Executive Summary
Summary | |
---|---|
Title | Linux kernel vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-2128-1 | First vendor Publication | 2014-03-05 |
Vendor | Ubuntu | Last vendor Modification | 2014-03-05 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 10.04 LTS Summary: Several security issues were fixed in the kernel. Software Description: - linux: Linux kernel Details: An information leak was discovered in the Linux kernel when inotify is used to monitor the /dev/ptmx device. A local user could exploit this flaw to discover keystroke timing and potentially discover sensitive information like password length. (CVE-2013-0160) Vasily Kulikov reported a flaw in the Linux kernel's implementation of ptrace. An unprivileged local user could exploit this flaw to obtain sensitive information from kernel memory. (CVE-2013-2929) Andrew Honig reported a flaw in the Linux Kernel's kvm_vm_ioctl_create_vcpu function of the Kernel Virtual Machine (KVM) subsystem. A local user could exploit this flaw to gain privileges on the host machine. (CVE-2013-4587) Andrew Honig reported a flaw in the apic_get_tmcct function of the Kernel Virtual Machine (KVM) subsystem if the Linux kernel. A guest OS user could exploit this flaw to cause a denial of service or host OS system crash. (CVE-2013-6367) Nico Golde and Fabian Yamaguchi reported a flaw in the driver for Adaptec AACRAID scsi raid devices in the Linux kernel. A local user could use this flaw to cause a denial of service or possibly other unspecified impact. (CVE-2013-6380) Nico Golde and Fabian Yamaguchi reported buffer underflow errors in the implementation of the XFS filesystem in the Linux kernel. A local user with CAP_SYS_ADMIN could exploit these flaw to cause a denial of service (memory corruption) or possibly other unspecified issues. (CVE-2013-6382) Evan Huus reported a buffer overflow in the Linux kernel's radiotap header parsing. A remote attacker could cause a denial of service (buffer over- read) via a specially crafted header. (CVE-2013-7027) An information leak was discovered in the recvfrom, recvmmsg, and recvmsg systemcalls when used with ISDN sockets in the Linux kernel. A local user could exploit this leak to obtain potentially sensitive information from kernel memory. (CVE-2013-7266) An information leak was discovered in the recvfrom, recvmmsg, and recvmsg systemcalls when used with apple talk sockets in the Linux kernel. A local user could exploit this leak to obtain potentially sensitive information from kernel memory. (CVE-2013-7267) An information leak was discovered in the recvfrom, recvmmsg, and recvmsg systemcalls when used with ipx protocol sockets in the Linux kernel. A local user could exploit this leak to obtain potentially sensitive information from kernel memory. (CVE-2013-7268) An information leak was discovered in the recvfrom, recvmmsg, and recvmsg systemcalls when used with the netrom address family in the Linux kernel. A local user could exploit this leak to obtain potentially sensitive information from kernel memory. (CVE-2013-7269) An information leak was discovered in the recvfrom, recvmmsg, and recvmsg systemcalls when used with packet address family sockets in the Linux kernel. A local user could exploit this leak to obtain potentially sensitive information from kernel memory. (CVE-2013-7270) An information leak was discovered in the recvfrom, recvmmsg, and recvmsg systemcalls when used with x25 protocol sockets in the Linux kernel. A local user could exploit this leak to obtain potentially sensitive information from kernel memory. (CVE-2013-7271) An information leak was discovered in the Linux kernel's SIOCWANDEV ioctl call. A local user with the CAP_NET_ADMIN capability could exploit this flaw to obtain potentially sensitive information from kernel memory. (CVE-2014-1444) An information leak was discovered in the wanxl ioctl function the Linux kernel. A local user could exploit this flaw to obtain potentially sensitive information from kernel memory. (CVE-2014-1445) An information leak was discovered in the Linux kernel's hamradio YAM driver for AX.25 packet radio. A local user with the CAP_NET_ADMIN capability could exploit this flaw to obtain sensitive information from kernel memory. (CVE-2014-1446) Matthew Thode reported a denial of service vulnerability in the Linux kernel when SELinux support is enabled. A local user with the CAP_MAC_ADMIN capability (and the SELinux mac_admin permission if running in enforcing mode) could exploit this flaw to cause a denial of service (kernel crash). (CVE-2014-1874) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 10.04 LTS: After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well. References: Package Information: |
Original Source
Url : http://www.ubuntu.com/usn/USN-2128-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
53 % | CWE-20 | Improper Input Validation |
18 % | CWE-399 | Resource Management Errors |
12 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
6 % | CWE-264 | Permissions, Privileges, and Access Controls |
6 % | CWE-200 | Information Exposure |
6 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:20412 | |||
Oval ID: | oval:org.mitre.oval:def:20412 | ||
Title: | USN-2072-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2072-1 CVE-2013-2930 CVE-2013-4345 CVE-2013-4511 CVE-2013-4513 CVE-2013-4514 CVE-2013-4515 CVE-2013-6383 CVE-2013-6763 CVE-2013-7027 | Version: | 5 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20666 | |||
Oval ID: | oval:org.mitre.oval:def:20666 | ||
Title: | USN-2069-1 -- linux-lts-raring vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2069-1 CVE-2013-4470 CVE-2013-4511 CVE-2013-4513 CVE-2013-4514 CVE-2013-4515 CVE-2013-4516 CVE-2013-6383 CVE-2013-6763 CVE-2013-7027 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-raring |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20813 | |||
Oval ID: | oval:org.mitre.oval:def:20813 | ||
Title: | USN-2073-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2073-1 CVE-2013-4470 CVE-2013-4511 CVE-2013-4513 CVE-2013-4514 CVE-2013-4515 CVE-2013-4516 CVE-2013-6383 CVE-2013-6763 CVE-2013-7027 | Version: | 5 |
Platform(s): | Ubuntu 13.04 | Product(s): | linux |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20858 | |||
Oval ID: | oval:org.mitre.oval:def:20858 | ||
Title: | USN-2067-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2067-1 CVE-2013-4299 CVE-2013-4470 CVE-2013-4511 CVE-2013-4514 CVE-2013-4515 CVE-2013-4592 CVE-2013-6282 CVE-2013-6378 CVE-2013-6383 CVE-2013-6763 CVE-2013-7027 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20902 | |||
Oval ID: | oval:org.mitre.oval:def:20902 | ||
Title: | USN-2074-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2074-1 CVE-2013-2930 CVE-2013-4345 CVE-2013-4511 CVE-2013-4513 CVE-2013-4514 CVE-2013-4515 CVE-2013-6383 CVE-2013-6763 CVE-2013-7027 | Version: | 5 |
Platform(s): | Ubuntu 13.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:21170 | |||
Oval ID: | oval:org.mitre.oval:def:21170 | ||
Title: | USN-2076-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2076-1 CVE-2013-2930 CVE-2013-4345 CVE-2013-4511 CVE-2013-4513 CVE-2013-4514 CVE-2013-4515 CVE-2013-6383 CVE-2013-6763 CVE-2013-7027 | Version: | 5 |
Platform(s): | Ubuntu 13.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:21245 | |||
Oval ID: | oval:org.mitre.oval:def:21245 | ||
Title: | USN-2066-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2066-1 CVE-2013-4299 CVE-2013-4470 CVE-2013-4511 CVE-2013-4514 CVE-2013-4515 CVE-2013-4592 CVE-2013-6378 CVE-2013-6383 CVE-2013-6763 CVE-2013-7027 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21272 | |||
Oval ID: | oval:org.mitre.oval:def:21272 | ||
Title: | USN-2068-1 -- linux-lts-quantal vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2068-1 CVE-2013-2930 CVE-2013-4345 CVE-2013-4511 CVE-2013-4513 CVE-2013-4514 CVE-2013-4515 CVE-2013-6383 CVE-2013-6763 CVE-2013-7027 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-quantal |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:21306 | |||
Oval ID: | oval:org.mitre.oval:def:21306 | ||
Title: | USN-2071-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2071-1 CVE-2013-2930 CVE-2013-4345 CVE-2013-4511 CVE-2013-4513 CVE-2013-4514 CVE-2013-4515 CVE-2013-6383 CVE-2013-6763 CVE-2013-7027 | Version: | 5 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23368 | |||
Oval ID: | oval:org.mitre.oval:def:23368 | ||
Title: | USN-2116-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2116-1 CVE-2013-2929 CVE-2013-4592 CVE-2013-6378 CVE-2013-6380 | Version: | 5 |
Platform(s): | Ubuntu 13.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23441 | |||
Oval ID: | oval:org.mitre.oval:def:23441 | ||
Title: | USN-2117-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2117-1 CVE-2013-4563 CVE-2013-4579 CVE-2013-4587 CVE-2013-6367 CVE-2013-6368 CVE-2013-6376 CVE-2013-6382 CVE-2013-6432 CVE-2013-7263 CVE-2013-7264 CVE-2013-7265 CVE-2013-7266 CVE-2013-7267 CVE-2013-7268 CVE-2013-7269 CVE-2013-7270 CVE-2013-7271 CVE-2013-7281 CVE-2014-1438 CVE-2014-1446 | Version: | 5 |
Platform(s): | Ubuntu 13.10 | Product(s): | linux |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:24074 | |||
Oval ID: | oval:org.mitre.oval:def:24074 | ||
Title: | USN-2135-1 -- linux-lts-quantal vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2135-1 CVE-2013-4579 CVE-2013-4587 CVE-2013-6367 CVE-2013-6368 CVE-2013-6382 CVE-2013-7263 CVE-2013-7264 CVE-2013-7265 CVE-2013-7266 CVE-2013-7267 CVE-2013-7268 CVE-2013-7269 CVE-2013-7270 CVE-2013-7271 CVE-2013-7281 CVE-2014-1438 CVE-2014-1446 CVE-2014-1874 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-quantal |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:24102 | |||
Oval ID: | oval:org.mitre.oval:def:24102 | ||
Title: | USN-2134-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2134-1 CVE-2013-4579 CVE-2013-6368 CVE-2014-1438 CVE-2014-1446 CVE-2014-1874 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:24140 | |||
Oval ID: | oval:org.mitre.oval:def:24140 | ||
Title: | USN-2111-1 -- linux-lts-quantal vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2111-1 CVE-2013-2929 CVE-2013-4592 CVE-2013-6378 CVE-2013-6380 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-quantal |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:24220 | |||
Oval ID: | oval:org.mitre.oval:def:24220 | ||
Title: | USN-2113-1 -- linux-lts-saucy vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2113-1 CVE-2013-4563 CVE-2013-4579 CVE-2013-4587 CVE-2013-6367 CVE-2013-6368 CVE-2013-6376 CVE-2013-6382 CVE-2013-6432 CVE-2013-7263 CVE-2013-7264 CVE-2013-7265 CVE-2013-7266 CVE-2013-7267 CVE-2013-7268 CVE-2013-7269 CVE-2013-7270 CVE-2013-7271 CVE-2013-7281 CVE-2014-1438 CVE-2014-1446 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-saucy |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:24233 | |||
Oval ID: | oval:org.mitre.oval:def:24233 | ||
Title: | USN-2136-1 -- linux-lts-raring vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2136-1 CVE-2013-4579 CVE-2013-4587 CVE-2013-6367 CVE-2013-6368 CVE-2013-6376 CVE-2013-6380 CVE-2013-7263 CVE-2013-7264 CVE-2013-7265 CVE-2013-7266 CVE-2013-7267 CVE-2013-7268 CVE-2013-7269 CVE-2013-7270 CVE-2013-7271 CVE-2013-7281 CVE-2014-1438 CVE-2014-1446 CVE-2014-1874 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-raring |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:24256 | |||
Oval ID: | oval:org.mitre.oval:def:24256 | ||
Title: | USN-2114-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2114-1 CVE-2013-2929 CVE-2013-4592 CVE-2013-6378 CVE-2013-6380 | Version: | 5 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24316 | |||
Oval ID: | oval:org.mitre.oval:def:24316 | ||
Title: | USN-2138-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2138-1 CVE-2013-4579 CVE-2013-4587 CVE-2013-6367 CVE-2013-6368 CVE-2013-6382 CVE-2013-7263 CVE-2013-7264 CVE-2013-7265 CVE-2013-7266 CVE-2013-7267 CVE-2013-7268 CVE-2013-7269 CVE-2013-7270 CVE-2013-7271 CVE-2013-7281 CVE-2014-1438 CVE-2014-1446 CVE-2014-1874 | Version: | 5 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24332 | |||
Oval ID: | oval:org.mitre.oval:def:24332 | ||
Title: | USN-2115-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2115-1 CVE-2013-2929 CVE-2013-4592 CVE-2013-6378 CVE-2013-6380 | Version: | 5 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:24394 | |||
Oval ID: | oval:org.mitre.oval:def:24394 | ||
Title: | USN-2139-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2139-1 CVE-2013-4579 CVE-2013-4587 CVE-2013-6367 CVE-2013-6368 CVE-2013-6382 CVE-2013-7263 CVE-2013-7264 CVE-2013-7265 CVE-2013-7266 CVE-2013-7267 CVE-2013-7268 CVE-2013-7269 CVE-2013-7270 CVE-2013-7271 CVE-2013-7281 CVE-2014-1438 CVE-2014-1446 CVE-2014-1874 | Version: | 5 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:24395 | |||
Oval ID: | oval:org.mitre.oval:def:24395 | ||
Title: | USN-2133-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2133-1 CVE-2013-4579 CVE-2013-6368 CVE-2014-1438 CVE-2014-1446 CVE-2014-1874 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24404 | |||
Oval ID: | oval:org.mitre.oval:def:24404 | ||
Title: | USN-2141-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2141-1 CVE-2013-4579 CVE-2013-4587 CVE-2013-6367 CVE-2013-6368 CVE-2013-6382 CVE-2013-7263 CVE-2013-7264 CVE-2013-7265 CVE-2013-7266 CVE-2013-7267 CVE-2013-7268 CVE-2013-7269 CVE-2013-7270 CVE-2013-7271 CVE-2013-7281 CVE-2014-1438 CVE-2014-1446 CVE-2014-1874 | Version: | 5 |
Platform(s): | Ubuntu 13.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:24423 | |||
Oval ID: | oval:org.mitre.oval:def:24423 | ||
Title: | USN-2129-1 -- linux-ec2 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2129-1 CVE-2013-0160 CVE-2013-2929 CVE-2013-4587 CVE-2013-6367 CVE-2013-6380 CVE-2013-6382 CVE-2013-7027 CVE-2013-7266 CVE-2013-7267 CVE-2013-7268 CVE-2013-7269 CVE-2013-7270 CVE-2013-7271 CVE-2014-1444 CVE-2014-1445 CVE-2014-1446 CVE-2014-1874 | Version: | 5 |
Platform(s): | Ubuntu 10.04 | Product(s): | linux-ec2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:26571 | |||
Oval ID: | oval:org.mitre.oval:def:26571 | ||
Title: | SUSE-SU-2014:1138-1 -- Security update for the Linux Kernel | ||
Description: | The SUSE Linux Enterprise Server 11 SP1 LTSS received a roll up update to fix several security and non-security issues. The following security issues have been fixed: * CVE-2013-1860: Heap-based buffer overflow in the wdm_in_callback function in drivers/usb/class/cdc-wdm.c in the Linux kernel before 3.8.4 allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted cdc-wdm USB device. (bnc#806431) * CVE-2013-4162: The udp_v6_push_pending_frames function in net/ipv6/udp.c in the IPv6 implementation in the Linux kernel through 3.10.3 makes an incorrect function call for pending data, which allows local users to cause a denial of service (BUG and system crash) via a crafted application that uses the UDP_CORK option in a setsockopt system call. (bnc#831058) * CVE-2014-0203: The __do_follow_link function in fs/namei.c in the Linux kernel before 2.6.33 does not properly handle the last pathname component during use of certain filesystems, which allows local users to cause a denial of service (incorrect free operations and system crash) via an open system call. (bnc#883526) * CVE-2014-3144: The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced. (bnc#877257) * CVE-2014-3145: The BPF_S_ANC_NLATTR_NEST extension implementation in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 uses the reverse order in a certain subtraction, which allows local users to cause a denial of service (over-read and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr_nest function before the vulnerability was announced. (bnc#877257) * CVE-2014-3917: kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number. (bnc#880484) * CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000. (bnc#883724) * CVE-2014-4652: Race condition in the tlv handler functionality in the snd_ctl_elem_user_tlv function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allows local users to obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access. (bnc#883795) * CVE-2014-4653: sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access. (bnc#883795) * CVE-2014-4654: The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not check authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE commands, which allows local users to remove kernel controls and cause a denial of service (use-after-free and system crash) by leveraging /dev/snd/controlCX access for an ioctl call. (bnc#883795) * CVE-2014-4655: The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not properly maintain the user_ctl_count value, which allows local users to cause a denial of service (integer overflow and limit bypass) by leveraging /dev/snd/controlCX access for a large number of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls. (bnc#883795) * CVE-2014-4656: Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allow local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflict function. (bnc#883795) * CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet. (bnc#885422) * CVE-2014-4699: The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls. (bnc#885725) * CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket. (bnc#887082) * CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction. (bnc#889173) * CVE-2013-7266: The mISDN_sock_recvmsg function in drivers/isdn/mISDN/socket.c in the Linux kernel before 3.12.4 does not ensure that a certain length value is consistent with the size of an associated data structure, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call. (bnc#854722) * CVE-2013-7267: The atalk_recvmsg function in net/appletalk/ddp.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call. (bnc#854722) * CVE-2013-7268: The ipx_recvmsg function in net/ipx/af_ipx.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call. (bnc#854722) * CVE-2013-7269: The nr_recvmsg function in net/netrom/af_netrom.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call. (bnc#854722) * CVE-2013-7270: The packet_recvmsg function in net/packet/af_packet.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call. (bnc#854722) * CVE-2013-7271: The x25_recvmsg function in net/x25/af_x25.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call. (bnc#854722) The following bugs have been fixed: * mac80211: Fix AP powersave TX vs. wakeup race (bnc#871797). * tcp: Allow to disable cwnd moderation in TCP_CA_Loss state (bnc#879921). * tcp: Adapt selected parts of RFC 5682 and PRR logic (bnc#879921). * flock: Fix allocation and BKL (bnc#882809). * sunrpc: Close a rare race in xs_tcp_setup_socket (bnc#794824, bnc#884530). * isofs: Fix unbounded recursion when processing relocated directories (bnc#892490). * bonding: Fix a race condition on cleanup in bond_send_unsolicited_na() (bnc#856756). * block: Fix race between request completion and timeout handling (bnc#881051). * Fix kABI breakage due to addition of user_ctl_lock (bnc#883795). Security Issues: * CVE-2013-1860 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1860> * CVE-2013-4162 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4162> * CVE-2013-7266 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7266> * CVE-2013-7267 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7267> * CVE-2013-7268 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7268> * CVE-2013-7269 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7269> * CVE-2013-7270 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7270> * CVE-2013-7271 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7271> * CVE-2014-0203 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0203> * CVE-2014-3144 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3144> * CVE-2014-3145 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145> * CVE-2014-3917 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917> * CVE-2014-4508 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508> * CVE-2014-4652 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4652> * CVE-2014-4653 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4653> * CVE-2014-4654 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4654> * CVE-2014-4655 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4655> * CVE-2014-4656 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4656> * CVE-2014-4667 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667> * CVE-2014-4699 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4699> * CVE-2014-4943 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943> * CVE-2014-5077 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077> | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:1138-1 CVE-2013-1860 CVE-2013-4162 CVE-2014-0203 CVE-2014-3144 CVE-2014-3145 CVE-2014-3917 CVE-2014-4508 CVE-2014-4652 CVE-2014-4653 CVE-2014-4654 CVE-2014-4655 CVE-2014-4656 CVE-2014-4667 CVE-2014-4699 CVE-2014-4943 CVE-2014-5077 CVE-2013-7266 CVE-2013-7267 CVE-2013-7268 CVE-2013-7269 CVE-2013-7270 CVE-2013-7271 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 | Product(s): | Linux kernel |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27042 | |||
Oval ID: | oval:org.mitre.oval:def:27042 | ||
Title: | ELSA-2014-3042 -- unbreakable enterprise kernel security update (important) | ||
Description: | [2.6.39-400.215.3] - SELinux: Fix kernel BUG on empty security contexts. (Stephen Smalley) [Orabug: 19028380] {CVE-2014-1874} - floppy: don't write kernel-only members to FDRAWCMD ioctl output (Matthew Daley) [Orabug: 19028444] {CVE-2014-1738} - floppy: ignore kernel-only members in FDRAWCMD ioctl input (Matthew Daley) [Orabug: 19028438] {CVE-2014-1737} - libertas: potential oops in debugfs (Dan Carpenter) [Orabug: 19028416] {CVE-2013-6378} | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-3042 CVE-2014-1737 CVE-2014-1738 CVE-2013-6378 CVE-2014-1874 | Version: | 3 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | kernel-uek kernel-uek-debug kernel-uek-debug-devel kernel-uek-devel kernel-uek-doc kernel-uek-firmware |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2013-02-05 | Linux Kernel /dev/ptmx Key Stroke Timing Local Disclosure |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-04-03 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2017-0057.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2013-0674-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2013-1832-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0140-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0189-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0287-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0536-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0772-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0773-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0832-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-1138-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-0481-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-0812-1.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-103.nasl - Type : ACT_GATHER_INFO |
2015-03-13 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2015-0290.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-1971.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20141209_kernel_on_SL7_x.nasl - Type : ACT_GATHER_INFO |
2014-12-10 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-1971.nasl - Type : ACT_GATHER_INFO |
2014-12-10 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1971.nasl - Type : ACT_GATHER_INFO |
2014-11-11 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2014-0815.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2013-1802.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0284.nasl - Type : ACT_GATHER_INFO |
2014-07-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0100.nasl - Type : ACT_GATHER_INFO |
2014-07-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0439.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-140709.nasl - Type : ACT_GATHER_INFO |
2014-06-23 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0771.nasl - Type : ACT_GATHER_INFO |
2014-06-23 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3042.nasl - Type : ACT_GATHER_INFO |
2014-06-23 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3043.nasl - Type : ACT_GATHER_INFO |
2014-06-20 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0771.nasl - Type : ACT_GATHER_INFO |
2014-06-20 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0771.nasl - Type : ACT_GATHER_INFO |
2014-06-20 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140619_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-124.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-175.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-176.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-113.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-114.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-375.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-376.nasl - Type : ACT_GATHER_INFO |
2014-05-20 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3034.nasl - Type : ACT_GATHER_INFO |
2014-04-27 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2906.nasl - Type : ACT_GATHER_INFO |
2014-04-01 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2158-1.nasl - Type : ACT_GATHER_INFO |
2014-03-26 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0328.nasl - Type : ACT_GATHER_INFO |
2014-03-26 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0328.nasl - Type : ACT_GATHER_INFO |
2014-03-26 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0328.nasl - Type : ACT_GATHER_INFO |
2014-03-14 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0285.nasl - Type : ACT_GATHER_INFO |
2014-03-14 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0285-1.nasl - Type : ACT_GATHER_INFO |
2014-03-14 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0285.nasl - Type : ACT_GATHER_INFO |
2014-03-14 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140312_kernel_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2014-03-13 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0285.nasl - Type : ACT_GATHER_INFO |
2014-03-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2133-1.nasl - Type : ACT_GATHER_INFO |
2014-03-10 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2135-1.nasl - Type : ACT_GATHER_INFO |
2014-03-10 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2136-1.nasl - Type : ACT_GATHER_INFO |
2014-03-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2137-1.nasl - Type : ACT_GATHER_INFO |
2014-03-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2138-1.nasl - Type : ACT_GATHER_INFO |
2014-03-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2140-1.nasl - Type : ACT_GATHER_INFO |
2014-03-06 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2128-1.nasl - Type : ACT_GATHER_INFO |
2014-03-06 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2129-1.nasl - Type : ACT_GATHER_INFO |
2014-03-02 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2014-289.nasl - Type : ACT_GATHER_INFO |
2014-02-19 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2109-1.nasl - Type : ACT_GATHER_INFO |
2014-02-19 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2111-1.nasl - Type : ACT_GATHER_INFO |
2014-02-19 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2112-1.nasl - Type : ACT_GATHER_INFO |
2014-02-19 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2113-1.nasl - Type : ACT_GATHER_INFO |
2014-02-19 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2114-1.nasl - Type : ACT_GATHER_INFO |
2014-02-19 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2117-1.nasl - Type : ACT_GATHER_INFO |
2014-02-18 | Name : The remote Fedora host is missing a security update. File : fedora_2014-2576.nasl - Type : ACT_GATHER_INFO |
2014-02-18 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-038.nasl - Type : ACT_GATHER_INFO |
2014-02-17 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3009.nasl - Type : ACT_GATHER_INFO |
2014-02-17 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3010.nasl - Type : ACT_GATHER_INFO |
2014-02-17 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3011.nasl - Type : ACT_GATHER_INFO |
2014-02-14 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0163.nasl - Type : ACT_GATHER_INFO |
2014-02-13 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0159.nasl - Type : ACT_GATHER_INFO |
2014-02-13 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0163.nasl - Type : ACT_GATHER_INFO |
2014-02-13 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3002.nasl - Type : ACT_GATHER_INFO |
2014-02-13 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0163.nasl - Type : ACT_GATHER_INFO |
2014-02-13 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140211_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2014-02-13 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140212_kvm_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2014-02-12 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0159.nasl - Type : ACT_GATHER_INFO |
2014-02-12 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0159.nasl - Type : ACT_GATHER_INFO |
2014-02-05 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-140124.nasl - Type : ACT_GATHER_INFO |
2014-02-05 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-140125.nasl - Type : ACT_GATHER_INFO |
2014-01-28 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-140116.nasl - Type : ACT_GATHER_INFO |
2014-01-20 | Name : The remote Fedora host is missing a security update. File : fedora_2014-1062.nasl - Type : ACT_GATHER_INFO |
2014-01-20 | Name : The remote Fedora host is missing a security update. File : fedora_2014-1072.nasl - Type : ACT_GATHER_INFO |
2014-01-14 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-001.nasl - Type : ACT_GATHER_INFO |
2014-01-05 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2066-1.nasl - Type : ACT_GATHER_INFO |
2014-01-05 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2068-1.nasl - Type : ACT_GATHER_INFO |
2014-01-05 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2069-1.nasl - Type : ACT_GATHER_INFO |
2014-01-05 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2070-1.nasl - Type : ACT_GATHER_INFO |
2014-01-05 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2071-1.nasl - Type : ACT_GATHER_INFO |
2014-01-05 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2073-1.nasl - Type : ACT_GATHER_INFO |
2014-01-05 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2075-1.nasl - Type : ACT_GATHER_INFO |
2013-12-23 | Name : The remote Fedora host is missing a security update. File : fedora_2013-23445.nasl - Type : ACT_GATHER_INFO |
2013-12-23 | Name : The remote Fedora host is missing a security update. File : fedora_2013-23653.nasl - Type : ACT_GATHER_INFO |
2013-12-18 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-291.nasl - Type : ACT_GATHER_INFO |
2013-12-18 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2587.nasl - Type : ACT_GATHER_INFO |
2013-12-18 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2589.nasl - Type : ACT_GATHER_INFO |
2013-12-17 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-2588.nasl - Type : ACT_GATHER_INFO |
2013-12-17 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20131212_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-12-14 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-258.nasl - Type : ACT_GATHER_INFO |
2013-12-13 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-1801.nasl - Type : ACT_GATHER_INFO |
2013-12-13 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1801.nasl - Type : ACT_GATHER_INFO |
2013-12-13 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1801.nasl - Type : ACT_GATHER_INFO |
2013-12-10 | Name : The remote Fedora host is missing a security update. File : fedora_2013-22695.nasl - Type : ACT_GATHER_INFO |
2013-12-08 | Name : The remote Fedora host is missing a security update. File : fedora_2013-22669.nasl - Type : ACT_GATHER_INFO |
2013-12-05 | Name : The remote Fedora host is missing a security update. File : fedora_2013-22531.nasl - Type : ACT_GATHER_INFO |
2013-07-18 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-130702.nasl - Type : ACT_GATHER_INFO |
2013-06-18 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-130604.nasl - Type : ACT_GATHER_INFO |
2013-06-16 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1878-1.nasl - Type : ACT_GATHER_INFO |
2013-06-16 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1880-1.nasl - Type : ACT_GATHER_INFO |
2013-06-16 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1881-1.nasl - Type : ACT_GATHER_INFO |
2013-05-17 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2669.nasl - Type : ACT_GATHER_INFO |
2013-05-08 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-130426.nasl - Type : ACT_GATHER_INFO |
2013-04-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_kernel-8518.nasl - Type : ACT_GATHER_INFO |
2013-04-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_kernel-8527.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-03-07 13:21:29 |
|
2014-03-06 09:18:37 |
|