Executive Summary
Summary | |
---|---|
Title | Linux kernel vulnerability |
Informations | |||
---|---|---|---|
Name | USN-3652-1 | First vendor Publication | 2018-05-22 |
Vendor | Ubuntu | Last vendor Modification | 2018-05-22 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 4.9 | Attack Range | Local |
Cvss Impact Score | 6.9 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS Summary: The system could be made to expose sensitive information. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-kvm: Linux kernel for cloud environments - linux-oem: Linux kernel for OEM processors Details: Jann Horn and Ken Johnson discovered that microprocessors utilizing speculative execution of a memory read may allow unauthorized memory reads via a sidechannel attack. This flaw is known as Spectre Variant 4. A local attacker could use this to expose sensitive information, including kernel memory. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS: Please note that fully mitigating CVE-2018-3639 (Spectre Variant 4) may require corresponding processor microcode/firmware updates or, in virtual environments, hypervisor updates. On i386 and amd64 architectures, the SSBD feature is required to enable the kernel mitigations. BIOS vendors will be making updates available for Intel processors that implement SSBD and Ubuntu is working with Intel to provide future microcode updates. Ubuntu users with a processor from a different vendor should contact the vendor to identify necessary firmware updates. Ubuntu provided corresponding QEMU updates for users of self-hosted virtual environments in USN 3651-1. Ubuntu users in cloud environments should contact the cloud provider to confirm that the hypervisor has been updated to expose the new CPU features to virtual machines. References: Package Information: |
Original Source
Url : http://www.ubuntu.com/usn/USN-3652-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-203 | Information Exposure Through Discrepancy |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application | 3 | |
Application | 1 | |
Application | 3 | |
Application | 1 | |
Application | 6 | |
Application | 2 | |
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application | 1 | |
Hardware | 3 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 2 | |
Hardware | 2 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 2 | |
Hardware | 3 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 2 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 2 | |
Hardware | 3 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Hardware | 1 | |
Os | 5 | |
Os | 2 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 2 | |
Os | 2 | |
Os | 1 | |
Os | 1 | |
Os | 2 | |
Os |
| 6 |
Os | 2 | |
Os |
| 8 |
Os |
| 6 |
Os | 2 | |
Os | 1 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2019-01-10 | Name : The remote device is affected by multiple vulnerabilities. File : juniper_space_jsa10917_183R1.nasl - Type : ACT_GATHER_INFO |
2019-01-03 | Name : The remote Fedora host is missing a security update. File : fedora_2018-db0d3e157e.nasl - Type : ACT_GATHER_INFO |
2019-01-03 | Name : The remote Fedora host is missing a security update. File : fedora_2018-5521156807.nasl - Type : ACT_GATHER_INFO |
2019-01-03 | Name : The remote Fedora host is missing a security update. File : fedora_2018-527698a904.nasl - Type : ACT_GATHER_INFO |
2019-01-03 | Name : The remote Fedora host is missing a security update. File : fedora_2018-44f8a7454d.nasl - Type : ACT_GATHER_INFO |
2018-10-31 | Name : The remote host is missing a macOS security update that fixes multiple vulner... File : macosx_SecUpd_10_13_6_2018-002.nasl - Type : ACT_GATHER_INFO |
2018-10-18 | Name : The remote host is missing a macOS update that fixes multiple security vulner... File : macos_10_14.nasl - Type : ACT_GATHER_INFO |
2018-09-18 | Name : The remote EulerOS Virtualization host is missing multiple security updates. File : EulerOS_SA-2018-1270.nasl - Type : ACT_GATHER_INFO |
2018-09-18 | Name : The remote EulerOS Virtualization host is missing multiple security updates. File : EulerOS_SA-2018-1265.nasl - Type : ACT_GATHER_INFO |
2018-09-18 | Name : The remote EulerOS Virtualization host is missing a security update. File : EulerOS_SA-2018-1267.nasl - Type : ACT_GATHER_INFO |
2018-09-18 | Name : The remote EulerOS Virtualization host is missing a security update. File : EulerOS_SA-2018-1271.nasl - Type : ACT_GATHER_INFO |
2018-09-17 | Name : The remote Debian host is missing a security update. File : debian_DLA-1506.nasl - Type : ACT_GATHER_INFO |
2018-08-17 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-4273.nasl - Type : ACT_GATHER_INFO |
2018-07-30 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2018-208-01.nasl - Type : ACT_GATHER_INFO |
2018-07-27 | Name : The remote Debian host is missing a security update. File : debian_DLA-1446.nasl - Type : ACT_GATHER_INFO |
2018-07-26 | Name : The remote Amazon Linux 2 host is missing a security update. File : al2_ALAS-2018-1049.nasl - Type : ACT_GATHER_INFO |
2018-07-24 | Name : The remote PhotonOS host is missing multiple security updates. File : PhotonOS_PHSA-2018-2_0-0049.nasl - Type : ACT_GATHER_INFO |
2018-07-24 | Name : The remote PhotonOS host is missing multiple security updates. File : PhotonOS_PHSA-2018-1_0-0151.nasl - Type : ACT_GATHER_INFO |
2018-07-20 | Name : The remote Debian host is missing a security update. File : debian_DLA-1423.nasl - Type : ACT_GATHER_INFO |
2018-07-18 | Name : The remote Virtuozzo host is missing multiple security updates. File : Virtuozzo_VZA-2018-048.nasl - Type : ACT_GATHER_INFO |
2018-07-16 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-2164.nasl - Type : ACT_GATHER_INFO |
2018-07-16 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-2162.nasl - Type : ACT_GATHER_INFO |
2018-07-09 | Name : The remote Fedora host is missing a security update. File : fedora_2018-9f02e5ed7b.nasl - Type : ACT_GATHER_INFO |
2018-07-05 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-1965.nasl - Type : ACT_GATHER_INFO |
2018-07-05 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-1997.nasl - Type : ACT_GATHER_INFO |
2018-07-05 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-2001.nasl - Type : ACT_GATHER_INFO |
2018-07-03 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2018-1201.nasl - Type : ACT_GATHER_INFO |
2018-07-03 | Name : The remote EulerOS host is missing a security update. File : EulerOS_SA-2018-1200.nasl - Type : ACT_GATHER_INFO |
2018-07-03 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2018-1197.nasl - Type : ACT_GATHER_INFO |
2018-07-03 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2018-1196.nasl - Type : ACT_GATHER_INFO |
2018-07-03 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2018-1195.nasl - Type : ACT_GATHER_INFO |
2018-07-03 | Name : The remote EulerOS host is missing a security update. File : EulerOS_SA-2018-1194.nasl - Type : ACT_GATHER_INFO |
2018-07-03 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2018-1193.nasl - Type : ACT_GATHER_INFO |
2018-07-03 | Name : The remote EulerOS host is missing a security update. File : EulerOS_SA-2018-1192.nasl - Type : ACT_GATHER_INFO |
2018-06-22 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-1854.nasl - Type : ACT_GATHER_INFO |
2018-06-20 | Name : The remote EulerOS host is missing a security update. File : EulerOS_SA-2018-1153.nasl - Type : ACT_GATHER_INFO |
2018-06-12 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2018-1039.nasl - Type : ACT_GATHER_INFO |
2018-06-12 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2018-1038.nasl - Type : ACT_GATHER_INFO |
2018-06-12 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2018-1037.nasl - Type : ACT_GATHER_INFO |
2018-06-12 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2018-1034.nasl - Type : ACT_GATHER_INFO |
2018-06-12 | Name : The remote Amazon Linux 2 host is missing a security update. File : al2_ALAS-2018-1039.nasl - Type : ACT_GATHER_INFO |
2018-06-12 | Name : The remote Amazon Linux 2 host is missing a security update. File : al2_ALAS-2018-1038.nasl - Type : ACT_GATHER_INFO |
2018-06-12 | Name : The remote Amazon Linux 2 host is missing a security update. File : al2_ALAS-2018-1037.nasl - Type : ACT_GATHER_INFO |
2018-06-12 | Name : The remote Amazon Linux 2 host is missing a security update. File : al2_ALAS-2018-1034.nasl - Type : ACT_GATHER_INFO |
2018-06-12 | Name : The remote Amazon Linux 2 host is missing a security update. File : al2_ALAS-2018-1033.nasl - Type : ACT_GATHER_INFO |
2018-06-08 | Name : The remote Fedora host is missing a security update. File : fedora_2018-aec846c0ef.nasl - Type : ACT_GATHER_INFO |
2018-05-31 | Name : A server virtualization platform installed on the remote host is affected by ... File : citrix_xenserver_CTX235225.nasl - Type : ACT_GATHER_INFO |
2018-05-31 | Name : The remote Virtuozzo host is missing multiple security updates. File : Virtuozzo_VZA-2018-037.nasl - Type : ACT_GATHER_INFO |
2018-05-30 | Name : The remote Fedora host is missing a security update. File : fedora_2018-6367a17aa3.nasl - Type : ACT_GATHER_INFO |
2018-05-30 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-1669.nasl - Type : ACT_GATHER_INFO |
2018-05-29 | Name : The remote Virtuozzo host is missing multiple security updates. File : Virtuozzo_VZA-2018-034.nasl - Type : ACT_GATHER_INFO |
2018-05-29 | Name : The remote Fedora host is missing a security update. File : fedora_2018-93c2e74446.nasl - Type : ACT_GATHER_INFO |
2018-05-25 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-4210.nasl - Type : ACT_GATHER_INFO |
2018-05-25 | Name : The remote Virtuozzo host is missing a security update. File : Virtuozzo_VZA-2018-033.nasl - Type : ACT_GATHER_INFO |
2018-05-23 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-1647.nasl - Type : ACT_GATHER_INFO |
2018-05-23 | Name : The remote AIX host is missing a security patch. File : aix_IJ05820.nasl - Type : ACT_GATHER_INFO |
2018-05-23 | Name : The remote AIX host is missing a security patch. File : aix_IJ05821.nasl - Type : ACT_GATHER_INFO |
2018-05-23 | Name : The remote AIX host is missing a security patch. File : aix_IJ05822.nasl - Type : ACT_GATHER_INFO |
2018-05-23 | Name : The remote AIX host is missing a security patch. File : aix_IJ05823.nasl - Type : ACT_GATHER_INFO |
2018-05-23 | Name : The remote AIX host is missing a security patch. File : aix_IJ05824.nasl - Type : ACT_GATHER_INFO |
2018-05-23 | Name : The remote AIX host is missing a security patch. File : aix_IJ05826.nasl - Type : ACT_GATHER_INFO |
2018-05-23 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-1629.nasl - Type : ACT_GATHER_INFO |
2018-05-23 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-1632.nasl - Type : ACT_GATHER_INFO |
2018-05-23 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-1633.nasl - Type : ACT_GATHER_INFO |
2018-05-23 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-1648.nasl - Type : ACT_GATHER_INFO |
2018-05-23 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-1649.nasl - Type : ACT_GATHER_INFO |
2018-05-23 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-1650.nasl - Type : ACT_GATHER_INFO |
2018-05-23 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-1651.nasl - Type : ACT_GATHER_INFO |
2018-05-23 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-1660.nasl - Type : ACT_GATHER_INFO |
2018-05-23 | Name : The remote AIX host is missing a security patch. File : aix_IJ05818.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2018-06-30 00:20:33 |
|
2018-05-23 09:21:00 |
|
2018-05-22 09:19:16 |
|