2013-09-28 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1292-1.nasl - Type : ACT_GATHER_INFO |
2013-09-28 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1292.nasl - Type : ACT_GATHER_INFO |
2013-09-28 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130926_kernel_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-09-27 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1292.nasl - Type : ACT_GATHER_INFO |
2013-09-21 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-130827.nasl - Type : ACT_GATHER_INFO |
2013-09-21 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-130828.nasl - Type : ACT_GATHER_INFO |
2013-09-18 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2546.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-200.nasl - Type : ACT_GATHER_INFO |
2013-08-29 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-1173.nasl - Type : ACT_GATHER_INFO |
2013-08-29 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130827_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-08-28 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1173.nasl - Type : ACT_GATHER_INFO |
2013-08-28 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1173.nasl - Type : ACT_GATHER_INFO |
2013-07-19 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2537.nasl - Type : ACT_GATHER_INFO |
2013-07-19 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2538.nasl - Type : ACT_GATHER_INFO |
2013-07-18 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-1051.nasl - Type : ACT_GATHER_INFO |
2013-07-18 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130716_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-07-18 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-130702.nasl - Type : ACT_GATHER_INFO |
2013-07-17 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1051.nasl - Type : ACT_GATHER_INFO |
2013-07-17 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1051.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0496.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0630.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0727.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0744.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0747-1.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0747.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2013-0807.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0830.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1034-1.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1034.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2507.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2519.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2520.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2523.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2524.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2525.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2534.nasl - Type : ACT_GATHER_INFO |
2013-07-11 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-1034.nasl - Type : ACT_GATHER_INFO |
2013-07-11 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130710_kernel_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-07-10 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1034.nasl - Type : ACT_GATHER_INFO |
2013-07-05 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1899-1.nasl - Type : ACT_GATHER_INFO |
2013-07-05 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1900-1.nasl - Type : ACT_GATHER_INFO |
2013-06-25 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-176.nasl - Type : ACT_GATHER_INFO |
2013-06-18 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-130604.nasl - Type : ACT_GATHER_INFO |
2013-06-16 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1876-1.nasl - Type : ACT_GATHER_INFO |
2013-06-16 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1877-1.nasl - Type : ACT_GATHER_INFO |
2013-06-16 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1878-1.nasl - Type : ACT_GATHER_INFO |
2013-06-16 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1880-1.nasl - Type : ACT_GATHER_INFO |
2013-06-16 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1881-1.nasl - Type : ACT_GATHER_INFO |
2013-05-31 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0882.nasl - Type : ACT_GATHER_INFO |
2013-05-31 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1849-1.nasl - Type : ACT_GATHER_INFO |
2013-05-29 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2013-140-01.nasl - Type : ACT_GATHER_INFO |
2013-05-25 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1833-1.nasl - Type : ACT_GATHER_INFO |
2013-05-25 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1834-1.nasl - Type : ACT_GATHER_INFO |
2013-05-25 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1835-1.nasl - Type : ACT_GATHER_INFO |
2013-05-25 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1837-1.nasl - Type : ACT_GATHER_INFO |
2013-05-22 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-130515.nasl - Type : ACT_GATHER_INFO |
2013-05-21 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0830.nasl - Type : ACT_GATHER_INFO |
2013-05-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0840.nasl - Type : ACT_GATHER_INFO |
2013-05-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0841.nasl - Type : ACT_GATHER_INFO |
2013-05-17 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2669.nasl - Type : ACT_GATHER_INFO |
2013-05-17 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0830.nasl - Type : ACT_GATHER_INFO |
2013-05-17 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130516_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-05-17 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1829-1.nasl - Type : ACT_GATHER_INFO |
2013-05-16 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1824-1.nasl - Type : ACT_GATHER_INFO |
2013-05-16 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1825-1.nasl - Type : ACT_GATHER_INFO |
2013-05-16 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1826-1.nasl - Type : ACT_GATHER_INFO |
2013-05-16 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1827-1.nasl - Type : ACT_GATHER_INFO |
2013-05-16 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1828-1.nasl - Type : ACT_GATHER_INFO |
2013-05-15 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2668.nasl - Type : ACT_GATHER_INFO |
2013-05-14 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2013-0807.nasl - Type : ACT_GATHER_INFO |
2013-05-10 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0807.nasl - Type : ACT_GATHER_INFO |
2013-05-10 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130509_hypervkvpd_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-05-08 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-130426.nasl - Type : ACT_GATHER_INFO |
2013-05-04 | Name : The remote Fedora host is missing a security update. File : fedora_2013-6999.nasl - Type : ACT_GATHER_INFO |
2013-05-03 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1813-1.nasl - Type : ACT_GATHER_INFO |
2013-05-03 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1815-1.nasl - Type : ACT_GATHER_INFO |
2013-05-02 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1809-1.nasl - Type : ACT_GATHER_INFO |
2013-05-02 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1812-1.nasl - Type : ACT_GATHER_INFO |
2013-04-29 | Name : The remote Fedora host is missing a security update. File : fedora_2013-6537.nasl - Type : ACT_GATHER_INFO |
2013-04-26 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1808-1.nasl - Type : ACT_GATHER_INFO |
2013-04-25 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0744.nasl - Type : ACT_GATHER_INFO |
2013-04-25 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130423_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-04-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0744.nasl - Type : ACT_GATHER_INFO |
2013-04-22 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1805-1.nasl - Type : ACT_GATHER_INFO |
2013-04-18 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130416_kernel_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-04-17 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0747.nasl - Type : ACT_GATHER_INFO |
2013-04-17 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0747.nasl - Type : ACT_GATHER_INFO |
2013-04-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_kernel-8518.nasl - Type : ACT_GATHER_INFO |
2013-04-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_kernel-8527.nasl - Type : ACT_GATHER_INFO |
2013-04-12 | Name : The remote Fedora host is missing a security update. File : fedora_2013-5368.nasl - Type : ACT_GATHER_INFO |
2013-04-11 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0727.nasl - Type : ACT_GATHER_INFO |
2013-04-10 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0727.nasl - Type : ACT_GATHER_INFO |
2013-04-10 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130409_kvm_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-04-09 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1792-1.nasl - Type : ACT_GATHER_INFO |
2013-04-09 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1793-1.nasl - Type : ACT_GATHER_INFO |
2013-04-09 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1795-1.nasl - Type : ACT_GATHER_INFO |
2013-04-09 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1796-1.nasl - Type : ACT_GATHER_INFO |
2013-04-09 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1798-1.nasl - Type : ACT_GATHER_INFO |
2013-04-04 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1788-1.nasl - Type : ACT_GATHER_INFO |
2013-04-03 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1787-1.nasl - Type : ACT_GATHER_INFO |
2013-04-01 | Name : The remote Fedora host is missing a security update. File : fedora_2013-4357.nasl - Type : ACT_GATHER_INFO |
2013-03-24 | Name : The remote Fedora host is missing a security update. File : fedora_2013-4240.nasl - Type : ACT_GATHER_INFO |
2013-03-22 | Name : The remote Fedora host is missing a security update. File : fedora_2013-3909.nasl - Type : ACT_GATHER_INFO |
2013-03-20 | Name : The remote Fedora host is missing a security update. File : fedora_2013-4012.nasl - Type : ACT_GATHER_INFO |
2013-03-19 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1767-1.nasl - Type : ACT_GATHER_INFO |
2013-03-19 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1768-1.nasl - Type : ACT_GATHER_INFO |
2013-03-19 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1769-1.nasl - Type : ACT_GATHER_INFO |
2013-03-17 | Name : The remote Fedora host is missing a security update. File : fedora_2013-3893.nasl - Type : ACT_GATHER_INFO |
2013-03-15 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0630.nasl - Type : ACT_GATHER_INFO |
2013-03-15 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130312_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-03-13 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0630.nasl - Type : ACT_GATHER_INFO |
2013-03-13 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1760-1.nasl - Type : ACT_GATHER_INFO |
2013-03-11 | Name : The remote Fedora host is missing a security update. File : fedora_2013-3630.nasl - Type : ACT_GATHER_INFO |
2013-03-10 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0496.nasl - Type : ACT_GATHER_INFO |
2013-03-10 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0496.nasl - Type : ACT_GATHER_INFO |
2013-03-07 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1756-1.nasl - Type : ACT_GATHER_INFO |
2013-03-04 | Name : The remote Fedora host is missing a security update. File : fedora_2013-3106.nasl - Type : ACT_GATHER_INFO |
2013-02-27 | Name : The remote Fedora host is missing a security update. File : fedora_2013-3086.nasl - Type : ACT_GATHER_INFO |
2013-02-27 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1749-1.nasl - Type : ACT_GATHER_INFO |
2013-02-27 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1750-1.nasl - Type : ACT_GATHER_INFO |
2013-02-27 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1751-1.nasl - Type : ACT_GATHER_INFO |
2013-02-25 | Name : The remote Fedora host is missing a security update. File : fedora_2013-2597.nasl - Type : ACT_GATHER_INFO |
2013-02-19 | Name : The remote Fedora host is missing a security update. File : fedora_2013-2635.nasl - Type : ACT_GATHER_INFO |
2013-02-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1726-1.nasl - Type : ACT_GATHER_INFO |
2013-02-13 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1719-1.nasl - Type : ACT_GATHER_INFO |
2013-02-13 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1720-1.nasl - Type : ACT_GATHER_INFO |
2013-02-04 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1696-2.nasl - Type : ACT_GATHER_INFO |
2013-02-04 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1699-2.nasl - Type : ACT_GATHER_INFO |
2013-02-04 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1704-2.nasl - Type : ACT_GATHER_INFO |
2013-02-03 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1698-2.nasl - Type : ACT_GATHER_INFO |
2013-02-03 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1700-2.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_hyper-v-120614.nasl - Type : ACT_GATHER_INFO |
2013-01-23 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1704-1.nasl - Type : ACT_GATHER_INFO |
2013-01-18 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1696-1.nasl - Type : ACT_GATHER_INFO |
2013-01-18 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1698-1.nasl - Type : ACT_GATHER_INFO |
2013-01-18 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1699-1.nasl - Type : ACT_GATHER_INFO |
2013-01-18 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1700-1.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:43:50 |
|
2013-06-24 17:18:57 |
|