ID CVE-2010-1088 Type cve Reporter cve@mitre.org Modified 2018-10-10T19:55:00
Description
fs/namei.c in Linux kernel 2.6.18 through 2.6.34 does not always follow NFS automount "symlinks," which allows attackers to have an unknown impact, related to LOOKUP_FOLLOW.
{"seebug": [{"lastseen": "2017-11-19T18:12:42", "description": "BUGTRAQ ID: 39044\r\nCVE ID: CVE-2010-1088\r\n\r\nLinux Kernel\u662f\u5f00\u653e\u6e90\u7801\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\r\n\r\nLinux Kernel\u7684fs/namei.c\u6709\u65f6\u6ca1\u6709\u8ddf\u968fNFS\u81ea\u52a8\u52a0\u8f7d\u7b26\u53f7\u94fe\u63a5\uff0c\u7528\u6237\u52a0\u8f7d\u6076\u610f\u6587\u4ef6\u7cfb\u7edf\u5c31\u4f1a\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002\n\nLinux kernel 2.6.18 - 2.6.34\n\u5382\u5546\u8865\u4e01\uff1a\r\n\r\nLinux\r\n-----\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\nhttp://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=ac278a9c505092dd82077a2446af8f9fc0d9c095", "published": "2010-04-09T00:00:00", "type": "seebug", "title": "Linux Kernel NFS\u81ea\u52a8\u52a0\u8f7d\u7b26\u53f7\u94fe\u63a5\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e", "bulletinFamily": "exploit", "cvelist": ["CVE-2010-1088"], "modified": "2010-04-09T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-19421", "id": "SSV:19421", "sourceData": "", "sourceHref": "", "cvss": {"score": 5.4, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "openvas": [{"lastseen": "2018-01-25T10:55:21", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0410", "CVE-2010-0623", "CVE-2009-3620", "CVE-2010-0622", "CVE-2010-1088"], "description": "Check for the Version of rsnapshot", "modified": "2018-01-24T00:00:00", "published": "2010-03-12T00:00:00", "id": "OPENVAS:1361412562310830939", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310830939", "type": "openvas", "title": "Mandriva Update for rsnapshot MDVA-2010:088 (rsnapshot)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for rsnapshot MDVA-2010:088 (rsnapshot)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"rsnapshot on Mandriva Linux 2009.1,\n Mandriva Linux 2009.1/X86_64,\n Mandriva Linux 2010.0,\n Mandriva Linux 2010.0/X86_64\";\ntag_insight = \"Rsnapshot will automatically add --exclude=xxxx to the rsync\n options for backups of the filesystem on which the snapshot-root\n is located. This will be added to the rsync command-line AFTER the\n rsync_short_args and rsync_long_args, but BEFORE any backup-specific\n options. This means that the --exclude=xxxx will override whatever\n backup-specific excludes are defined. This can be a problem if the\n name of your snapshot-root is something which is common in many file\n names. This version resolves this problems.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2010-03/msg00003.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.830939\");\n script_version(\"$Revision: 8510 $\");\n script_cve_id(\"CVE-2009-3620\", \"CVE-2010-0410\", \"CVE-2010-0622\", \"CVE-2010-0623\",\n \"CVE-2010-1088\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-24 08:57:42 +0100 (Wed, 24 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-03-12 17:02:32 +0100 (Fri, 12 Mar 2010)\");\n script_tag(name:\"cvss_base\", value:\"5.4\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:H/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"MDVA\", value: \"2010:088\");\n script_name(\"Mandriva Update for rsnapshot MDVA-2010:088 (rsnapshot)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of rsnapshot\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2010.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"rsnapshot\", rpm:\"rsnapshot~1.3.1~5.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2009.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"rsnapshot\", rpm:\"rsnapshot~1.3.1~4.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.4, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-01-02T10:54:56", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0410", "CVE-2010-0623", "CVE-2009-3620", "CVE-2010-0622", "CVE-2010-1088"], "description": "Check for the Version of kernel", "modified": "2017-12-25T00:00:00", "published": "2010-05-04T00:00:00", "id": "OPENVAS:831024", "href": "http://plugins.openvas.org/nasl.php?oid=831024", "type": "openvas", "title": "Mandriva Update for kernel MDVSA-2010:088 (kernel)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for kernel MDVSA-2010:088 (kernel)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Some vulnerabilities were discovered and corrected in the Linux\n 2.6 kernel:\n\n The ATI Rage 128 (aka r128) driver in the Linux kernel before\n 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE)\n state initialization, which allows local users to cause a denial of\n service (NULL pointer dereference and system crash) or possibly gain\n privileges via unspecified ioctl calls. (CVE-2009-3620)\n \n fs/namei.c in Linux kernel 2.6.18 through 2.6.34 does not always\n follow NFS automount symlinks, which allows attackers to have an\n unknown impact, related to LOOKUP_FOLLOW. (CVE-2010-1088)\n \n The wake_futex_pi function in kernel/futex.c in the Linux kernel\n before 2.6.33-rc7 does not properly handle certain unlock operations\n for a Priority Inheritance (PI) futex, which allows local users to\n cause a denial of service (OOPS) and possibly have unspecified other\n impact via vectors involving modification of the futex value from\n user space. (CVE-2010-0622)\n \n drivers/connector/connector.c in the Linux kernel before 2.6.32.8\n allows local users to cause a denial of service (memory consumption\n and system crash) by sending the kernel many NETLINK_CONNECTOR\n messages. (CVE-2010-0410)\n \n The futex_lock_pi function in kernel/futex.c in the Linux kernel before\n 2.6.33-rc7 does not properly manage a certain reference count, which\n allows local users to cause a denial of service (OOPS) via vectors\n involving an unmount of an ext3 filesystem. (CVE-2010-0623)\n \n Aditionally, the kernel was updated to the 2.6.31.13 stable release,\n it was added support for Cirrus Logic CS420x HDA codec, Wacom driver\n was updated to version 0.8.5-12 and there is a fix in the driver for\n backlight on Eee PC 1201HA.\n \n To update your kernel, please follow the directions located at:\n \n http://www.mandriva.com/en/security/kernelupdate\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"kernel on Mandriva Linux 2010.0,\n Mandriva Linux 2010.0/X86_64\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2010-04/msg00059.php\");\n script_id(831024);\n script_version(\"$Revision: 8243 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-25 07:30:04 +0100 (Mon, 25 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-05-04 09:46:25 +0200 (Tue, 04 May 2010)\");\n script_tag(name:\"cvss_base\", value:\"5.4\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:H/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"MDVSA\", value: \"2010:088\");\n script_cve_id(\"CVE-2009-3620\", \"CVE-2010-1088\", \"CVE-2010-0622\", \"CVE-2010-0410\", \"CVE-2010-0623\");\n script_name(\"Mandriva Update for kernel MDVSA-2010:088 (kernel)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2010.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"broadcom-wl-kernel-2.6.31.13-desktop-1mnb\", rpm:\"broadcom-wl-kernel-2.6.31.13-desktop-1mnb~5.10.91.9~2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"broadcom-wl-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"broadcom-wl-kernel-2.6.31.13-desktop586-1mnb~5.10.91.9~2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"broadcom-wl-kernel-2.6.31.13-server-1mnb\", rpm:\"broadcom-wl-kernel-2.6.31.13-server-1mnb~5.10.91.9~2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"broadcom-wl-kernel-desktop586-latest\", rpm:\"broadcom-wl-kernel-desktop586-latest~5.10.91.9~1.20100428.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"broadcom-wl-kernel-desktop-latest\", rpm:\"broadcom-wl-kernel-desktop-latest~5.10.91.9~1.20100428.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"broadcom-wl-kernel-server-latest\", rpm:\"broadcom-wl-kernel-server-latest~5.10.91.9~1.20100428.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"em8300-kernel-2.6.31.13-desktop-1mnb\", rpm:\"em8300-kernel-2.6.31.13-desktop-1mnb~0.17.4~1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"em8300-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"em8300-kernel-2.6.31.13-desktop586-1mnb~0.17.4~1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"em8300-kernel-2.6.31.13-server-1mnb\", rpm:\"em8300-kernel-2.6.31.13-server-1mnb~0.17.4~1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"em8300-kernel-desktop586-latest\", rpm:\"em8300-kernel-desktop586-latest~0.17.4~1.20100428.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"em8300-kernel-desktop-latest\", rpm:\"em8300-kernel-desktop-latest~0.17.4~1.20100428.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"em8300-kernel-server-latest\", rpm:\"em8300-kernel-server-latest~0.17.4~1.20100428.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"fglrx-kernel-2.6.31.13-desktop-1mnb\", rpm:\"fglrx-kernel-2.6.31.13-desktop-1mnb~8.650~1.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"fglrx-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"fglrx-kernel-2.6.31.13-desktop586-1mnb~8.650~1.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"fglrx-kernel-2.6.31.13-server-1mnb\", rpm:\"fglrx-kernel-2.6.31.13-server-1mnb~8.650~1.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"fglrx-kernel-desktop586-latest\", rpm:\"fglrx-kernel-desktop586-latest~8.650~1.20100428.1.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"fglrx-kernel-desktop-latest\", rpm:\"fglrx-kernel-desktop-latest~8.650~1.20100428.1.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"fglrx-kernel-server-latest\", rpm:\"fglrx-kernel-server-latest~8.650~1.20100428.1.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-2.6.31.13-desktop-1mnb\", rpm:\"hcfpcimodem-kernel-2.6.31.13-desktop-1mnb~1.19~1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"hcfpcimodem-kernel-2.6.31.13-desktop586-1mnb~1.19~1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-2.6.31.13-server-1mnb\", rpm:\"hcfpcimodem-kernel-2.6.31.13-server-1mnb~1.19~1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-desktop586-latest\", rpm:\"hcfpcimodem-kernel-desktop586-latest~1.19~1.20100428.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-desktop-latest\", rpm:\"hcfpcimodem-kernel-desktop-latest~1.19~1.20100428.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-server-latest\", rpm:\"hcfpcimodem-kernel-server-latest~1.19~1.20100428.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"hsfmodem-kernel-2.6.31.13-desktop-1mnb\", rpm:\"hsfmodem-kernel-2.6.31.13-desktop-1mnb~7.80.02.05~1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"hsfmodem-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"hsfmodem-kernel-2.6.31.13-desktop586-1mnb~7.80.02.05~1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"hsfmodem-kernel-2.6.31.13-server-1mnb\", rpm:\"hsfmodem-kernel-2.6.31.13-server-1mnb~7.80.02.05~1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"hsfmodem-kernel-desktop586-latest\", rpm:\"hsfmodem-kernel-desktop586-latest~7.80.02.05~1.20100428.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"hsfmodem-kernel-desktop-latest\", rpm:\"hsfmodem-kernel-desktop-latest~7.80.02.05~1.20100428.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"hsfmodem-kernel-server-latest\", rpm:\"hsfmodem-kernel-server-latest~7.80.02.05~1.20100428.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.31.13~1mnb~1~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-desktop\", rpm:\"kernel-desktop~2.6.31.13~1mnb~1~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-desktop586\", rpm:\"kernel-desktop586~2.6.31.13~1mnb~1~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-desktop586-devel\", rpm:\"kernel-desktop586-devel~2.6.31.13~1mnb~1~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-desktop586-devel-latest\", rpm:\"kernel-desktop586-devel-latest~2.6.31.13~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-desktop586-latest\", rpm:\"kernel-desktop586-latest~2.6.31.13~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-desktop-devel\", rpm:\"kernel-desktop-devel~2.6.31.13~1mnb~1~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-desktop-devel-latest\", rpm:\"kernel-desktop-devel-latest~2.6.31.13~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-desktop-latest\", rpm:\"kernel-desktop-latest~2.6.31.13~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.31.13~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-server\", rpm:\"kernel-server~2.6.31.13~1mnb~1~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-server-devel\", rpm:\"kernel-server-devel~2.6.31.13~1mnb~1~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-server-devel-latest\", rpm:\"kernel-server-devel-latest~2.6.31.13~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-server-latest\", rpm:\"kernel-server-latest~2.6.31.13~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.6.31.13~1mnb~1~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-source-latest\", rpm:\"kernel-source-latest~2.6.31.13~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libafs-kernel-2.6.31.13-desktop-1mnb\", rpm:\"libafs-kernel-2.6.31.13-desktop-1mnb~1.4.11~2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libafs-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"libafs-kernel-2.6.31.13-desktop586-1mnb~1.4.11~2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libafs-kernel-2.6.31.13-server-1mnb\", rpm:\"libafs-kernel-2.6.31.13-server-1mnb~1.4.11~2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libafs-kernel-desktop586-latest\", rpm:\"libafs-kernel-desktop586-latest~1.4.11~1.20100428.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libafs-kernel-desktop-latest\", rpm:\"libafs-kernel-desktop-latest~1.4.11~1.20100428.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libafs-kernel-server-latest\", rpm:\"libafs-kernel-server-latest~1.4.11~1.20100428.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lirc-kernel-2.6.31.13-desktop-1mnb\", rpm:\"lirc-kernel-2.6.31.13-desktop-1mnb~0.8.6~2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lirc-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"lirc-kernel-2.6.31.13-desktop586-1mnb~0.8.6~2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lirc-kernel-2.6.31.13-server-1mnb\", rpm:\"lirc-kernel-2.6.31.13-server-1mnb-0.8.6~2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lirc-kernel-desktop586-latest\", rpm:\"lirc-kernel-desktop586-latest~0.8.6~1.20100428.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lirc-kernel-desktop-latest\", rpm:\"lirc-kernel-desktop-latest~0.8.6~1.20100428.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lirc-kernel-server-latest\", rpm:\"lirc-kernel-server-latest~0.8.6~1.20100428.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lzma-kernel-2.6.31.13-desktop-1mnb\", rpm:\"lzma-kernel-2.6.31.13-desktop-1mnb~4.43~28mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lzma-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"lzma-kernel-2.6.31.13-desktop586-1mnb~4.43~28mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lzma-kernel-2.6.31.13-server-1mnb\", rpm:\"lzma-kernel-2.6.31.13-server-1mnb~4.43~28mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lzma-kernel-desktop586-latest\", rpm:\"lzma-kernel-desktop586-latest~4.43~1.20100428.28mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lzma-kernel-desktop-latest\", rpm:\"lzma-kernel-desktop-latest~4.43~1.20100428.28mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lzma-kernel-server-latest\", rpm:\"lzma-kernel-server-latest~4.43~1.20100428.28mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"madwifi-kernel-2.6.31.13-desktop-1mnb\", rpm:\"madwifi-kernel-2.6.31.13-desktop-1mnb~0.9.4~4.r4068mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"madwifi-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"madwifi-kernel-2.6.31.13-desktop586-1mnb~0.9.4~4.r4068mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"madwifi-kernel-2.6.31.13-server-1mnb\", rpm:\"madwifi-kernel-2.6.31.13-server-1mnb~0.9.4~4.r4068mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"madwifi-kernel-desktop586-latest\", rpm:\"madwifi-kernel-desktop586-latest~0.9.4~1.20100428.4.r4068mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"madwifi-kernel-desktop-latest\", rpm:\"madwifi-kernel-desktop-latest~0.9.4~1.20100428.4.r4068mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"madwifi-kernel-server-latest\", rpm:\"madwifi-kernel-server-latest~0.9.4~1.20100428.4.r4068mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia173-kernel-2.6.31.13-desktop-1mnb\", rpm:\"nvidia173-kernel-2.6.31.13-desktop-1mnb~173.14.20~7mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia173-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"nvidia173-kernel-2.6.31.13-desktop586-1mnb~173.14.20~7mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia173-kernel-2.6.31.13-server-1mnb\", rpm:\"nvidia173-kernel-2.6.31.13-server-1mnb~173.14.20~7mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia173-kernel-desktop586-latest\", rpm:\"nvidia173-kernel-desktop586-latest~173.14.20~1.20100428.7mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia173-kernel-desktop-latest\", rpm:\"nvidia173-kernel-desktop-latest~173.14.20~1.20100428.7mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia173-kernel-server-latest\", rpm:\"nvidia173-kernel-server-latest~173.14.20~1.20100428.7mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-2.6.31.13-desktop-1mnb\", rpm:\"nvidia96xx-kernel-2.6.31.13-desktop-1mnb~96.43.13~7mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"nvidia96xx-kernel-2.6.31.13-desktop586-1mnb~96.43.13~7mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-2.6.31.13-server-1mnb\", rpm:\"nvidia96xx-kernel-2.6.31.13-server-1mnb~96.43.13~7mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-desktop586-latest\", rpm:\"nvidia96xx-kernel-desktop586-latest~96.43.13~1.20100428.7mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-desktop-latest\", rpm:\"nvidia96xx-kernel-desktop-latest~96.43.13~1.20100428.7mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-server-latest\", rpm:\"nvidia96xx-kernel-server-latest~96.43.13~1.20100428.7mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia-current-kernel-2.6.31.13-desktop-1mnb\", rpm:\"nvidia-current-kernel-2.6.31.13-desktop-1mnb~185.18.36~4mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia-current-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"nvidia-current-kernel-2.6.31.13-desktop586-1mnb~185.18.36~4mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia-current-kernel-2.6.31.13-server-1mnb\", rpm:\"nvidia-current-kernel-2.6.31.13-server-1mnb~185.18.36~4mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia-current-kernel-desktop586-latest\", rpm:\"nvidia-current-kernel-desktop586-latest~185.18.36~1.20100428.4mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia-current-kernel-desktop-latest\", rpm:\"nvidia-current-kernel-desktop-latest~185.18.36~1.20100428.4mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia-current-kernel-server-latest\", rpm:\"nvidia-current-kernel-server-latest~185.18.36~1.20100428.4mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"slmodem-kernel-2.6.31.13-desktop-1mnb\", rpm:\"slmodem-kernel-2.6.31.13-desktop-1mnb~2.9.11~0.20080817.4.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"slmodem-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"slmodem-kernel-2.6.31.13-desktop586-1mnb~2.9.11~0.20080817.4.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"slmodem-kernel-2.6.31.13-server-1mnb\", rpm:\"slmodem-kernel-2.6.31.13-server-1mnb~2.9.11~0.20080817.4.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"slmodem-kernel-desktop586-latest\", rpm:\"slmodem-kernel-desktop586-latest~2.9.11~1.20100428.0.20080817.4.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"slmodem-kernel-desktop-latest\", rpm:\"slmodem-kernel-desktop-latest~2.9.11~1.20100428.0.20080817.4.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"slmodem-kernel-server-latest\", rpm:\"slmodem-kernel-server-latest~2.9.11~1.20100428.0.20080817.4.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-2.6.31.13-desktop-1mnb\", rpm:\"squashfs-lzma-kernel-2.6.31.13-desktop-1mnb~3.3~11mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"squashfs-lzma-kernel-2.6.31.13-desktop586-1mnb~3.3~11mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-2.6.31.13-server-1mnb\", rpm:\"squashfs-lzma-kernel-2.6.31.13-server-1mnb~3.3~11mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-desktop586-latest\", rpm:\"squashfs-lzma-kernel-desktop586-latest~3.3~1.20100428.11mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-desktop-latest\", rpm:\"squashfs-lzma-kernel-desktop-latest~3.3~1.20100428.11mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-server-latest\", rpm:\"squashfs-lzma-kernel-server-latest~3.3~1.20100428.11mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"vboxadditions-kernel-2.6.31.13-desktop-1mnb\", rpm:\"vboxadditions-kernel-2.6.31.13-desktop-1mnb~3.0.8~1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"vboxadditions-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"vboxadditions-kernel-2.6.31.13-desktop586-1mnb~3.0.8~1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"vboxadditions-kernel-2.6.31.13-server-1mnb\", rpm:\"vboxadditions-kernel-2.6.31.13-server-1mnb~3.0.8~1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"vboxadditions-kernel-desktop586-latest\", rpm:\"vboxadditions-kernel-desktop586-latest~3.0.8~1.20100428.1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"vboxadditions-kernel-desktop-latest\", rpm:\"vboxadditions-kernel-desktop-latest~3.0.8~1.20100428.1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"vboxadditions-kernel-server-latest\", rpm:\"vboxadditions-kernel-server-latest~3.0.8~1.20100428.1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"virtualbox-kernel-2.6.31.13-desktop-1mnb\", rpm:\"virtualbox-kernel-2.6.31.13-desktop-1mnb~3.0.8~1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"virtualbox-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"virtualbox-kernel-2.6.31.13-desktop586-1mnb~3.0.8~1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"virtualbox-kernel-2.6.31.13-server-1mnb\", rpm:\"virtualbox-kernel-2.6.31.13-server-1mnb~3.0.8~1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"virtualbox-kernel-desktop586-latest\", rpm:\"virtualbox-kernel-desktop586-latest~3.0.8~1.20100428.1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"virtualbox-kernel-desktop-latest\", rpm:\"virtualbox-kernel-desktop-latest~3.0.8~1.20100428.1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"virtualbox-kernel-server-latest\", rpm:\"virtualbox-kernel-server-latest~3.0.8~1.20100428.1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"vpnclient-kernel\", rpm:\"vpnclient-kernel~2.6.31.13~desktop~1mnb~4.8.02.0030~1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"vpnclient-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"vpnclient-kernel-2.6.31.13-desktop586-1mnb~4.8.02.0030~1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"vpnclient-kernel-2.6.31.13-server-1mnb\", rpm:\"vpnclient-kernel-2.6.31.13-server-1mnb~4.8.02.0030~1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"vpnclient-kernel-desktop586-latest\", rpm:\"vpnclient-kernel-desktop586-latest~4.8.02.0030~1.20100428.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"vpnclient-kernel-desktop-latest\", rpm:\"vpnclient-kernel-desktop-latest~4.8.02.0030~1.20100428.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"vpnclient-kernel-server-latest\", rpm:\"vpnclient-kernel-server-latest~4.8.02.0030~1.20100428.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.31.13~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.4, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-01-02T10:54:41", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0410", "CVE-2010-0623", "CVE-2009-3620", "CVE-2010-0622", "CVE-2010-1088"], "description": "Check for the Version of rsnapshot", "modified": "2017-12-25T00:00:00", "published": "2010-03-12T00:00:00", "id": "OPENVAS:830939", "href": "http://plugins.openvas.org/nasl.php?oid=830939", "type": "openvas", "title": "Mandriva Update for rsnapshot MDVA-2010:088 (rsnapshot)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for rsnapshot MDVA-2010:088 (rsnapshot)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"rsnapshot on Mandriva Linux 2009.1,\n Mandriva Linux 2009.1/X86_64,\n Mandriva Linux 2010.0,\n Mandriva Linux 2010.0/X86_64\";\ntag_insight = \"Rsnapshot will automatically add --exclude=xxxx to the rsync\n options for backups of the filesystem on which the snapshot-root\n is located. This will be added to the rsync command-line AFTER the\n rsync_short_args and rsync_long_args, but BEFORE any backup-specific\n options. This means that the --exclude=xxxx will override whatever\n backup-specific excludes are defined. This can be a problem if the\n name of your snapshot-root is something which is common in many file\n names. This version resolves this problems.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2010-03/msg00003.php\");\n script_id(830939);\n script_version(\"$Revision: 8243 $\");\n script_cve_id(\"CVE-2009-3620\", \"CVE-2010-0410\", \"CVE-2010-0622\", \"CVE-2010-0623\",\n \"CVE-2010-1088\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-25 07:30:04 +0100 (Mon, 25 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-03-12 17:02:32 +0100 (Fri, 12 Mar 2010)\");\n script_tag(name:\"cvss_base\", value:\"5.4\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:H/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"MDVA\", value: \"2010:088\");\n script_name(\"Mandriva Update for rsnapshot MDVA-2010:088 (rsnapshot)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of rsnapshot\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2010.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"rsnapshot\", rpm:\"rsnapshot~1.3.1~5.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2009.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"rsnapshot\", rpm:\"rsnapshot~1.3.1~4.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.4, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-01-23T13:06:02", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0410", "CVE-2010-0623", "CVE-2009-3620", "CVE-2010-0622", "CVE-2010-1088"], "description": "Check for the Version of kernel", "modified": "2018-01-23T00:00:00", "published": "2010-05-04T00:00:00", "id": "OPENVAS:1361412562310831024", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310831024", "type": "openvas", "title": "Mandriva Update for kernel MDVSA-2010:088 (kernel)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for kernel MDVSA-2010:088 (kernel)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Some vulnerabilities were discovered and corrected in the Linux\n 2.6 kernel:\n\n The ATI Rage 128 (aka r128) driver in the Linux kernel before\n 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE)\n state initialization, which allows local users to cause a denial of\n service (NULL pointer dereference and system crash) or possibly gain\n privileges via unspecified ioctl calls. (CVE-2009-3620)\n \n fs/namei.c in Linux kernel 2.6.18 through 2.6.34 does not always\n follow NFS automount symlinks, which allows attackers to have an\n unknown impact, related to LOOKUP_FOLLOW. (CVE-2010-1088)\n \n The wake_futex_pi function in kernel/futex.c in the Linux kernel\n before 2.6.33-rc7 does not properly handle certain unlock operations\n for a Priority Inheritance (PI) futex, which allows local users to\n cause a denial of service (OOPS) and possibly have unspecified other\n impact via vectors involving modification of the futex value from\n user space. (CVE-2010-0622)\n \n drivers/connector/connector.c in the Linux kernel before 2.6.32.8\n allows local users to cause a denial of service (memory consumption\n and system crash) by sending the kernel many NETLINK_CONNECTOR\n messages. (CVE-2010-0410)\n \n The futex_lock_pi function in kernel/futex.c in the Linux kernel before\n 2.6.33-rc7 does not properly manage a certain reference count, which\n allows local users to cause a denial of service (OOPS) via vectors\n involving an unmount of an ext3 filesystem. (CVE-2010-0623)\n \n Aditionally, the kernel was updated to the 2.6.31.13 stable release,\n it was added support for Cirrus Logic CS420x HDA codec, Wacom driver\n was updated to version 0.8.5-12 and there is a fix in the driver for\n backlight on Eee PC 1201HA.\n \n To update your kernel, please follow the directions located at:\n \n http://www.mandriva.com/en/security/kernelupdate\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"kernel on Mandriva Linux 2010.0,\n Mandriva Linux 2010.0/X86_64\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2010-04/msg00059.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.831024\");\n script_version(\"$Revision: 8495 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-23 08:57:49 +0100 (Tue, 23 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-05-04 09:46:25 +0200 (Tue, 04 May 2010)\");\n script_tag(name:\"cvss_base\", value:\"5.4\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:H/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"MDVSA\", value: \"2010:088\");\n script_cve_id(\"CVE-2009-3620\", \"CVE-2010-1088\", \"CVE-2010-0622\", \"CVE-2010-0410\", \"CVE-2010-0623\");\n script_name(\"Mandriva Update for kernel MDVSA-2010:088 (kernel)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2010.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"broadcom-wl-kernel-2.6.31.13-desktop-1mnb\", rpm:\"broadcom-wl-kernel-2.6.31.13-desktop-1mnb~5.10.91.9~2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"broadcom-wl-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"broadcom-wl-kernel-2.6.31.13-desktop586-1mnb~5.10.91.9~2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"broadcom-wl-kernel-2.6.31.13-server-1mnb\", rpm:\"broadcom-wl-kernel-2.6.31.13-server-1mnb~5.10.91.9~2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"broadcom-wl-kernel-desktop586-latest\", rpm:\"broadcom-wl-kernel-desktop586-latest~5.10.91.9~1.20100428.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"broadcom-wl-kernel-desktop-latest\", rpm:\"broadcom-wl-kernel-desktop-latest~5.10.91.9~1.20100428.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"broadcom-wl-kernel-server-latest\", rpm:\"broadcom-wl-kernel-server-latest~5.10.91.9~1.20100428.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"em8300-kernel-2.6.31.13-desktop-1mnb\", rpm:\"em8300-kernel-2.6.31.13-desktop-1mnb~0.17.4~1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"em8300-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"em8300-kernel-2.6.31.13-desktop586-1mnb~0.17.4~1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"em8300-kernel-2.6.31.13-server-1mnb\", rpm:\"em8300-kernel-2.6.31.13-server-1mnb~0.17.4~1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"em8300-kernel-desktop586-latest\", rpm:\"em8300-kernel-desktop586-latest~0.17.4~1.20100428.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"em8300-kernel-desktop-latest\", rpm:\"em8300-kernel-desktop-latest~0.17.4~1.20100428.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"em8300-kernel-server-latest\", rpm:\"em8300-kernel-server-latest~0.17.4~1.20100428.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"fglrx-kernel-2.6.31.13-desktop-1mnb\", rpm:\"fglrx-kernel-2.6.31.13-desktop-1mnb~8.650~1.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"fglrx-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"fglrx-kernel-2.6.31.13-desktop586-1mnb~8.650~1.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"fglrx-kernel-2.6.31.13-server-1mnb\", rpm:\"fglrx-kernel-2.6.31.13-server-1mnb~8.650~1.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"fglrx-kernel-desktop586-latest\", rpm:\"fglrx-kernel-desktop586-latest~8.650~1.20100428.1.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"fglrx-kernel-desktop-latest\", rpm:\"fglrx-kernel-desktop-latest~8.650~1.20100428.1.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"fglrx-kernel-server-latest\", rpm:\"fglrx-kernel-server-latest~8.650~1.20100428.1.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-2.6.31.13-desktop-1mnb\", rpm:\"hcfpcimodem-kernel-2.6.31.13-desktop-1mnb~1.19~1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"hcfpcimodem-kernel-2.6.31.13-desktop586-1mnb~1.19~1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-2.6.31.13-server-1mnb\", rpm:\"hcfpcimodem-kernel-2.6.31.13-server-1mnb~1.19~1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-desktop586-latest\", rpm:\"hcfpcimodem-kernel-desktop586-latest~1.19~1.20100428.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-desktop-latest\", rpm:\"hcfpcimodem-kernel-desktop-latest~1.19~1.20100428.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"hcfpcimodem-kernel-server-latest\", rpm:\"hcfpcimodem-kernel-server-latest~1.19~1.20100428.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"hsfmodem-kernel-2.6.31.13-desktop-1mnb\", rpm:\"hsfmodem-kernel-2.6.31.13-desktop-1mnb~7.80.02.05~1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"hsfmodem-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"hsfmodem-kernel-2.6.31.13-desktop586-1mnb~7.80.02.05~1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"hsfmodem-kernel-2.6.31.13-server-1mnb\", rpm:\"hsfmodem-kernel-2.6.31.13-server-1mnb~7.80.02.05~1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"hsfmodem-kernel-desktop586-latest\", rpm:\"hsfmodem-kernel-desktop586-latest~7.80.02.05~1.20100428.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"hsfmodem-kernel-desktop-latest\", rpm:\"hsfmodem-kernel-desktop-latest~7.80.02.05~1.20100428.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"hsfmodem-kernel-server-latest\", rpm:\"hsfmodem-kernel-server-latest~7.80.02.05~1.20100428.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.31.13~1mnb~1~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-desktop\", rpm:\"kernel-desktop~2.6.31.13~1mnb~1~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-desktop586\", rpm:\"kernel-desktop586~2.6.31.13~1mnb~1~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-desktop586-devel\", rpm:\"kernel-desktop586-devel~2.6.31.13~1mnb~1~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-desktop586-devel-latest\", rpm:\"kernel-desktop586-devel-latest~2.6.31.13~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-desktop586-latest\", rpm:\"kernel-desktop586-latest~2.6.31.13~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-desktop-devel\", rpm:\"kernel-desktop-devel~2.6.31.13~1mnb~1~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-desktop-devel-latest\", rpm:\"kernel-desktop-devel-latest~2.6.31.13~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-desktop-latest\", rpm:\"kernel-desktop-latest~2.6.31.13~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.31.13~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-server\", rpm:\"kernel-server~2.6.31.13~1mnb~1~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-server-devel\", rpm:\"kernel-server-devel~2.6.31.13~1mnb~1~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-server-devel-latest\", rpm:\"kernel-server-devel-latest~2.6.31.13~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-server-latest\", rpm:\"kernel-server-latest~2.6.31.13~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.6.31.13~1mnb~1~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-source-latest\", rpm:\"kernel-source-latest~2.6.31.13~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libafs-kernel-2.6.31.13-desktop-1mnb\", rpm:\"libafs-kernel-2.6.31.13-desktop-1mnb~1.4.11~2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libafs-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"libafs-kernel-2.6.31.13-desktop586-1mnb~1.4.11~2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libafs-kernel-2.6.31.13-server-1mnb\", rpm:\"libafs-kernel-2.6.31.13-server-1mnb~1.4.11~2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libafs-kernel-desktop586-latest\", rpm:\"libafs-kernel-desktop586-latest~1.4.11~1.20100428.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libafs-kernel-desktop-latest\", rpm:\"libafs-kernel-desktop-latest~1.4.11~1.20100428.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libafs-kernel-server-latest\", rpm:\"libafs-kernel-server-latest~1.4.11~1.20100428.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lirc-kernel-2.6.31.13-desktop-1mnb\", rpm:\"lirc-kernel-2.6.31.13-desktop-1mnb~0.8.6~2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lirc-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"lirc-kernel-2.6.31.13-desktop586-1mnb~0.8.6~2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lirc-kernel-2.6.31.13-server-1mnb\", rpm:\"lirc-kernel-2.6.31.13-server-1mnb-0.8.6~2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lirc-kernel-desktop586-latest\", rpm:\"lirc-kernel-desktop586-latest~0.8.6~1.20100428.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lirc-kernel-desktop-latest\", rpm:\"lirc-kernel-desktop-latest~0.8.6~1.20100428.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lirc-kernel-server-latest\", rpm:\"lirc-kernel-server-latest~0.8.6~1.20100428.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lzma-kernel-2.6.31.13-desktop-1mnb\", rpm:\"lzma-kernel-2.6.31.13-desktop-1mnb~4.43~28mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lzma-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"lzma-kernel-2.6.31.13-desktop586-1mnb~4.43~28mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lzma-kernel-2.6.31.13-server-1mnb\", rpm:\"lzma-kernel-2.6.31.13-server-1mnb~4.43~28mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lzma-kernel-desktop586-latest\", rpm:\"lzma-kernel-desktop586-latest~4.43~1.20100428.28mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lzma-kernel-desktop-latest\", rpm:\"lzma-kernel-desktop-latest~4.43~1.20100428.28mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lzma-kernel-server-latest\", rpm:\"lzma-kernel-server-latest~4.43~1.20100428.28mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"madwifi-kernel-2.6.31.13-desktop-1mnb\", rpm:\"madwifi-kernel-2.6.31.13-desktop-1mnb~0.9.4~4.r4068mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"madwifi-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"madwifi-kernel-2.6.31.13-desktop586-1mnb~0.9.4~4.r4068mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"madwifi-kernel-2.6.31.13-server-1mnb\", rpm:\"madwifi-kernel-2.6.31.13-server-1mnb~0.9.4~4.r4068mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"madwifi-kernel-desktop586-latest\", rpm:\"madwifi-kernel-desktop586-latest~0.9.4~1.20100428.4.r4068mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"madwifi-kernel-desktop-latest\", rpm:\"madwifi-kernel-desktop-latest~0.9.4~1.20100428.4.r4068mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"madwifi-kernel-server-latest\", rpm:\"madwifi-kernel-server-latest~0.9.4~1.20100428.4.r4068mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia173-kernel-2.6.31.13-desktop-1mnb\", rpm:\"nvidia173-kernel-2.6.31.13-desktop-1mnb~173.14.20~7mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia173-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"nvidia173-kernel-2.6.31.13-desktop586-1mnb~173.14.20~7mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia173-kernel-2.6.31.13-server-1mnb\", rpm:\"nvidia173-kernel-2.6.31.13-server-1mnb~173.14.20~7mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia173-kernel-desktop586-latest\", rpm:\"nvidia173-kernel-desktop586-latest~173.14.20~1.20100428.7mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia173-kernel-desktop-latest\", rpm:\"nvidia173-kernel-desktop-latest~173.14.20~1.20100428.7mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia173-kernel-server-latest\", rpm:\"nvidia173-kernel-server-latest~173.14.20~1.20100428.7mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-2.6.31.13-desktop-1mnb\", rpm:\"nvidia96xx-kernel-2.6.31.13-desktop-1mnb~96.43.13~7mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"nvidia96xx-kernel-2.6.31.13-desktop586-1mnb~96.43.13~7mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-2.6.31.13-server-1mnb\", rpm:\"nvidia96xx-kernel-2.6.31.13-server-1mnb~96.43.13~7mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-desktop586-latest\", rpm:\"nvidia96xx-kernel-desktop586-latest~96.43.13~1.20100428.7mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-desktop-latest\", rpm:\"nvidia96xx-kernel-desktop-latest~96.43.13~1.20100428.7mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia96xx-kernel-server-latest\", rpm:\"nvidia96xx-kernel-server-latest~96.43.13~1.20100428.7mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia-current-kernel-2.6.31.13-desktop-1mnb\", rpm:\"nvidia-current-kernel-2.6.31.13-desktop-1mnb~185.18.36~4mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia-current-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"nvidia-current-kernel-2.6.31.13-desktop586-1mnb~185.18.36~4mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia-current-kernel-2.6.31.13-server-1mnb\", rpm:\"nvidia-current-kernel-2.6.31.13-server-1mnb~185.18.36~4mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia-current-kernel-desktop586-latest\", rpm:\"nvidia-current-kernel-desktop586-latest~185.18.36~1.20100428.4mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia-current-kernel-desktop-latest\", rpm:\"nvidia-current-kernel-desktop-latest~185.18.36~1.20100428.4mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"nvidia-current-kernel-server-latest\", rpm:\"nvidia-current-kernel-server-latest~185.18.36~1.20100428.4mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"slmodem-kernel-2.6.31.13-desktop-1mnb\", rpm:\"slmodem-kernel-2.6.31.13-desktop-1mnb~2.9.11~0.20080817.4.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"slmodem-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"slmodem-kernel-2.6.31.13-desktop586-1mnb~2.9.11~0.20080817.4.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"slmodem-kernel-2.6.31.13-server-1mnb\", rpm:\"slmodem-kernel-2.6.31.13-server-1mnb~2.9.11~0.20080817.4.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"slmodem-kernel-desktop586-latest\", rpm:\"slmodem-kernel-desktop586-latest~2.9.11~1.20100428.0.20080817.4.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"slmodem-kernel-desktop-latest\", rpm:\"slmodem-kernel-desktop-latest~2.9.11~1.20100428.0.20080817.4.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"slmodem-kernel-server-latest\", rpm:\"slmodem-kernel-server-latest~2.9.11~1.20100428.0.20080817.4.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-2.6.31.13-desktop-1mnb\", rpm:\"squashfs-lzma-kernel-2.6.31.13-desktop-1mnb~3.3~11mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"squashfs-lzma-kernel-2.6.31.13-desktop586-1mnb~3.3~11mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-2.6.31.13-server-1mnb\", rpm:\"squashfs-lzma-kernel-2.6.31.13-server-1mnb~3.3~11mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-desktop586-latest\", rpm:\"squashfs-lzma-kernel-desktop586-latest~3.3~1.20100428.11mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-desktop-latest\", rpm:\"squashfs-lzma-kernel-desktop-latest~3.3~1.20100428.11mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"squashfs-lzma-kernel-server-latest\", rpm:\"squashfs-lzma-kernel-server-latest~3.3~1.20100428.11mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"vboxadditions-kernel-2.6.31.13-desktop-1mnb\", rpm:\"vboxadditions-kernel-2.6.31.13-desktop-1mnb~3.0.8~1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"vboxadditions-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"vboxadditions-kernel-2.6.31.13-desktop586-1mnb~3.0.8~1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"vboxadditions-kernel-2.6.31.13-server-1mnb\", rpm:\"vboxadditions-kernel-2.6.31.13-server-1mnb~3.0.8~1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"vboxadditions-kernel-desktop586-latest\", rpm:\"vboxadditions-kernel-desktop586-latest~3.0.8~1.20100428.1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"vboxadditions-kernel-desktop-latest\", rpm:\"vboxadditions-kernel-desktop-latest~3.0.8~1.20100428.1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"vboxadditions-kernel-server-latest\", rpm:\"vboxadditions-kernel-server-latest~3.0.8~1.20100428.1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"virtualbox-kernel-2.6.31.13-desktop-1mnb\", rpm:\"virtualbox-kernel-2.6.31.13-desktop-1mnb~3.0.8~1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"virtualbox-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"virtualbox-kernel-2.6.31.13-desktop586-1mnb~3.0.8~1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"virtualbox-kernel-2.6.31.13-server-1mnb\", rpm:\"virtualbox-kernel-2.6.31.13-server-1mnb~3.0.8~1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"virtualbox-kernel-desktop586-latest\", rpm:\"virtualbox-kernel-desktop586-latest~3.0.8~1.20100428.1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"virtualbox-kernel-desktop-latest\", rpm:\"virtualbox-kernel-desktop-latest~3.0.8~1.20100428.1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"virtualbox-kernel-server-latest\", rpm:\"virtualbox-kernel-server-latest~3.0.8~1.20100428.1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"vpnclient-kernel\", rpm:\"vpnclient-kernel~2.6.31.13~desktop~1mnb~4.8.02.0030~1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"vpnclient-kernel-2.6.31.13-desktop586-1mnb\", rpm:\"vpnclient-kernel-2.6.31.13-desktop586-1mnb~4.8.02.0030~1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"vpnclient-kernel-2.6.31.13-server-1mnb\", rpm:\"vpnclient-kernel-2.6.31.13-server-1mnb~4.8.02.0030~1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"vpnclient-kernel-desktop586-latest\", rpm:\"vpnclient-kernel-desktop586-latest~4.8.02.0030~1.20100428.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"vpnclient-kernel-desktop-latest\", rpm:\"vpnclient-kernel-desktop-latest~4.8.02.0030~1.20100428.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"vpnclient-kernel-server-latest\", rpm:\"vpnclient-kernel-server-latest~4.8.02.0030~1.20100428.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.31.13~1mnb2\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.4, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-12-15T11:57:59", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1641", "CVE-2010-1437", "CVE-2010-1187", "CVE-2010-0291", "CVE-2010-0622", "CVE-2010-1436", "CVE-2010-1173", "CVE-2010-1088", "CVE-2010-1087"], "description": "Check for the Version of kernel", "modified": "2017-12-15T00:00:00", "published": "2010-07-02T00:00:00", "id": "OPENVAS:870284", "href": "http://plugins.openvas.org/nasl.php?oid=870284", "type": "openvas", "title": "RedHat Update for kernel RHSA-2010:0504-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for kernel RHSA-2010:0504-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n This update fixes the following security issues:\n \n * multiple flaws were found in the mmap and mremap implementations. A local\n user could use these flaws to cause a local denial of service or escalate\n their privileges. (CVE-2010-0291, Important)\n \n * a NULL pointer dereference flaw was found in the Fast Userspace Mutexes\n (futexes) implementation. The unlock code path did not check if the futex\n value associated with pi_state->owner had been modified. A local user could\n use this flaw to modify the futex value, possibly leading to a denial of\n service or privilege escalation when the pi_state->owner pointer is\n dereferenced. (CVE-2010-0622, Important)\n \n * a NULL pointer dereference flaw was found in the Linux kernel Network\n File System (NFS) implementation. A local user on a system that has an\n NFS-mounted file system could use this flaw to cause a denial of service or\n escalate their privileges on that system. (CVE-2010-1087, Important)\n \n * a flaw was found in the sctp_process_unk_param() function in the Linux\n kernel Stream Control Transmission Protocol (SCTP) implementation. A remote\n attacker could send a specially-crafted SCTP packet to an SCTP listening\n port on a target system, causing a kernel panic (denial of service).\n (CVE-2010-1173, Important)\n \n * a flaw was found in the Linux kernel Transparent Inter-Process\n Communication protocol (TIPC) implementation. If a client application, on a\n local system where the tipc module is not yet in network mode, attempted to\n send a message to a remote TIPC node, it would dereference a NULL pointer\n on the local system, causing a kernel panic (denial of service).\n (CVE-2010-1187, Important)\n \n * a buffer overflow flaw was found in the Linux kernel Global File System 2\n (GFS2) implementation. In certain cases, a quota could be written past the\n end of a memory page, causing memory corruption, leaving the quota stored\n on disk in an invalid state. A user with write access to a GFS2 file system\n could trigger this flaw to cause a kernel crash (denial of service) or\n escalate their privileges on the GFS2 server. This issue can only be\n triggered if the GFS2 file system is mounted with the "quota=on" or\n "quota=account" mount option. (CVE-2010-1436, Important)\n \n * a race condition between finding a keyring by name and destroying a freed\n keyring was found in the Linux kernel key management facility. A local user\n could use this flaw to cause a kernel panic ( ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_affected = \"kernel on Red Hat Enterprise Linux (v. 5 server)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2010-July/msg00000.html\");\n script_id(870284);\n script_version(\"$Revision: 8130 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-15 07:31:09 +0100 (Fri, 15 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-07-02 14:26:21 +0200 (Fri, 02 Jul 2010)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"RHSA\", value: \"2010:0504-01\");\n script_cve_id(\"CVE-2010-0291\", \"CVE-2010-0622\", \"CVE-2010-1087\", \"CVE-2010-1088\", \"CVE-2010-1173\", \"CVE-2010-1187\", \"CVE-2010-1436\", \"CVE-2010-1437\", \"CVE-2010-1641\");\n script_name(\"RedHat Update for kernel RHSA-2010:0504-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-debuginfo\", rpm:\"kernel-PAE-debuginfo~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-debuginfo\", rpm:\"kernel-xen-debuginfo~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:39:26", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1641", "CVE-2010-1437", "CVE-2010-1187", "CVE-2010-0291", "CVE-2010-0622", "CVE-2010-1436", "CVE-2010-1173", "CVE-2010-1088", "CVE-2010-1087"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2011-08-09T00:00:00", "id": "OPENVAS:1361412562310880617", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880617", "type": "openvas", "title": "CentOS Update for kernel CESA-2010:0504 centos5 i386", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for kernel CESA-2010:0504 centos5 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2010-July/016747.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.880617\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name:\"CESA\", value:\"2010:0504\");\n script_cve_id(\"CVE-2010-0291\", \"CVE-2010-0622\", \"CVE-2010-1087\", \"CVE-2010-1088\", \"CVE-2010-1173\", \"CVE-2010-1187\", \"CVE-2010-1436\", \"CVE-2010-1437\", \"CVE-2010-1641\");\n script_name(\"CentOS Update for kernel CESA-2010:0504 centos5 i386\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS5\");\n script_tag(name:\"affected\", value:\"kernel on CentOS 5\");\n script_tag(name:\"insight\", value:\"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n This update fixes the following security issues:\n\n * multiple flaws were found in the mmap and mremap implementations. A local\n user could use these flaws to cause a local denial of service or escalate\n their privileges. (CVE-2010-0291, Important)\n\n * a NULL pointer dereference flaw was found in the Fast Userspace Mutexes\n (futexes) implementation. The unlock code path did not check if the futex\n value associated with pi_state->owner had been modified. A local user could\n use this flaw to modify the futex value, possibly leading to a denial of\n service or privilege escalation when the pi_state->owner pointer is\n dereferenced. (CVE-2010-0622, Important)\n\n * a NULL pointer dereference flaw was found in the Linux kernel Network\n File System (NFS) implementation. A local user on a system that has an\n NFS-mounted file system could use this flaw to cause a denial of service or\n escalate their privileges on that system. (CVE-2010-1087, Important)\n\n * a flaw was found in the sctp_process_unk_param() function in the Linux\n kernel Stream Control Transmission Protocol (SCTP) implementation. A remote\n attacker could send a specially-crafted SCTP packet to an SCTP listening\n port on a target system, causing a kernel panic (denial of service).\n (CVE-2010-1173, Important)\n\n * a flaw was found in the Linux kernel Transparent Inter-Process\n Communication protocol (TIPC) implementation. If a client application, on a\n local system where the tipc module is not yet in network mode, attempted to\n send a message to a remote TIPC node, it would dereference a NULL pointer\n on the local system, causing a kernel panic (denial of service).\n (CVE-2010-1187, Important)\n\n * a buffer overflow flaw was found in the Linux kernel Global File System 2\n (GFS2) implementation. In certain cases, a quota could be written past the\n end of a memory page, causing memory corruption, leaving the quota stored\n on disk in an invalid state. A user with write access to a GFS2 file system\n could trigger this flaw to cause a kernel crash (denial of service) or\n escalate their privileges on the GFS2 server. This issue can only be\n triggered if the GFS2 file system is mounted with the 'quota=on' or\n 'quota=account' mount option. (CVE-2010-1436, Important)\n\n * a race condition between finding a keyring by name and destroying a freed\n keyring was found in the Linux kernel key management facility. A local user\n could use this flaw to cause a kernel panic (denial of service) or escalate ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~194.8.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~194.8.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~194.8.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~194.8.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~194.8.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~194.8.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~194.8.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~194.8.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~194.8.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~194.8.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2018-01-03T10:54:37", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1641", "CVE-2010-1437", "CVE-2010-1187", "CVE-2010-0291", "CVE-2010-0622", "CVE-2010-1436", "CVE-2010-1173", "CVE-2010-1088", "CVE-2010-1087"], "description": "Check for the Version of kernel", "modified": "2018-01-02T00:00:00", "published": "2010-07-02T00:00:00", "id": "OPENVAS:1361412562310870284", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870284", "type": "openvas", "title": "RedHat Update for kernel RHSA-2010:0504-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for kernel RHSA-2010:0504-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n This update fixes the following security issues:\n \n * multiple flaws were found in the mmap and mremap implementations. A local\n user could use these flaws to cause a local denial of service or escalate\n their privileges. (CVE-2010-0291, Important)\n \n * a NULL pointer dereference flaw was found in the Fast Userspace Mutexes\n (futexes) implementation. The unlock code path did not check if the futex\n value associated with pi_state->owner had been modified. A local user could\n use this flaw to modify the futex value, possibly leading to a denial of\n service or privilege escalation when the pi_state->owner pointer is\n dereferenced. (CVE-2010-0622, Important)\n \n * a NULL pointer dereference flaw was found in the Linux kernel Network\n File System (NFS) implementation. A local user on a system that has an\n NFS-mounted file system could use this flaw to cause a denial of service or\n escalate their privileges on that system. (CVE-2010-1087, Important)\n \n * a flaw was found in the sctp_process_unk_param() function in the Linux\n kernel Stream Control Transmission Protocol (SCTP) implementation. A remote\n attacker could send a specially-crafted SCTP packet to an SCTP listening\n port on a target system, causing a kernel panic (denial of service).\n (CVE-2010-1173, Important)\n \n * a flaw was found in the Linux kernel Transparent Inter-Process\n Communication protocol (TIPC) implementation. If a client application, on a\n local system where the tipc module is not yet in network mode, attempted to\n send a message to a remote TIPC node, it would dereference a NULL pointer\n on the local system, causing a kernel panic (denial of service).\n (CVE-2010-1187, Important)\n \n * a buffer overflow flaw was found in the Linux kernel Global File System 2\n (GFS2) implementation. In certain cases, a quota could be written past the\n end of a memory page, causing memory corruption, leaving the quota stored\n on disk in an invalid state. A user with write access to a GFS2 file system\n could trigger this flaw to cause a kernel crash (denial of service) or\n escalate their privileges on the GFS2 server. This issue can only be\n triggered if the GFS2 file system is mounted with the "quota=on" or\n "quota=account" mount option. (CVE-2010-1436, Important)\n \n * a race condition between finding a keyring by name and destroying a freed\n keyring was found in the Linux kernel key management facility. A local user\n could use this flaw to cause a kernel panic ( ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_affected = \"kernel on Red Hat Enterprise Linux (v. 5 server)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2010-July/msg00000.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870284\");\n script_version(\"$Revision: 8269 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-02 08:28:22 +0100 (Tue, 02 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-07-02 14:26:21 +0200 (Fri, 02 Jul 2010)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"RHSA\", value: \"2010:0504-01\");\n script_cve_id(\"CVE-2010-0291\", \"CVE-2010-0622\", \"CVE-2010-1087\", \"CVE-2010-1088\", \"CVE-2010-1173\", \"CVE-2010-1187\", \"CVE-2010-1436\", \"CVE-2010-1437\", \"CVE-2010-1641\");\n script_name(\"RedHat Update for kernel RHSA-2010:0504-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-debuginfo\", rpm:\"kernel-PAE-debuginfo~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-debuginfo\", rpm:\"kernel-xen-debuginfo~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~194.8.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:55:23", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1641", "CVE-2010-1437", "CVE-2010-1187", "CVE-2010-0291", "CVE-2010-0622", "CVE-2010-1436", "CVE-2010-1173", "CVE-2010-1088", "CVE-2010-1087"], "description": "Check for the Version of kernel", "modified": "2017-07-10T00:00:00", "published": "2011-08-09T00:00:00", "id": "OPENVAS:880617", "href": "http://plugins.openvas.org/nasl.php?oid=880617", "type": "openvas", "title": "CentOS Update for kernel CESA-2010:0504 centos5 i386", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for kernel CESA-2010:0504 centos5 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n This update fixes the following security issues:\n \n * multiple flaws were found in the mmap and mremap implementations. A local\n user could use these flaws to cause a local denial of service or escalate\n their privileges. (CVE-2010-0291, Important)\n \n * a NULL pointer dereference flaw was found in the Fast Userspace Mutexes\n (futexes) implementation. The unlock code path did not check if the futex\n value associated with pi_state->owner had been modified. A local user could\n use this flaw to modify the futex value, possibly leading to a denial of\n service or privilege escalation when the pi_state->owner pointer is\n dereferenced. (CVE-2010-0622, Important)\n \n * a NULL pointer dereference flaw was found in the Linux kernel Network\n File System (NFS) implementation. A local user on a system that has an\n NFS-mounted file system could use this flaw to cause a denial of service or\n escalate their privileges on that system. (CVE-2010-1087, Important)\n \n * a flaw was found in the sctp_process_unk_param() function in the Linux\n kernel Stream Control Transmission Protocol (SCTP) implementation. A remote\n attacker could send a specially-crafted SCTP packet to an SCTP listening\n port on a target system, causing a kernel panic (denial of service).\n (CVE-2010-1173, Important)\n \n * a flaw was found in the Linux kernel Transparent Inter-Process\n Communication protocol (TIPC) implementation. If a client application, on a\n local system where the tipc module is not yet in network mode, attempted to\n send a message to a remote TIPC node, it would dereference a NULL pointer\n on the local system, causing a kernel panic (denial of service).\n (CVE-2010-1187, Important)\n \n * a buffer overflow flaw was found in the Linux kernel Global File System 2\n (GFS2) implementation. In certain cases, a quota could be written past the\n end of a memory page, causing memory corruption, leaving the quota stored\n on disk in an invalid state. A user with write access to a GFS2 file system\n could trigger this flaw to cause a kernel crash (denial of service) or\n escalate their privileges on the GFS2 server. This issue can only be\n triggered if the GFS2 file system is mounted with the "quota=on" or\n "quota=account" mount option. (CVE-2010-1436, Important)\n \n * a race condition between finding a keyring by name and destroying a freed\n keyring was found in the Linux kernel key management facility. A local user\n could use this flaw to cause a kernel panic (denial of service) or escalate ... \n\n Description truncated, for more information please check the Reference URL\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"kernel on CentOS 5\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2010-July/016747.html\");\n script_id(880617);\n script_version(\"$Revision: 6653 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:46:53 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"CESA\", value: \"2010:0504\");\n script_cve_id(\"CVE-2010-0291\", \"CVE-2010-0622\", \"CVE-2010-1087\", \"CVE-2010-1088\", \"CVE-2010-1173\", \"CVE-2010-1187\", \"CVE-2010-1436\", \"CVE-2010-1437\", \"CVE-2010-1641\");\n script_name(\"CentOS Update for kernel CESA-2010:0504 centos5 i386\");\n\n script_summary(\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~194.8.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~194.8.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~194.8.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~194.8.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~194.8.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~194.8.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~194.8.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~194.8.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~194.8.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~194.8.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:36:10", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1641", "CVE-2010-1437", "CVE-2010-1187", "CVE-2010-0291", "CVE-2010-0622", "CVE-2010-1436", "CVE-2010-1173", "CVE-2010-1088", "CVE-2010-1087"], "description": "Oracle Linux Local Security Checks ELSA-2010-0504", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310122349", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310122349", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2010-0504", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2010-0504.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.122349\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:17:17 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2010-0504\");\n script_tag(name:\"insight\", value:\"ELSA-2010-0504 - kernel security and bug fix update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2010-0504\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2010-0504.html\");\n script_cve_id(\"CVE-2010-0291\", \"CVE-2010-0622\", \"CVE-2010-1087\", \"CVE-2010-1088\", \"CVE-2010-1173\", \"CVE-2010-1187\", \"CVE-2010-1436\", \"CVE-2010-1437\", \"CVE-2010-1641\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~194.8.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~194.8.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~194.8.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~194.8.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~194.8.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~194.8.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~194.8.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~194.8.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~194.8.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~194.8.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~194.8.1.0.1.el5~1.4.7~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~194.8.1.0.1.el5PAE~1.4.7~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~194.8.1.0.1.el5debug~1.4.7~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~194.8.1.0.1.el5xen~1.4.7~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"oracleasm\", rpm:\"oracleasm~2.6.18~194.8.1.0.1.el5~2.0.5~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"oracleasm\", rpm:\"oracleasm~2.6.18~194.8.1.0.1.el5PAE~2.0.5~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"oracleasm\", rpm:\"oracleasm~2.6.18~194.8.1.0.1.el5debug~2.0.5~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"oracleasm\", rpm:\"oracleasm~2.6.18~194.8.1.0.1.el5xen~2.0.5~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-12-19T16:08:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0307", "CVE-2009-0844", "CVE-2010-1437", "CVE-2009-0846", "CVE-2010-0291", "CVE-2010-0415", "CVE-2010-1321", "CVE-2010-0622", "CVE-2010-1088", "CVE-2009-4212", "CVE-2010-1087", "CVE-2009-0845"], "description": "The remote ESXi is missing one or more security related Updates from VMSA-2010-0016.", "modified": "2019-12-18T00:00:00", "published": "2012-03-15T00:00:00", "id": "OPENVAS:1361412562310103449", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310103449", "type": "openvas", "title": "VMware ESXi/ESX third party updates for Service Console and Likewise components (VMSA-2010-0016)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# VMSA-2010-0016 VMware ESXi and ESX third party updates for Service Console and Likewise components\n#\n# Authors:\n# Michael Meyer <michael.meyer@greenbone.net>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.103449\");\n script_cve_id(\"CVE-2010-0415\", \"CVE-2010-0307\", \"CVE-2010-0291\", \"CVE-2010-0622\", \"CVE-2010-1087\", \"CVE-2010-1437\", \"CVE-2010-1088\", \"CVE-2009-0844\", \"CVE-2009-0845\", \"CVE-2009-0846\", \"CVE-2009-4212\", \"CVE-2010-1321\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_version(\"2019-12-18T11:13:08+0000\");\n script_name(\"VMware ESXi/ESX third party updates for Service Console and Likewise components (VMSA-2010-0016)\");\n script_tag(name:\"last_modification\", value:\"2019-12-18 11:13:08 +0000 (Wed, 18 Dec 2019)\");\n script_tag(name:\"creation_date\", value:\"2012-03-15 16:13:01 +0100 (Thu, 15 Mar 2012)\");\n script_category(ACT_GATHER_INFO);\n script_family(\"VMware Local Security Checks\");\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_dependencies(\"gb_vmware_esxi_init.nasl\");\n script_mandatory_keys(\"VMware/ESXi/LSC\", \"VMware/ESX/version\");\n\n script_xref(name:\"URL\", value:\"http://www.vmware.com/security/advisories/VMSA-2010-0016.html\");\n\n script_tag(name:\"solution\", value:\"Apply the missing patch(es).\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if the target host is missing one or more patch(es).\");\n\n script_tag(name:\"summary\", value:\"The remote ESXi is missing one or more security related Updates from VMSA-2010-0016.\");\n\n script_tag(name:\"affected\", value:\"VMware ESXi 4.1 without patch ESXi410-201010401-SG\n\n VMware ESX 4.1 without patches ESX410-201010401-SG, ESX410-201010419-SG\n\n VMware ESX 4.0 without patch ESX400-201101401-SG\");\n\n script_tag(name:\"insight\", value:\"ESX Service Console OS (COS) kernel update, and Likewise packages\n updates resolve multiple security issues:\n\n a. Service Console OS update for COS kernel\n\n This patch updates the service console kernel to fix multiple\n security issues.\n\n b. Likewise package updates\n\n Updates to the likewisekrb5, likewiseopenldap, likewiseopen,\n and pamkrb5 packages address several security issues.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"vmware_esx.inc\");\n\nif(!get_kb_item(\"VMware/ESXi/LSC\"))\n exit(0);\n\nif(!esxVersion = get_kb_item(\"VMware/ESX/version\"))\n exit(0);\n\npatches = make_array(\"4.1.0\", \"ESXi410-201010401-SG\");\n\nif(!patches[esxVersion])\n exit(99);\n\nif(report = esxi_patch_missing(esxi_version:esxVersion, patch:patches[esxVersion])) {\n security_message(port:0, data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-01-07T11:52:39", "description": "Some vulnerabilities were discovered and corrected in the Linux 2.6\nkernel :\n\nThe ATI Rage 128 (aka r128) driver in the Linux kernel before\n2.6.31-git11 does not properly verify Concurrent Command Engine (CCE)\nstate initialization, which allows local users to cause a denial of\nservice (NULL pointer dereference and system crash) or possibly gain\nprivileges via unspecified ioctl calls. (CVE-2009-3620)\n\nfs/namei.c in Linux kernel 2.6.18 through 2.6.34 does not always\nfollow NFS automount symlinks, which allows attackers to have an\nunknown impact, related to LOOKUP_FOLLOW. (CVE-2010-1088)\n\nThe wake_futex_pi function in kernel/futex.c in the Linux kernel\nbefore 2.6.33-rc7 does not properly handle certain unlock operations\nfor a Priority Inheritance (PI) futex, which allows local users to\ncause a denial of service (OOPS) and possibly have unspecified other\nimpact via vectors involving modification of the futex value from user\nspace. (CVE-2010-0622)\n\ndrivers/connector/connector.c in the Linux kernel before 2.6.32.8\nallows local users to cause a denial of service (memory consumption\nand system crash) by sending the kernel many NETLINK_CONNECTOR\nmessages. (CVE-2010-0410)\n\nThe futex_lock_pi function in kernel/futex.c in the Linux kernel\nbefore 2.6.33-rc7 does not properly manage a certain reference count,\nwhich allows local users to cause a denial of service (OOPS) via\nvectors involving an unmount of an ext3 filesystem. (CVE-2010-0623)\n\nAditionally, the kernel was updated to the 2.6.31.13 stable release,\nit was added support for Cirrus Logic CS420x HDA codec, Wacom driver\nwas updated to version 0.8.5-12 and there is a fix in the driver for\nbacklight on Eee PC 1201HA.\n\nTo update your kernel, please follow the directions located at :\n\nhttp://www.mandriva.com/en/security/kernelupdate", "edition": 25, "published": "2010-07-30T00:00:00", "title": "Mandriva Linux Security Advisory : kernel (MDVSA-2010:088)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0410", "CVE-2010-0623", "CVE-2009-3620", "CVE-2010-0622", "CVE-2010-1088"], "modified": "2010-07-30T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:nvidia173-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:kernel-server-latest", "p-cpe:/a:mandriva:linux:fglrx-kernel-2.6.31.13-server-1mnb", "p-cpe:/a:mandriva:linux:hsfmodem-kernel-2.6.31.13-desktop586-1mnb", "p-cpe:/a:mandriva:linux:lirc-kernel-2.6.31.13-desktop-1mnb", "p-cpe:/a:mandriva:linux:lirc-kernel-2.6.31.13-server-1mnb", "p-cpe:/a:mandriva:linux:lzma-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:hsfmodem-kernel-server-latest", "p-cpe:/a:mandriva:linux:fglrx-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:lirc-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:em8300-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:virtualbox-kernel-server-latest", "p-cpe:/a:mandriva:linux:madwifi-kernel-server-latest", "p-cpe:/a:mandriva:linux:nvidia173-kernel-server-latest", "p-cpe:/a:mandriva:linux:kernel-desktop586-2.6.31.13-1mnb", "p-cpe:/a:mandriva:linux:madwifi-kernel-2.6.31.13-server-1mnb", "p-cpe:/a:mandriva:linux:hsfmodem-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:kernel-server-devel-2.6.31.13-1mnb", "p-cpe:/a:mandriva:linux:nvidia173-kernel-2.6.31.13-desktop586-1mnb", "p-cpe:/a:mandriva:linux:vpnclient-kernel-2.6.31.13-desktop586-1mnb", "p-cpe:/a:mandriva:linux:nvidia173-kernel-2.6.31.13-desktop-1mnb", "p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:em8300-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:nvidia96xx-kernel-server-latest", "p-cpe:/a:mandriva:linux:libafs-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:virtualbox-kernel-2.6.31.13-desktop586-1mnb", "p-cpe:/a:mandriva:linux:lirc-kernel-2.6.31.13-desktop586-1mnb", "p-cpe:/a:mandriva:linux:vpnclient-kernel-2.6.31.13-server-1mnb", "p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:slmodem-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:hsfmodem-kernel-2.6.31.13-server-1mnb", "p-cpe:/a:mandriva:linux:slmodem-kernel-2.6.31.13-desktop586-1mnb", "p-cpe:/a:mandriva:linux:virtualbox-kernel-2.6.31.13-server-1mnb", "p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-2.6.31.13-desktop-1mnb", "p-cpe:/a:mandriva:linux:kernel-desktop-devel-latest", "p-cpe:/a:mandriva:linux:nvidia96xx-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:nvidia-current-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:squashfs-lzma-kernel-2.6.31.13-server-1mnb", "p-cpe:/a:mandriva:linux:madwifi-kernel-2.6.31.13-desktop-1mnb", "p-cpe:/a:mandriva:linux:broadcom-wl-kernel-server-latest", "p-cpe:/a:mandriva:linux:broadcom-wl-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:kernel-desktop-devel-2.6.31.13-1mnb", "p-cpe:/a:mandriva:linux:libafs-kernel-server-latest", "p-cpe:/a:mandriva:linux:broadcom-wl-kernel-2.6.31.13-server-1mnb", "p-cpe:/a:mandriva:linux:hsfmodem-kernel-2.6.31.13-desktop-1mnb", "p-cpe:/a:mandriva:linux:fglrx-kernel-server-latest", "p-cpe:/a:mandriva:linux:fglrx-kernel-2.6.31.13-desktop-1mnb", "p-cpe:/a:mandriva:linux:vpnclient-kernel-server-latest", "p-cpe:/a:mandriva:linux:squashfs-lzma-kernel-2.6.31.13-desktop586-1mnb", "p-cpe:/a:mandriva:linux:nvidia173-kernel-2.6.31.13-server-1mnb", "p-cpe:/a:mandriva:linux:broadcom-wl-kernel-2.6.31.13-desktop586-1mnb", "p-cpe:/a:mandriva:linux:vboxadditions-kernel-2.6.31.13-server-1mnb", "p-cpe:/a:mandriva:linux:virtualbox-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:nvidia-current-kernel-2.6.31.13-desktop586-1mnb", "p-cpe:/a:mandriva:linux:kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:nvidia-current-kernel-2.6.31.13-server-1mnb", "p-cpe:/a:mandriva:linux:kernel-desktop586-devel-2.6.31.13-1mnb", "p-cpe:/a:mandriva:linux:nvidia96xx-kernel-2.6.31.13-desktop-1mnb", "p-cpe:/a:mandriva:linux:nvidia-current-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:vboxadditions-kernel-2.6.31.13-desktop586-1mnb", "p-cpe:/a:mandriva:linux:lirc-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:vpnclient-kernel-2.6.31.13-desktop-1mnb", "p-cpe:/a:mandriva:linux:hsfmodem-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:lzma-kernel-server-latest", "p-cpe:/a:mandriva:linux:nvidia96xx-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:vboxadditions-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:lzma-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:nvidia96xx-kernel-2.6.31.13-desktop586-1mnb", "p-cpe:/a:mandriva:linux:nvidia-current-kernel-2.6.31.13-desktop-1mnb", "p-cpe:/a:mandriva:linux:vboxadditions-kernel-server-latest", "p-cpe:/a:mandriva:linux:libafs-kernel-2.6.31.13-desktop586-1mnb", "cpe:/o:mandriva:linux:2010.0", "p-cpe:/a:mandriva:linux:kernel-source-2.6.31.13-1mnb", "p-cpe:/a:mandriva:linux:slmodem-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-server-latest", "p-cpe:/a:mandriva:linux:vboxadditions-kernel-2.6.31.13-desktop-1mnb", "p-cpe:/a:mandriva:linux:lirc-kernel-server-latest", "p-cpe:/a:mandriva:linux:kernel-server-devel-latest", "p-cpe:/a:mandriva:linux:virtualbox-kernel-2.6.31.13-desktop-1mnb", "p-cpe:/a:mandriva:linux:madwifi-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:slmodem-kernel-server-latest", "p-cpe:/a:mandriva:linux:broadcom-wl-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-2.6.31.13-desktop586-1mnb", "p-cpe:/a:mandriva:linux:virtualbox-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:vboxadditions-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:kernel-desktop586-devel-latest", "p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-2.6.31.13-server-1mnb", "p-cpe:/a:mandriva:linux:em8300-kernel-2.6.31.13-desktop-1mnb", "p-cpe:/a:mandriva:linux:kernel-source-latest", "p-cpe:/a:mandriva:linux:squashfs-lzma-kernel-server-latest", "p-cpe:/a:mandriva:linux:kernel-2.6.31.13-1mnb", "p-cpe:/a:mandriva:linux:nvidia-current-kernel-server-latest", "p-cpe:/a:mandriva:linux:libafs-kernel-2.6.31.13-desktop-1mnb", "p-cpe:/a:mandriva:linux:lzma-kernel-2.6.31.13-server-1mnb", "p-cpe:/a:mandriva:linux:squashfs-lzma-kernel-2.6.31.13-desktop-1mnb", "p-cpe:/a:mandriva:linux:slmodem-kernel-2.6.31.13-server-1mnb", "p-cpe:/a:mandriva:linux:em8300-kernel-2.6.31.13-desktop586-1mnb", "p-cpe:/a:mandriva:linux:vpnclient-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:fglrx-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:nvidia96xx-kernel-2.6.31.13-server-1mnb", "p-cpe:/a:mandriva:linux:em8300-kernel-2.6.31.13-server-1mnb", "p-cpe:/a:mandriva:linux:lzma-kernel-2.6.31.13-desktop-1mnb", "p-cpe:/a:mandriva:linux:fglrx-kernel-2.6.31.13-desktop586-1mnb", "p-cpe:/a:mandriva:linux:libafs-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:madwifi-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:squashfs-lzma-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:kernel-server-2.6.31.13-1mnb", "p-cpe:/a:mandriva:linux:nvidia173-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:madwifi-kernel-2.6.31.13-desktop586-1mnb", "p-cpe:/a:mandriva:linux:kernel-doc", "p-cpe:/a:mandriva:linux:libafs-kernel-2.6.31.13-server-1mnb", "p-cpe:/a:mandriva:linux:kernel-desktop-2.6.31.13-1mnb", "p-cpe:/a:mandriva:linux:em8300-kernel-server-latest", "p-cpe:/a:mandriva:linux:broadcom-wl-kernel-2.6.31.13-desktop-1mnb", "p-cpe:/a:mandriva:linux:squashfs-lzma-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:vpnclient-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:slmodem-kernel-2.6.31.13-desktop-1mnb", "p-cpe:/a:mandriva:linux:lzma-kernel-2.6.31.13-desktop586-1mnb", "p-cpe:/a:mandriva:linux:kernel-desktop-latest"], "id": "MANDRIVA_MDVSA-2010-088.NASL", "href": "https://www.tenable.com/plugins/nessus/48181", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2010:088. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(48181);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2009-3620\", \"CVE-2010-0410\", \"CVE-2010-0622\", \"CVE-2010-0623\", \"CVE-2010-1088\");\n script_bugtraq_id(36824, 38058, 38165, 39044);\n script_xref(name:\"MDVSA\", value:\"2010:088\");\n\n script_name(english:\"Mandriva Linux Security Advisory : kernel (MDVSA-2010:088)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Some vulnerabilities were discovered and corrected in the Linux 2.6\nkernel :\n\nThe ATI Rage 128 (aka r128) driver in the Linux kernel before\n2.6.31-git11 does not properly verify Concurrent Command Engine (CCE)\nstate initialization, which allows local users to cause a denial of\nservice (NULL pointer dereference and system crash) or possibly gain\nprivileges via unspecified ioctl calls. (CVE-2009-3620)\n\nfs/namei.c in Linux kernel 2.6.18 through 2.6.34 does not always\nfollow NFS automount symlinks, which allows attackers to have an\nunknown impact, related to LOOKUP_FOLLOW. (CVE-2010-1088)\n\nThe wake_futex_pi function in kernel/futex.c in the Linux kernel\nbefore 2.6.33-rc7 does not properly handle certain unlock operations\nfor a Priority Inheritance (PI) futex, which allows local users to\ncause a denial of service (OOPS) and possibly have unspecified other\nimpact via vectors involving modification of the futex value from user\nspace. (CVE-2010-0622)\n\ndrivers/connector/connector.c in the Linux kernel before 2.6.32.8\nallows local users to cause a denial of service (memory consumption\nand system crash) by sending the kernel many NETLINK_CONNECTOR\nmessages. (CVE-2010-0410)\n\nThe futex_lock_pi function in kernel/futex.c in the Linux kernel\nbefore 2.6.33-rc7 does not properly manage a certain reference count,\nwhich allows local users to cause a denial of service (OOPS) via\nvectors involving an unmount of an ext3 filesystem. (CVE-2010-0623)\n\nAditionally, the kernel was updated to the 2.6.31.13 stable release,\nit was added support for Cirrus Logic CS420x HDA codec, Wacom driver\nwas updated to version 0.8.5-12 and there is a fix in the driver for\nbacklight on Eee PC 1201HA.\n\nTo update your kernel, please follow the directions located at :\n\nhttp://www.mandriva.com/en/security/kernelupdate\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:broadcom-wl-kernel-2.6.31.13-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:broadcom-wl-kernel-2.6.31.13-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:broadcom-wl-kernel-2.6.31.13-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:broadcom-wl-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:broadcom-wl-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:broadcom-wl-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:em8300-kernel-2.6.31.13-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:em8300-kernel-2.6.31.13-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:em8300-kernel-2.6.31.13-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:em8300-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:em8300-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:em8300-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:fglrx-kernel-2.6.31.13-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:fglrx-kernel-2.6.31.13-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:fglrx-kernel-2.6.31.13-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:fglrx-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:fglrx-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:fglrx-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-2.6.31.13-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-2.6.31.13-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-2.6.31.13-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hsfmodem-kernel-2.6.31.13-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hsfmodem-kernel-2.6.31.13-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hsfmodem-kernel-2.6.31.13-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hsfmodem-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hsfmodem-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hsfmodem-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-2.6.31.13-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-desktop-2.6.31.13-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-desktop-devel-2.6.31.13-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-desktop-devel-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-desktop586-2.6.31.13-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-desktop586-devel-2.6.31.13-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-desktop586-devel-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-server-2.6.31.13-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-server-devel-2.6.31.13-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-server-devel-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-source-2.6.31.13-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-source-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libafs-kernel-2.6.31.13-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libafs-kernel-2.6.31.13-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libafs-kernel-2.6.31.13-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libafs-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libafs-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libafs-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lirc-kernel-2.6.31.13-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lirc-kernel-2.6.31.13-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lirc-kernel-2.6.31.13-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lirc-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lirc-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lirc-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lzma-kernel-2.6.31.13-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lzma-kernel-2.6.31.13-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lzma-kernel-2.6.31.13-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lzma-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lzma-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lzma-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:madwifi-kernel-2.6.31.13-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:madwifi-kernel-2.6.31.13-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:madwifi-kernel-2.6.31.13-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:madwifi-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:madwifi-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:madwifi-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia-current-kernel-2.6.31.13-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia-current-kernel-2.6.31.13-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia-current-kernel-2.6.31.13-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia-current-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia-current-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia-current-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia173-kernel-2.6.31.13-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia173-kernel-2.6.31.13-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia173-kernel-2.6.31.13-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia173-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia173-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia173-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia96xx-kernel-2.6.31.13-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia96xx-kernel-2.6.31.13-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia96xx-kernel-2.6.31.13-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia96xx-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia96xx-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia96xx-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:slmodem-kernel-2.6.31.13-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:slmodem-kernel-2.6.31.13-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:slmodem-kernel-2.6.31.13-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:slmodem-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:slmodem-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:slmodem-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:squashfs-lzma-kernel-2.6.31.13-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:squashfs-lzma-kernel-2.6.31.13-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:squashfs-lzma-kernel-2.6.31.13-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:squashfs-lzma-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:squashfs-lzma-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:squashfs-lzma-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vboxadditions-kernel-2.6.31.13-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vboxadditions-kernel-2.6.31.13-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vboxadditions-kernel-2.6.31.13-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vboxadditions-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vboxadditions-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vboxadditions-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:virtualbox-kernel-2.6.31.13-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:virtualbox-kernel-2.6.31.13-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:virtualbox-kernel-2.6.31.13-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:virtualbox-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:virtualbox-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:virtualbox-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vpnclient-kernel-2.6.31.13-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vpnclient-kernel-2.6.31.13-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vpnclient-kernel-2.6.31.13-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vpnclient-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vpnclient-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vpnclient-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2010.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/04/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/07/30\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2010.0\", reference:\"broadcom-wl-kernel-2.6.31.13-desktop-1mnb-5.10.91.9-2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"broadcom-wl-kernel-2.6.31.13-desktop586-1mnb-5.10.91.9-2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"broadcom-wl-kernel-2.6.31.13-server-1mnb-5.10.91.9-2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"broadcom-wl-kernel-desktop-latest-5.10.91.9-1.20100428.2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"broadcom-wl-kernel-desktop586-latest-5.10.91.9-1.20100428.2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"broadcom-wl-kernel-server-latest-5.10.91.9-1.20100428.2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"em8300-kernel-2.6.31.13-desktop-1mnb-0.17.4-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"em8300-kernel-2.6.31.13-desktop586-1mnb-0.17.4-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"em8300-kernel-2.6.31.13-server-1mnb-0.17.4-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"em8300-kernel-desktop-latest-0.17.4-1.20100428.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"em8300-kernel-desktop586-latest-0.17.4-1.20100428.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"em8300-kernel-server-latest-0.17.4-1.20100428.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"fglrx-kernel-2.6.31.13-desktop-1mnb-8.650-1.2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"fglrx-kernel-2.6.31.13-desktop586-1mnb-8.650-1.2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"fglrx-kernel-2.6.31.13-server-1mnb-8.650-1.2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"fglrx-kernel-desktop-latest-8.650-1.20100428.1.2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"fglrx-kernel-desktop586-latest-8.650-1.20100428.1.2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"fglrx-kernel-server-latest-8.650-1.20100428.1.2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"hcfpcimodem-kernel-2.6.31.13-desktop-1mnb-1.19-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"hcfpcimodem-kernel-2.6.31.13-desktop586-1mnb-1.19-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"hcfpcimodem-kernel-2.6.31.13-server-1mnb-1.19-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"hcfpcimodem-kernel-desktop-latest-1.19-1.20100428.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"hcfpcimodem-kernel-desktop586-latest-1.19-1.20100428.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"hcfpcimodem-kernel-server-latest-1.19-1.20100428.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"hsfmodem-kernel-2.6.31.13-desktop-1mnb-7.80.02.05-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"hsfmodem-kernel-2.6.31.13-desktop586-1mnb-7.80.02.05-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"hsfmodem-kernel-2.6.31.13-server-1mnb-7.80.02.05-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"hsfmodem-kernel-desktop-latest-7.80.02.05-1.20100428.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"hsfmodem-kernel-desktop586-latest-7.80.02.05-1.20100428.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"hsfmodem-kernel-server-latest-7.80.02.05-1.20100428.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kernel-2.6.31.13-1mnb-1-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kernel-desktop-2.6.31.13-1mnb-1-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kernel-desktop-devel-2.6.31.13-1mnb-1-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kernel-desktop-devel-latest-2.6.31.13-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kernel-desktop-latest-2.6.31.13-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"kernel-desktop586-2.6.31.13-1mnb-1-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"kernel-desktop586-devel-2.6.31.13-1mnb-1-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"kernel-desktop586-devel-latest-2.6.31.13-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"kernel-desktop586-latest-2.6.31.13-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kernel-doc-2.6.31.13-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kernel-server-2.6.31.13-1mnb-1-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kernel-server-devel-2.6.31.13-1mnb-1-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kernel-server-devel-latest-2.6.31.13-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kernel-server-latest-2.6.31.13-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kernel-source-2.6.31.13-1mnb-1-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kernel-source-latest-2.6.31.13-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"libafs-kernel-2.6.31.13-desktop-1mnb-1.4.11-2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libafs-kernel-2.6.31.13-desktop586-1mnb-1.4.11-2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"libafs-kernel-2.6.31.13-server-1mnb-1.4.11-2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"libafs-kernel-desktop-latest-1.4.11-1.20100428.2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libafs-kernel-desktop586-latest-1.4.11-1.20100428.2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"libafs-kernel-server-latest-1.4.11-1.20100428.2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"lirc-kernel-2.6.31.13-desktop-1mnb-0.8.6-2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"lirc-kernel-2.6.31.13-desktop586-1mnb-0.8.6-2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"lirc-kernel-2.6.31.13-server-1mnb-0.8.6-2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"lirc-kernel-desktop-latest-0.8.6-1.20100428.2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"lirc-kernel-desktop586-latest-0.8.6-1.20100428.2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"lirc-kernel-server-latest-0.8.6-1.20100428.2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"lzma-kernel-2.6.31.13-desktop-1mnb-4.43-28mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"lzma-kernel-2.6.31.13-desktop586-1mnb-4.43-28mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"lzma-kernel-2.6.31.13-server-1mnb-4.43-28mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"lzma-kernel-desktop-latest-4.43-1.20100428.28mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"lzma-kernel-desktop586-latest-4.43-1.20100428.28mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"lzma-kernel-server-latest-4.43-1.20100428.28mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"madwifi-kernel-2.6.31.13-desktop-1mnb-0.9.4-4.r4068mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"madwifi-kernel-2.6.31.13-desktop586-1mnb-0.9.4-4.r4068mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"madwifi-kernel-2.6.31.13-server-1mnb-0.9.4-4.r4068mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"madwifi-kernel-desktop-latest-0.9.4-1.20100428.4.r4068mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"madwifi-kernel-desktop586-latest-0.9.4-1.20100428.4.r4068mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"madwifi-kernel-server-latest-0.9.4-1.20100428.4.r4068mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"nvidia-current-kernel-2.6.31.13-desktop-1mnb-185.18.36-4mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"nvidia-current-kernel-2.6.31.13-desktop586-1mnb-185.18.36-4mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"nvidia-current-kernel-2.6.31.13-server-1mnb-185.18.36-4mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"nvidia-current-kernel-desktop-latest-185.18.36-1.20100428.4mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"nvidia-current-kernel-desktop586-latest-185.18.36-1.20100428.4mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"nvidia-current-kernel-server-latest-185.18.36-1.20100428.4mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"nvidia173-kernel-2.6.31.13-desktop-1mnb-173.14.20-7mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"nvidia173-kernel-2.6.31.13-desktop586-1mnb-173.14.20-7mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"nvidia173-kernel-2.6.31.13-server-1mnb-173.14.20-7mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"nvidia173-kernel-desktop-latest-173.14.20-1.20100428.7mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"nvidia173-kernel-desktop586-latest-173.14.20-1.20100428.7mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"nvidia173-kernel-server-latest-173.14.20-1.20100428.7mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"nvidia96xx-kernel-2.6.31.13-desktop-1mnb-96.43.13-7mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"nvidia96xx-kernel-2.6.31.13-desktop586-1mnb-96.43.13-7mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"nvidia96xx-kernel-2.6.31.13-server-1mnb-96.43.13-7mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"nvidia96xx-kernel-desktop-latest-96.43.13-1.20100428.7mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"nvidia96xx-kernel-desktop586-latest-96.43.13-1.20100428.7mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"nvidia96xx-kernel-server-latest-96.43.13-1.20100428.7mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"slmodem-kernel-2.6.31.13-desktop-1mnb-2.9.11-0.20080817.4.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"slmodem-kernel-2.6.31.13-desktop586-1mnb-2.9.11-0.20080817.4.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"slmodem-kernel-2.6.31.13-server-1mnb-2.9.11-0.20080817.4.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"slmodem-kernel-desktop-latest-2.9.11-1.20100428.0.20080817.4.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"slmodem-kernel-desktop586-latest-2.9.11-1.20100428.0.20080817.4.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"slmodem-kernel-server-latest-2.9.11-1.20100428.0.20080817.4.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"squashfs-lzma-kernel-2.6.31.13-desktop-1mnb-3.3-11mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"squashfs-lzma-kernel-2.6.31.13-desktop586-1mnb-3.3-11mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"squashfs-lzma-kernel-2.6.31.13-server-1mnb-3.3-11mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"squashfs-lzma-kernel-desktop-latest-3.3-1.20100428.11mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"squashfs-lzma-kernel-desktop586-latest-3.3-1.20100428.11mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"squashfs-lzma-kernel-server-latest-3.3-1.20100428.11mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"vboxadditions-kernel-2.6.31.13-desktop-1mnb-3.0.8-1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"vboxadditions-kernel-2.6.31.13-desktop586-1mnb-3.0.8-1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"vboxadditions-kernel-2.6.31.13-server-1mnb-3.0.8-1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"vboxadditions-kernel-desktop-latest-3.0.8-1.20100428.1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"vboxadditions-kernel-desktop586-latest-3.0.8-1.20100428.1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"vboxadditions-kernel-server-latest-3.0.8-1.20100428.1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"virtualbox-kernel-2.6.31.13-desktop-1mnb-3.0.8-1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"virtualbox-kernel-2.6.31.13-desktop586-1mnb-3.0.8-1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"virtualbox-kernel-2.6.31.13-server-1mnb-3.0.8-1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"virtualbox-kernel-desktop-latest-3.0.8-1.20100428.1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"virtualbox-kernel-desktop586-latest-3.0.8-1.20100428.1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"virtualbox-kernel-server-latest-3.0.8-1.20100428.1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"vpnclient-kernel-2.6.31.13-desktop-1mnb-4.8.02.0030-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"vpnclient-kernel-2.6.31.13-desktop586-1mnb-4.8.02.0030-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"vpnclient-kernel-2.6.31.13-server-1mnb-4.8.02.0030-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"vpnclient-kernel-desktop-latest-4.8.02.0030-1.20100428.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"vpnclient-kernel-desktop586-latest-4.8.02.0030-1.20100428.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"vpnclient-kernel-server-latest-4.8.02.0030-1.20100428.1mdv2010.0\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.4, "vector": "AV:N/AC:H/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T14:45:49", "description": "This update fixes a several security issues and various bugs in the\nSUSE Linux Enterprise 10 SP 2 kernel. The bugs fixed include a serious\ndata corruption regression in NFS.\n\nThe following security issues were fixed :\n\n - drivers/net/r8169.c in the r8169 driver in the Linux\n kernel does not properly check the size of an Ethernet\n frame that exceeds the MTU, which allows remote\n attackers to (1) cause a denial of service (temporary\n network outage) via a packet with a crafted size, in\n conjunction with certain packets containing A characters\n and certain packets containing E characters; or (2)\n cause a denial of service (system crash) via a packet\n with a crafted size, in conjunction with certain packets\n containing '0' characters, related to the value of the\n status register and erroneous behavior associated with\n the RxMaxSize register. (CVE-2009-4537)\n\n - The ULE decapsulation functionality in\n drivers/media/dvb/dvb-core/dvb_net.c in dvb-core in the\n Linux kernel arlier allows attackers to cause a denial\n of service (infinite loop) via a crafted MPEG2-TS frame,\n related to an invalid Payload Pointer ULE.\n (CVE-2010-1086)\n\n - fs/namei.c in Linux kernel does not always follow NFS\n automount 'symlinks,' which allows attackers to have an\n unknown impact, related to LOOKUP_FOLLOW.\n (CVE-2010-1088)\n\n - Stack-based buffer overflow in the hfs subsystem in the\n Linux kernel allows remote attackers to have an\n unspecified impact via a crafted Hierarchical File\n System (HFS) filesystem, related to the hfs_readdir\n function in fs/hfs/dir.c. (CVE-2009-4020)\n\n - The processcompl_compat function in\n drivers/usb/core/devio.c in the Linux kernel does not\n clear the transfer buffer before returning to userspace\n when a USB command fails, which might make it easier for\n physically proximate attackers to obtain sensitive\n information (kernel memory). (CVE-2010-1083)\n\n - drivers/connector/connector.c in the Linux kernel allows\n local users to cause a denial of service (memory\n consumption and system crash) by sending the kernel many\n NETLINK_CONNECTOR messages. (CVE-2010-0410)", "edition": 25, "published": "2012-05-17T00:00:00", "title": "SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 7015)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4537", "CVE-2010-0410", "CVE-2009-4020", "CVE-2010-1083", "CVE-2010-1086", "CVE-2010-1088"], "modified": "2012-05-17T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_KERNEL-7015.NASL", "href": "https://www.tenable.com/plugins/nessus/59148", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(59148);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-4020\", \"CVE-2009-4537\", \"CVE-2010-0410\", \"CVE-2010-1083\", \"CVE-2010-1086\", \"CVE-2010-1088\");\n\n script_name(english:\"SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 7015)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes a several security issues and various bugs in the\nSUSE Linux Enterprise 10 SP 2 kernel. The bugs fixed include a serious\ndata corruption regression in NFS.\n\nThe following security issues were fixed :\n\n - drivers/net/r8169.c in the r8169 driver in the Linux\n kernel does not properly check the size of an Ethernet\n frame that exceeds the MTU, which allows remote\n attackers to (1) cause a denial of service (temporary\n network outage) via a packet with a crafted size, in\n conjunction with certain packets containing A characters\n and certain packets containing E characters; or (2)\n cause a denial of service (system crash) via a packet\n with a crafted size, in conjunction with certain packets\n containing '0' characters, related to the value of the\n status register and erroneous behavior associated with\n the RxMaxSize register. (CVE-2009-4537)\n\n - The ULE decapsulation functionality in\n drivers/media/dvb/dvb-core/dvb_net.c in dvb-core in the\n Linux kernel arlier allows attackers to cause a denial\n of service (infinite loop) via a crafted MPEG2-TS frame,\n related to an invalid Payload Pointer ULE.\n (CVE-2010-1086)\n\n - fs/namei.c in Linux kernel does not always follow NFS\n automount 'symlinks,' which allows attackers to have an\n unknown impact, related to LOOKUP_FOLLOW.\n (CVE-2010-1088)\n\n - Stack-based buffer overflow in the hfs subsystem in the\n Linux kernel allows remote attackers to have an\n unspecified impact via a crafted Hierarchical File\n System (HFS) filesystem, related to the hfs_readdir\n function in fs/hfs/dir.c. (CVE-2009-4020)\n\n - The processcompl_compat function in\n drivers/usb/core/devio.c in the Linux kernel does not\n clear the transfer buffer before returning to userspace\n when a USB command fails, which might make it easier for\n physically proximate attackers to obtain sensitive\n information (kernel memory). (CVE-2010-1083)\n\n - drivers/connector/connector.c in the Linux kernel allows\n local users to cause a denial of service (memory\n consumption and system crash) by sending the kernel many\n NETLINK_CONNECTOR messages. (CVE-2010-0410)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-4020.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-4537.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-0410.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-1083.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-1086.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-1088.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 7015.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_cwe_id(20, 119, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/04/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/05/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"kernel-default-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"kernel-smp-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"kernel-source-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"kernel-syms-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"kernel-xen-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-debug-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-default-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-kdump-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-smp-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-source-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-syms-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-xen-2.6.16.60-0.42.10\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T14:45:49", "description": "This update fixes a several security issues and various bugs in the\nSUSE Linux Enterprise 10 SP 2 kernel. The bugs fixed include a serious\ndata corruption regression in NFS.\n\nThe following security issues were fixed :\n\n - drivers/net/r8169.c in the r8169 driver in the Linux\n kernel does not properly check the size of an Ethernet\n frame that exceeds the MTU, which allows remote\n attackers to (1) cause a denial of service (temporary\n network outage) via a packet with a crafted size, in\n conjunction with certain packets containing A characters\n and certain packets containing E characters; or (2)\n cause a denial of service (system crash) via a packet\n with a crafted size, in conjunction with certain packets\n containing '0' characters, related to the value of the\n status register and erroneous behavior associated with\n the RxMaxSize register. (CVE-2009-4537)\n\n - The ULE decapsulation functionality in\n drivers/media/dvb/dvb-core/dvb_net.c in dvb-core in the\n Linux kernel arlier allows attackers to cause a denial\n of service (infinite loop) via a crafted MPEG2-TS frame,\n related to an invalid Payload Pointer ULE.\n (CVE-2010-1086)\n\n - fs/namei.c in Linux kernel does not always follow NFS\n automount 'symlinks,' which allows attackers to have an\n unknown impact, related to LOOKUP_FOLLOW.\n (CVE-2010-1088)\n\n - Stack-based buffer overflow in the hfs subsystem in the\n Linux kernel allows remote attackers to have an\n unspecified impact via a crafted Hierarchical File\n System (HFS) filesystem, related to the hfs_readdir\n function in fs/hfs/dir.c. (CVE-2009-4020)\n\n - The processcompl_compat function in\n drivers/usb/core/devio.c in the Linux kernel does not\n clear the transfer buffer before returning to userspace\n when a USB command fails, which might make it easier for\n physically proximate attackers to obtain sensitive\n information (kernel memory). (CVE-2010-1083)\n\n - drivers/connector/connector.c in the Linux kernel allows\n local users to cause a denial of service (memory\n consumption and system crash) by sending the kernel many\n NETLINK_CONNECTOR messages. (CVE-2010-0410)", "edition": 25, "published": "2010-05-07T00:00:00", "title": "SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 7011)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4537", "CVE-2010-0410", "CVE-2009-4020", "CVE-2010-1083", "CVE-2010-1086", "CVE-2010-1088"], "modified": "2010-05-07T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_KERNEL-7011.NASL", "href": "https://www.tenable.com/plugins/nessus/46252", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(46252);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-4020\", \"CVE-2009-4537\", \"CVE-2010-0410\", \"CVE-2010-1083\", \"CVE-2010-1086\", \"CVE-2010-1088\");\n\n script_name(english:\"SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 7011)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes a several security issues and various bugs in the\nSUSE Linux Enterprise 10 SP 2 kernel. The bugs fixed include a serious\ndata corruption regression in NFS.\n\nThe following security issues were fixed :\n\n - drivers/net/r8169.c in the r8169 driver in the Linux\n kernel does not properly check the size of an Ethernet\n frame that exceeds the MTU, which allows remote\n attackers to (1) cause a denial of service (temporary\n network outage) via a packet with a crafted size, in\n conjunction with certain packets containing A characters\n and certain packets containing E characters; or (2)\n cause a denial of service (system crash) via a packet\n with a crafted size, in conjunction with certain packets\n containing '0' characters, related to the value of the\n status register and erroneous behavior associated with\n the RxMaxSize register. (CVE-2009-4537)\n\n - The ULE decapsulation functionality in\n drivers/media/dvb/dvb-core/dvb_net.c in dvb-core in the\n Linux kernel arlier allows attackers to cause a denial\n of service (infinite loop) via a crafted MPEG2-TS frame,\n related to an invalid Payload Pointer ULE.\n (CVE-2010-1086)\n\n - fs/namei.c in Linux kernel does not always follow NFS\n automount 'symlinks,' which allows attackers to have an\n unknown impact, related to LOOKUP_FOLLOW.\n (CVE-2010-1088)\n\n - Stack-based buffer overflow in the hfs subsystem in the\n Linux kernel allows remote attackers to have an\n unspecified impact via a crafted Hierarchical File\n System (HFS) filesystem, related to the hfs_readdir\n function in fs/hfs/dir.c. (CVE-2009-4020)\n\n - The processcompl_compat function in\n drivers/usb/core/devio.c in the Linux kernel does not\n clear the transfer buffer before returning to userspace\n when a USB command fails, which might make it easier for\n physically proximate attackers to obtain sensitive\n information (kernel memory). (CVE-2010-1083)\n\n - drivers/connector/connector.c in the Linux kernel allows\n local users to cause a denial of service (memory\n consumption and system crash) by sending the kernel many\n NETLINK_CONNECTOR messages. (CVE-2010-0410)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-4020.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-4537.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-0410.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-1083.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-1086.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-1088.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 7011.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_cwe_id(20, 119, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/04/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/05/07\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"i586\", reference:\"kernel-bigsmp-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"i586\", reference:\"kernel-default-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"i586\", reference:\"kernel-smp-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"i586\", reference:\"kernel-source-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"i586\", reference:\"kernel-syms-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"i586\", reference:\"kernel-xen-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"i586\", reference:\"kernel-xenpae-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-bigsmp-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-debug-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-default-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-kdump-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-smp-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-source-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-syms-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-vmi-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-vmipae-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-xen-2.6.16.60-0.42.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-xenpae-2.6.16.60-0.42.10\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-06T09:26:25", "description": "Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n* multiple flaws were found in the mmap and mremap implementations. A\nlocal user could use these flaws to cause a local denial of service or\nescalate their privileges. (CVE-2010-0291, Important)\n\n* a NULL pointer dereference flaw was found in the Fast Userspace\nMutexes (futexes) implementation. The unlock code path did not check\nif the futex value associated with pi_state->owner had been modified.\nA local user could use this flaw to modify the futex value, possibly\nleading to a denial of service or privilege escalation when the\npi_state->owner pointer is dereferenced. (CVE-2010-0622, Important)\n\n* a NULL pointer dereference flaw was found in the Linux kernel\nNetwork File System (NFS) implementation. A local user on a system\nthat has an NFS-mounted file system could use this flaw to cause a\ndenial of service or escalate their privileges on that system.\n(CVE-2010-1087, Important)\n\n* a flaw was found in the sctp_process_unk_param() function in the\nLinux kernel Stream Control Transmission Protocol (SCTP)\nimplementation. A remote attacker could send a specially crafted SCTP\npacket to an SCTP listening port on a target system, causing a kernel\npanic (denial of service). (CVE-2010-1173, Important)\n\n* a flaw was found in the Linux kernel Transparent Inter-Process\nCommunication protocol (TIPC) implementation. If a client application,\non a local system where the tipc module is not yet in network mode,\nattempted to send a message to a remote TIPC node, it would\ndereference a NULL pointer on the local system, causing a kernel panic\n(denial of service). (CVE-2010-1187, Important)\n\n* a buffer overflow flaw was found in the Linux kernel Global File\nSystem 2 (GFS2) implementation. In certain cases, a quota could be\nwritten past the end of a memory page, causing memory corruption,\nleaving the quota stored on disk in an invalid state. A user with\nwrite access to a GFS2 file system could trigger this flaw to cause a\nkernel crash (denial of service) or escalate their privileges on the\nGFS2 server. This issue can only be triggered if the GFS2 file system\nis mounted with the 'quota=on' or 'quota=account' mount option.\n(CVE-2010-1436, Important)\n\n* a race condition between finding a keyring by name and destroying a\nfreed keyring was found in the Linux kernel key management facility. A\nlocal user could use this flaw to cause a kernel panic (denial of\nservice) or escalate their privileges. (CVE-2010-1437, Important)\n\n* a flaw was found in the link_path_walk() function in the Linux\nkernel. Using the file descriptor returned by the open() function with\nthe O_NOFOLLOW flag on a subordinate NFS-mounted file system, could\nresult in a NULL pointer dereference, causing a denial of service or\nprivilege escalation. (CVE-2010-1088, Moderate)\n\n* a missing permission check was found in the gfs2_set_flags()\nfunction in the Linux kernel GFS2 implementation. A local user could\nuse this flaw to change certain file attributes of files, on a GFS2\nfile system, that they do not own. (CVE-2010-1641, Low)\n\nRed Hat would like to thank Jukka Taimisto and Olli Jarva of\nCodenomicon Ltd, Nokia Siemens Networks, and Wind River on behalf of\ntheir customer, for responsibly reporting CVE-2010-1173; Mario\nMikocevic for responsibly reporting CVE-2010-1436; and Dan Rosenberg\nfor responsibly reporting CVE-2010-1641.\n\nThis update also fixes several bugs. Documentation for these bug fixes\nwill be available shortly from\nhttp://www.redhat.com/docs/en-US/errata/RHSA-2010-0504/Kernel_Security\n_Update/ index.html\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues. The system must be\nrebooted for this update to take effect.", "edition": 28, "published": "2010-07-13T00:00:00", "title": "CentOS 5 : kernel (CESA-2010:0504)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1641", "CVE-2010-1437", "CVE-2010-1187", "CVE-2010-0291", "CVE-2010-0622", "CVE-2010-1436", "CVE-2010-1173", "CVE-2010-1088", "CVE-2010-1087"], "modified": "2010-07-13T00:00:00", "cpe": ["p-cpe:/a:centos:centos:kernel-PAE-devel", "p-cpe:/a:centos:centos:kernel-xen-devel", "p-cpe:/a:centos:centos:kernel-xen", "p-cpe:/a:centos:centos:kernel-doc", "p-cpe:/a:centos:centos:kernel-devel", "p-cpe:/a:centos:centos:kernel", "p-cpe:/a:centos:centos:kernel-debug", "p-cpe:/a:centos:centos:kernel-headers", "cpe:/o:centos:centos:5", "p-cpe:/a:centos:centos:kernel-PAE", "p-cpe:/a:centos:centos:kernel-debug-devel"], "id": "CENTOS_RHSA-2010-0504.NASL", "href": "https://www.tenable.com/plugins/nessus/47702", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2010:0504 and \n# CentOS Errata and Security Advisory 2010:0504 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(47702);\n script_version(\"1.20\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2010-0291\", \"CVE-2010-0622\", \"CVE-2010-1087\", \"CVE-2010-1088\", \"CVE-2010-1173\", \"CVE-2010-1187\", \"CVE-2010-1436\", \"CVE-2010-1437\", \"CVE-2010-1641\");\n script_bugtraq_id(37906, 38165, 39044, 39120, 39569, 39719, 39794, 40356);\n script_xref(name:\"RHSA\", value:\"2010:0504\");\n\n script_name(english:\"CentOS 5 : kernel (CESA-2010:0504)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n* multiple flaws were found in the mmap and mremap implementations. A\nlocal user could use these flaws to cause a local denial of service or\nescalate their privileges. (CVE-2010-0291, Important)\n\n* a NULL pointer dereference flaw was found in the Fast Userspace\nMutexes (futexes) implementation. The unlock code path did not check\nif the futex value associated with pi_state->owner had been modified.\nA local user could use this flaw to modify the futex value, possibly\nleading to a denial of service or privilege escalation when the\npi_state->owner pointer is dereferenced. (CVE-2010-0622, Important)\n\n* a NULL pointer dereference flaw was found in the Linux kernel\nNetwork File System (NFS) implementation. A local user on a system\nthat has an NFS-mounted file system could use this flaw to cause a\ndenial of service or escalate their privileges on that system.\n(CVE-2010-1087, Important)\n\n* a flaw was found in the sctp_process_unk_param() function in the\nLinux kernel Stream Control Transmission Protocol (SCTP)\nimplementation. A remote attacker could send a specially crafted SCTP\npacket to an SCTP listening port on a target system, causing a kernel\npanic (denial of service). (CVE-2010-1173, Important)\n\n* a flaw was found in the Linux kernel Transparent Inter-Process\nCommunication protocol (TIPC) implementation. If a client application,\non a local system where the tipc module is not yet in network mode,\nattempted to send a message to a remote TIPC node, it would\ndereference a NULL pointer on the local system, causing a kernel panic\n(denial of service). (CVE-2010-1187, Important)\n\n* a buffer overflow flaw was found in the Linux kernel Global File\nSystem 2 (GFS2) implementation. In certain cases, a quota could be\nwritten past the end of a memory page, causing memory corruption,\nleaving the quota stored on disk in an invalid state. A user with\nwrite access to a GFS2 file system could trigger this flaw to cause a\nkernel crash (denial of service) or escalate their privileges on the\nGFS2 server. This issue can only be triggered if the GFS2 file system\nis mounted with the 'quota=on' or 'quota=account' mount option.\n(CVE-2010-1436, Important)\n\n* a race condition between finding a keyring by name and destroying a\nfreed keyring was found in the Linux kernel key management facility. A\nlocal user could use this flaw to cause a kernel panic (denial of\nservice) or escalate their privileges. (CVE-2010-1437, Important)\n\n* a flaw was found in the link_path_walk() function in the Linux\nkernel. Using the file descriptor returned by the open() function with\nthe O_NOFOLLOW flag on a subordinate NFS-mounted file system, could\nresult in a NULL pointer dereference, causing a denial of service or\nprivilege escalation. (CVE-2010-1088, Moderate)\n\n* a missing permission check was found in the gfs2_set_flags()\nfunction in the Linux kernel GFS2 implementation. A local user could\nuse this flaw to change certain file attributes of files, on a GFS2\nfile system, that they do not own. (CVE-2010-1641, Low)\n\nRed Hat would like to thank Jukka Taimisto and Olli Jarva of\nCodenomicon Ltd, Nokia Siemens Networks, and Wind River on behalf of\ntheir customer, for responsibly reporting CVE-2010-1173; Mario\nMikocevic for responsibly reporting CVE-2010-1436; and Dan Rosenberg\nfor responsibly reporting CVE-2010-1641.\n\nThis update also fixes several bugs. Documentation for these bug fixes\nwill be available shortly from\nhttp://www.redhat.com/docs/en-US/errata/RHSA-2010-0504/Kernel_Security\n_Update/ index.html\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues. The system must be\nrebooted for this update to take effect.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2010-July/016747.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6f554f20\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2010-July/016748.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5e0e8298\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:ND\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_cwe_id(264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-PAE\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-PAE-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/02/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/07/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/07/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 5.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-2.6.18-194.8.1.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", cpu:\"i386\", reference:\"kernel-PAE-2.6.18-194.8.1.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", cpu:\"i386\", reference:\"kernel-PAE-devel-2.6.18-194.8.1.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-debug-2.6.18-194.8.1.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-debug-devel-2.6.18-194.8.1.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-devel-2.6.18-194.8.1.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-doc-2.6.18-194.8.1.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-headers-2.6.18-194.8.1.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-xen-2.6.18-194.8.1.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-xen-devel-2.6.18-194.8.1.el5\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-PAE / kernel-PAE-devel / kernel-debug / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T12:45:10", "description": "From Red Hat Security Advisory 2010:0504 :\n\nUpdated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n* multiple flaws were found in the mmap and mremap implementations. A\nlocal user could use these flaws to cause a local denial of service or\nescalate their privileges. (CVE-2010-0291, Important)\n\n* a NULL pointer dereference flaw was found in the Fast Userspace\nMutexes (futexes) implementation. The unlock code path did not check\nif the futex value associated with pi_state->owner had been modified.\nA local user could use this flaw to modify the futex value, possibly\nleading to a denial of service or privilege escalation when the\npi_state->owner pointer is dereferenced. (CVE-2010-0622, Important)\n\n* a NULL pointer dereference flaw was found in the Linux kernel\nNetwork File System (NFS) implementation. A local user on a system\nthat has an NFS-mounted file system could use this flaw to cause a\ndenial of service or escalate their privileges on that system.\n(CVE-2010-1087, Important)\n\n* a flaw was found in the sctp_process_unk_param() function in the\nLinux kernel Stream Control Transmission Protocol (SCTP)\nimplementation. A remote attacker could send a specially crafted SCTP\npacket to an SCTP listening port on a target system, causing a kernel\npanic (denial of service). (CVE-2010-1173, Important)\n\n* a flaw was found in the Linux kernel Transparent Inter-Process\nCommunication protocol (TIPC) implementation. If a client application,\non a local system where the tipc module is not yet in network mode,\nattempted to send a message to a remote TIPC node, it would\ndereference a NULL pointer on the local system, causing a kernel panic\n(denial of service). (CVE-2010-1187, Important)\n\n* a buffer overflow flaw was found in the Linux kernel Global File\nSystem 2 (GFS2) implementation. In certain cases, a quota could be\nwritten past the end of a memory page, causing memory corruption,\nleaving the quota stored on disk in an invalid state. A user with\nwrite access to a GFS2 file system could trigger this flaw to cause a\nkernel crash (denial of service) or escalate their privileges on the\nGFS2 server. This issue can only be triggered if the GFS2 file system\nis mounted with the 'quota=on' or 'quota=account' mount option.\n(CVE-2010-1436, Important)\n\n* a race condition between finding a keyring by name and destroying a\nfreed keyring was found in the Linux kernel key management facility. A\nlocal user could use this flaw to cause a kernel panic (denial of\nservice) or escalate their privileges. (CVE-2010-1437, Important)\n\n* a flaw was found in the link_path_walk() function in the Linux\nkernel. Using the file descriptor returned by the open() function with\nthe O_NOFOLLOW flag on a subordinate NFS-mounted file system, could\nresult in a NULL pointer dereference, causing a denial of service or\nprivilege escalation. (CVE-2010-1088, Moderate)\n\n* a missing permission check was found in the gfs2_set_flags()\nfunction in the Linux kernel GFS2 implementation. A local user could\nuse this flaw to change certain file attributes of files, on a GFS2\nfile system, that they do not own. (CVE-2010-1641, Low)\n\nRed Hat would like to thank Jukka Taimisto and Olli Jarva of\nCodenomicon Ltd, Nokia Siemens Networks, and Wind River on behalf of\ntheir customer, for responsibly reporting CVE-2010-1173; Mario\nMikocevic for responsibly reporting CVE-2010-1436; and Dan Rosenberg\nfor responsibly reporting CVE-2010-1641.\n\nThis update also fixes several bugs. Documentation for these bug fixes\nwill be available shortly from\nhttp://www.redhat.com/docs/en-US/errata/RHSA-2010-0504/Kernel_Security\n_Update/ index.html\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues. The system must be\nrebooted for this update to take effect.", "edition": 26, "published": "2013-07-12T00:00:00", "title": "Oracle Linux 5 : kernel (ELSA-2010-0504)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1641", "CVE-2010-1437", "CVE-2010-1187", "CVE-2010-0291", "CVE-2010-0622", "CVE-2010-1436", "CVE-2010-1173", "CVE-2010-1088", "CVE-2010-1087"], "modified": "2013-07-12T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:kernel-debug", "p-cpe:/a:oracle:linux:kernel-devel", "p-cpe:/a:oracle:linux:kernel-doc", "p-cpe:/a:oracle:linux:kernel-PAE", "cpe:/o:oracle:linux:5", "p-cpe:/a:oracle:linux:kernel-xen-devel", "p-cpe:/a:oracle:linux:kernel-debug-devel", "p-cpe:/a:oracle:linux:kernel-headers", "p-cpe:/a:oracle:linux:kernel-PAE-devel", "p-cpe:/a:oracle:linux:kernel", "p-cpe:/a:oracle:linux:kernel-xen"], "id": "ORACLELINUX_ELSA-2010-0504.NASL", "href": "https://www.tenable.com/plugins/nessus/68056", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2010:0504 and \n# Oracle Linux Security Advisory ELSA-2010-0504 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(68056);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-0291\", \"CVE-2010-0622\", \"CVE-2010-1087\", \"CVE-2010-1088\", \"CVE-2010-1173\", \"CVE-2010-1187\", \"CVE-2010-1436\", \"CVE-2010-1437\", \"CVE-2010-1641\");\n script_bugtraq_id(37906, 38165, 39044, 39120, 39569, 39719, 39794, 40356);\n script_xref(name:\"RHSA\", value:\"2010:0504\");\n\n script_name(english:\"Oracle Linux 5 : kernel (ELSA-2010-0504)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2010:0504 :\n\nUpdated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n* multiple flaws were found in the mmap and mremap implementations. A\nlocal user could use these flaws to cause a local denial of service or\nescalate their privileges. (CVE-2010-0291, Important)\n\n* a NULL pointer dereference flaw was found in the Fast Userspace\nMutexes (futexes) implementation. The unlock code path did not check\nif the futex value associated with pi_state->owner had been modified.\nA local user could use this flaw to modify the futex value, possibly\nleading to a denial of service or privilege escalation when the\npi_state->owner pointer is dereferenced. (CVE-2010-0622, Important)\n\n* a NULL pointer dereference flaw was found in the Linux kernel\nNetwork File System (NFS) implementation. A local user on a system\nthat has an NFS-mounted file system could use this flaw to cause a\ndenial of service or escalate their privileges on that system.\n(CVE-2010-1087, Important)\n\n* a flaw was found in the sctp_process_unk_param() function in the\nLinux kernel Stream Control Transmission Protocol (SCTP)\nimplementation. A remote attacker could send a specially crafted SCTP\npacket to an SCTP listening port on a target system, causing a kernel\npanic (denial of service). (CVE-2010-1173, Important)\n\n* a flaw was found in the Linux kernel Transparent Inter-Process\nCommunication protocol (TIPC) implementation. If a client application,\non a local system where the tipc module is not yet in network mode,\nattempted to send a message to a remote TIPC node, it would\ndereference a NULL pointer on the local system, causing a kernel panic\n(denial of service). (CVE-2010-1187, Important)\n\n* a buffer overflow flaw was found in the Linux kernel Global File\nSystem 2 (GFS2) implementation. In certain cases, a quota could be\nwritten past the end of a memory page, causing memory corruption,\nleaving the quota stored on disk in an invalid state. A user with\nwrite access to a GFS2 file system could trigger this flaw to cause a\nkernel crash (denial of service) or escalate their privileges on the\nGFS2 server. This issue can only be triggered if the GFS2 file system\nis mounted with the 'quota=on' or 'quota=account' mount option.\n(CVE-2010-1436, Important)\n\n* a race condition between finding a keyring by name and destroying a\nfreed keyring was found in the Linux kernel key management facility. A\nlocal user could use this flaw to cause a kernel panic (denial of\nservice) or escalate their privileges. (CVE-2010-1437, Important)\n\n* a flaw was found in the link_path_walk() function in the Linux\nkernel. Using the file descriptor returned by the open() function with\nthe O_NOFOLLOW flag on a subordinate NFS-mounted file system, could\nresult in a NULL pointer dereference, causing a denial of service or\nprivilege escalation. (CVE-2010-1088, Moderate)\n\n* a missing permission check was found in the gfs2_set_flags()\nfunction in the Linux kernel GFS2 implementation. A local user could\nuse this flaw to change certain file attributes of files, on a GFS2\nfile system, that they do not own. (CVE-2010-1641, Low)\n\nRed Hat would like to thank Jukka Taimisto and Olli Jarva of\nCodenomicon Ltd, Nokia Siemens Networks, and Wind River on behalf of\ntheir customer, for responsibly reporting CVE-2010-1173; Mario\nMikocevic for responsibly reporting CVE-2010-1436; and Dan Rosenberg\nfor responsibly reporting CVE-2010-1641.\n\nThis update also fixes several bugs. Documentation for these bug fixes\nwill be available shortly from\nhttp://www.redhat.com/docs/en-US/errata/RHSA-2010-0504/Kernel_Security\n_Update/ index.html\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues. The system must be\nrebooted for this update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2010-July/001512.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:ND\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_cwe_id(264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-PAE\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-PAE-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/02/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/07/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 5\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2010-0291\", \"CVE-2010-0622\", \"CVE-2010-1087\", \"CVE-2010-1088\", \"CVE-2010-1173\", \"CVE-2010-1187\", \"CVE-2010-1436\", \"CVE-2010-1437\", \"CVE-2010-1641\"); \n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for ELSA-2010-0504\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nkernel_major_minor = get_kb_item(\"Host/uname/major_minor\");\nif (empty_or_null(kernel_major_minor)) exit(1, \"Unable to determine kernel major-minor level.\");\nexpected_kernel_major_minor = \"2.6\";\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, \"running kernel level \" + expected_kernel_major_minor + \", it is running kernel level \" + kernel_major_minor);\n\nflag = 0;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-2.6.18-194.8.1.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-PAE-2.6.18\") && rpm_check(release:\"EL5\", cpu:\"i386\", reference:\"kernel-PAE-2.6.18-194.8.1.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-PAE-devel-2.6.18\") && rpm_check(release:\"EL5\", cpu:\"i386\", reference:\"kernel-PAE-devel-2.6.18-194.8.1.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-debug-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-debug-2.6.18-194.8.1.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-debug-devel-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-debug-devel-2.6.18-194.8.1.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-devel-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-devel-2.6.18-194.8.1.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-doc-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-doc-2.6.18-194.8.1.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-headers-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-headers-2.6.18-194.8.1.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-xen-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-xen-2.6.18-194.8.1.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-xen-devel-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-xen-devel-2.6.18-194.8.1.0.1.el5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"affected kernel\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T13:44:53", "description": "This update fixes the following security issues :\n\n - multiple flaws were found in the mmap and mremap\n implementations. A local user could use these flaws to\n cause a local denial of service or escalate their\n privileges. (CVE-2010-0291, Important)\n\n - a NULL pointer dereference flaw was found in the Fast\n Userspace Mutexes (futexes) implementation. The unlock\n code path did not check if the futex value associated\n with pi_state->owner had been modified. A local user\n could use this flaw to modify the futex value, possibly\n leading to a denial of service or privilege escalation\n when the pi_state->owner pointer is dereferenced.\n (CVE-2010-0622, Important)\n\n - a NULL pointer dereference flaw was found in the Linux\n kernel Network File System (NFS) implementation. A local\n user on a system that has an NFS-mounted file system\n could use this flaw to cause a denial of service or\n escalate their privileges on that system.\n (CVE-2010-1087, Important)\n\n - a flaw was found in the sctp_process_unk_param()\n function in the Linux kernel Stream Control Transmission\n Protocol (SCTP) implementation. A remote attacker could\n send a specially crafted SCTP packet to an SCTP\n listening port on a target system, causing a kernel\n panic (denial of service). (CVE-2010-1173, Important)\n\n - a flaw was found in the Linux kernel Transparent\n Inter-Process Communication protocol (TIPC)\n implementation. If a client application, on a local\n system where the tipc module is not yet in network mode,\n attempted to send a message to a remote TIPC node, it\n would dereference a NULL pointer on the local system,\n causing a kernel panic (denial of service).\n (CVE-2010-1187, Important)\n\n - a buffer overflow flaw was found in the Linux kernel\n Global File System 2 (GFS2) implementation. In certain\n cases, a quota could be written past the end of a memory\n page, causing memory corruption, leaving the quota\n stored on disk in an invalid state. A user with write\n access to a GFS2 file system could trigger this flaw to\n cause a kernel crash (denial of service) or escalate\n their privileges on the GFS2 server. This issue can only\n be triggered if the GFS2 file system is mounted with the\n 'quota=on' or 'quota=account' mount option.\n (CVE-2010-1436, Important)\n\n - a race condition between finding a keyring by name and\n destroying a freed keyring was found in the Linux kernel\n key management facility. A local user could use this\n flaw to cause a kernel panic (denial of service) or\n escalate their privileges. (CVE-2010-1437, Important)\n\n - a flaw was found in the link_path_walk() function in the\n Linux kernel. Using the file descriptor returned by the\n open() function with the O_NOFOLLOW flag on a\n subordinate NFS-mounted file system, could result in a\n NULL pointer dereference, causing a denial of service or\n privilege escalation. (CVE-2010-1088, Moderate)\n\n - a missing permission check was found in the\n gfs2_set_flags() function in the Linux kernel GFS2\n implementation. A local user could use this flaw to\n change certain file attributes of files, on a GFS2 file\n system, that they do not own. (CVE-2010-1641, Low)\n\nRed Hat would like to thank Jukka Taimisto and Olli Jarva of\nCodenomicon Ltd, Nokia Siemens Networks, and Wind River on behalf of\ntheir customer, for responsibly reporting CVE-2010-1173; Mario\nMikocevic for responsibly reporting CVE-2010-1436; and Dan Rosenberg\nfor responsibly reporting CVE-2010-1641.\n\nThis update also fixes several bugs.\n\nThe system must be rebooted for this update to take effect.", "edition": 26, "published": "2012-08-01T00:00:00", "title": "Scientific Linux Security Update : kernel on SL5.x i386/x86_64", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1641", "CVE-2010-1437", "CVE-2010-1187", "CVE-2010-0291", "CVE-2010-0622", "CVE-2010-1436", "CVE-2010-1173", "CVE-2010-1088", "CVE-2010-1087"], "modified": "2012-08-01T00:00:00", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20100701_KERNEL_ON_SL5_X.NASL", "href": "https://www.tenable.com/plugins/nessus/60810", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(60810);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-0291\", \"CVE-2010-0622\", \"CVE-2010-1087\", \"CVE-2010-1088\", \"CVE-2010-1173\", \"CVE-2010-1187\", \"CVE-2010-1436\", \"CVE-2010-1437\", \"CVE-2010-1641\");\n\n script_name(english:\"Scientific Linux Security Update : kernel on SL5.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes the following security issues :\n\n - multiple flaws were found in the mmap and mremap\n implementations. A local user could use these flaws to\n cause a local denial of service or escalate their\n privileges. (CVE-2010-0291, Important)\n\n - a NULL pointer dereference flaw was found in the Fast\n Userspace Mutexes (futexes) implementation. The unlock\n code path did not check if the futex value associated\n with pi_state->owner had been modified. A local user\n could use this flaw to modify the futex value, possibly\n leading to a denial of service or privilege escalation\n when the pi_state->owner pointer is dereferenced.\n (CVE-2010-0622, Important)\n\n - a NULL pointer dereference flaw was found in the Linux\n kernel Network File System (NFS) implementation. A local\n user on a system that has an NFS-mounted file system\n could use this flaw to cause a denial of service or\n escalate their privileges on that system.\n (CVE-2010-1087, Important)\n\n - a flaw was found in the sctp_process_unk_param()\n function in the Linux kernel Stream Control Transmission\n Protocol (SCTP) implementation. A remote attacker could\n send a specially crafted SCTP packet to an SCTP\n listening port on a target system, causing a kernel\n panic (denial of service). (CVE-2010-1173, Important)\n\n - a flaw was found in the Linux kernel Transparent\n Inter-Process Communication protocol (TIPC)\n implementation. If a client application, on a local\n system where the tipc module is not yet in network mode,\n attempted to send a message to a remote TIPC node, it\n would dereference a NULL pointer on the local system,\n causing a kernel panic (denial of service).\n (CVE-2010-1187, Important)\n\n - a buffer overflow flaw was found in the Linux kernel\n Global File System 2 (GFS2) implementation. In certain\n cases, a quota could be written past the end of a memory\n page, causing memory corruption, leaving the quota\n stored on disk in an invalid state. A user with write\n access to a GFS2 file system could trigger this flaw to\n cause a kernel crash (denial of service) or escalate\n their privileges on the GFS2 server. This issue can only\n be triggered if the GFS2 file system is mounted with the\n 'quota=on' or 'quota=account' mount option.\n (CVE-2010-1436, Important)\n\n - a race condition between finding a keyring by name and\n destroying a freed keyring was found in the Linux kernel\n key management facility. A local user could use this\n flaw to cause a kernel panic (denial of service) or\n escalate their privileges. (CVE-2010-1437, Important)\n\n - a flaw was found in the link_path_walk() function in the\n Linux kernel. Using the file descriptor returned by the\n open() function with the O_NOFOLLOW flag on a\n subordinate NFS-mounted file system, could result in a\n NULL pointer dereference, causing a denial of service or\n privilege escalation. (CVE-2010-1088, Moderate)\n\n - a missing permission check was found in the\n gfs2_set_flags() function in the Linux kernel GFS2\n implementation. A local user could use this flaw to\n change certain file attributes of files, on a GFS2 file\n system, that they do not own. (CVE-2010-1641, Low)\n\nRed Hat would like to thank Jukka Taimisto and Olli Jarva of\nCodenomicon Ltd, Nokia Siemens Networks, and Wind River on behalf of\ntheir customer, for responsibly reporting CVE-2010-1173; Mario\nMikocevic for responsibly reporting CVE-2010-1436; and Dan Rosenberg\nfor responsibly reporting CVE-2010-1641.\n\nThis update also fixes several bugs.\n\nThe system must be rebooted for this update to take effect.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1007&L=scientific-linux-errata&T=0&P=211\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?fcbf2bfb\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_cwe_id(264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/02/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/07/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL5\", reference:\"kernel-2.6.18-194.8.1.el5\")) flag++;\nif (rpm_check(release:\"SL5\", cpu:\"i386\", reference:\"kernel-PAE-2.6.18-194.8.1.el5\")) flag++;\nif (rpm_check(release:\"SL5\", cpu:\"i386\", reference:\"kernel-PAE-devel-2.6.18-194.8.1.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-debug-2.6.18-194.8.1.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-debug-devel-2.6.18-194.8.1.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-devel-2.6.18-194.8.1.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-doc-2.6.18-194.8.1.el5\")) flag++;\nif (rpm_check(release:\"SL5\", cpu:\"x86_64\", reference:\"kernel-headers-2.6.18-194.8.1.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-module-aufs-2.6.18-194.8.1.el5-0.20090202.cvs-6.sl5\")) flag++;\nif (rpm_check(release:\"SL5\", cpu:\"i386\", reference:\"kernel-module-aufs-2.6.18-194.8.1.el5PAE-0.20090202.cvs-6.sl5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-module-aufs-2.6.18-194.8.1.el5xen-0.20090202.cvs-6.sl5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-module-ndiswrapper-2.6.18-194.8.1.el5-1.55-1.SL\")) flag++;\nif (rpm_check(release:\"SL5\", cpu:\"i386\", reference:\"kernel-module-ndiswrapper-2.6.18-194.8.1.el5PAE-1.55-1.SL\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-module-ndiswrapper-2.6.18-194.8.1.el5xen-1.55-1.SL\")) flag++;\nif (rpm_check(release:\"SL5\", cpu:\"i386\", reference:\"kernel-module-xfs-2.6.18-194.8.1.el5-0.4-2.sl5\")) flag++;\nif (rpm_check(release:\"SL5\", cpu:\"i386\", reference:\"kernel-module-xfs-2.6.18-194.8.1.el5PAE-0.4-2.sl5\")) flag++;\nif (rpm_check(release:\"SL5\", cpu:\"i386\", reference:\"kernel-module-xfs-2.6.18-194.8.1.el5xen-0.4-2.sl5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-xen-2.6.18-194.8.1.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-xen-devel-2.6.18-194.8.1.el5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T13:08:00", "description": "Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n* multiple flaws were found in the mmap and mremap implementations. A\nlocal user could use these flaws to cause a local denial of service or\nescalate their privileges. (CVE-2010-0291, Important)\n\n* a NULL pointer dereference flaw was found in the Fast Userspace\nMutexes (futexes) implementation. The unlock code path did not check\nif the futex value associated with pi_state->owner had been modified.\nA local user could use this flaw to modify the futex value, possibly\nleading to a denial of service or privilege escalation when the\npi_state->owner pointer is dereferenced. (CVE-2010-0622, Important)\n\n* a NULL pointer dereference flaw was found in the Linux kernel\nNetwork File System (NFS) implementation. A local user on a system\nthat has an NFS-mounted file system could use this flaw to cause a\ndenial of service or escalate their privileges on that system.\n(CVE-2010-1087, Important)\n\n* a flaw was found in the sctp_process_unk_param() function in the\nLinux kernel Stream Control Transmission Protocol (SCTP)\nimplementation. A remote attacker could send a specially crafted SCTP\npacket to an SCTP listening port on a target system, causing a kernel\npanic (denial of service). (CVE-2010-1173, Important)\n\n* a flaw was found in the Linux kernel Transparent Inter-Process\nCommunication protocol (TIPC) implementation. If a client application,\non a local system where the tipc module is not yet in network mode,\nattempted to send a message to a remote TIPC node, it would\ndereference a NULL pointer on the local system, causing a kernel panic\n(denial of service). (CVE-2010-1187, Important)\n\n* a buffer overflow flaw was found in the Linux kernel Global File\nSystem 2 (GFS2) implementation. In certain cases, a quota could be\nwritten past the end of a memory page, causing memory corruption,\nleaving the quota stored on disk in an invalid state. A user with\nwrite access to a GFS2 file system could trigger this flaw to cause a\nkernel crash (denial of service) or escalate their privileges on the\nGFS2 server. This issue can only be triggered if the GFS2 file system\nis mounted with the 'quota=on' or 'quota=account' mount option.\n(CVE-2010-1436, Important)\n\n* a race condition between finding a keyring by name and destroying a\nfreed keyring was found in the Linux kernel key management facility. A\nlocal user could use this flaw to cause a kernel panic (denial of\nservice) or escalate their privileges. (CVE-2010-1437, Important)\n\n* a flaw was found in the link_path_walk() function in the Linux\nkernel. Using the file descriptor returned by the open() function with\nthe O_NOFOLLOW flag on a subordinate NFS-mounted file system, could\nresult in a NULL pointer dereference, causing a denial of service or\nprivilege escalation. (CVE-2010-1088, Moderate)\n\n* a missing permission check was found in the gfs2_set_flags()\nfunction in the Linux kernel GFS2 implementation. A local user could\nuse this flaw to change certain file attributes of files, on a GFS2\nfile system, that they do not own. (CVE-2010-1641, Low)\n\nRed Hat would like to thank Jukka Taimisto and Olli Jarva of\nCodenomicon Ltd, Nokia Siemens Networks, and Wind River on behalf of\ntheir customer, for responsibly reporting CVE-2010-1173; Mario\nMikocevic for responsibly reporting CVE-2010-1436; and Dan Rosenberg\nfor responsibly reporting CVE-2010-1641.\n\nThis update also fixes several bugs. Documentation for these bug fixes\nwill be available shortly from\nhttp://www.redhat.com/docs/en-US/errata/RHSA-2010-0504/Kernel_Security\n_Update/ index.html\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues. The system must be\nrebooted for this update to take effect.", "edition": 30, "published": "2010-07-28T00:00:00", "title": "RHEL 5 : kernel (RHSA-2010:0504)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1641", "CVE-2010-1437", "CVE-2010-1187", "CVE-2010-0291", "CVE-2010-0622", "CVE-2010-1436", "CVE-2010-1173", "CVE-2010-1088", "CVE-2010-1087"], "modified": "2010-07-28T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:kernel-kdump", "cpe:/o:redhat:enterprise_linux:5", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-PAE-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:kernel-xen", "p-cpe:/a:redhat:enterprise_linux:kernel-PAE", "p-cpe:/a:redhat:enterprise_linux:kernel-xen-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-doc"], "id": "REDHAT-RHSA-2010-0504.NASL", "href": "https://www.tenable.com/plugins/nessus/47870", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2010:0504. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(47870);\n script_version(\"1.27\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-0291\", \"CVE-2010-0622\", \"CVE-2010-1087\", \"CVE-2010-1088\", \"CVE-2010-1173\", \"CVE-2010-1187\", \"CVE-2010-1436\", \"CVE-2010-1437\", \"CVE-2010-1641\");\n script_bugtraq_id(37906, 38165, 39044, 39120, 39569, 39719, 39794, 40356);\n script_xref(name:\"RHSA\", value:\"2010:0504\");\n\n script_name(english:\"RHEL 5 : kernel (RHSA-2010:0504)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n* multiple flaws were found in the mmap and mremap implementations. A\nlocal user could use these flaws to cause a local denial of service or\nescalate their privileges. (CVE-2010-0291, Important)\n\n* a NULL pointer dereference flaw was found in the Fast Userspace\nMutexes (futexes) implementation. The unlock code path did not check\nif the futex value associated with pi_state->owner had been modified.\nA local user could use this flaw to modify the futex value, possibly\nleading to a denial of service or privilege escalation when the\npi_state->owner pointer is dereferenced. (CVE-2010-0622, Important)\n\n* a NULL pointer dereference flaw was found in the Linux kernel\nNetwork File System (NFS) implementation. A local user on a system\nthat has an NFS-mounted file system could use this flaw to cause a\ndenial of service or escalate their privileges on that system.\n(CVE-2010-1087, Important)\n\n* a flaw was found in the sctp_process_unk_param() function in the\nLinux kernel Stream Control Transmission Protocol (SCTP)\nimplementation. A remote attacker could send a specially crafted SCTP\npacket to an SCTP listening port on a target system, causing a kernel\npanic (denial of service). (CVE-2010-1173, Important)\n\n* a flaw was found in the Linux kernel Transparent Inter-Process\nCommunication protocol (TIPC) implementation. If a client application,\non a local system where the tipc module is not yet in network mode,\nattempted to send a message to a remote TIPC node, it would\ndereference a NULL pointer on the local system, causing a kernel panic\n(denial of service). (CVE-2010-1187, Important)\n\n* a buffer overflow flaw was found in the Linux kernel Global File\nSystem 2 (GFS2) implementation. In certain cases, a quota could be\nwritten past the end of a memory page, causing memory corruption,\nleaving the quota stored on disk in an invalid state. A user with\nwrite access to a GFS2 file system could trigger this flaw to cause a\nkernel crash (denial of service) or escalate their privileges on the\nGFS2 server. This issue can only be triggered if the GFS2 file system\nis mounted with the 'quota=on' or 'quota=account' mount option.\n(CVE-2010-1436, Important)\n\n* a race condition between finding a keyring by name and destroying a\nfreed keyring was found in the Linux kernel key management facility. A\nlocal user could use this flaw to cause a kernel panic (denial of\nservice) or escalate their privileges. (CVE-2010-1437, Important)\n\n* a flaw was found in the link_path_walk() function in the Linux\nkernel. Using the file descriptor returned by the open() function with\nthe O_NOFOLLOW flag on a subordinate NFS-mounted file system, could\nresult in a NULL pointer dereference, causing a denial of service or\nprivilege escalation. (CVE-2010-1088, Moderate)\n\n* a missing permission check was found in the gfs2_set_flags()\nfunction in the Linux kernel GFS2 implementation. A local user could\nuse this flaw to change certain file attributes of files, on a GFS2\nfile system, that they do not own. (CVE-2010-1641, Low)\n\nRed Hat would like to thank Jukka Taimisto and Olli Jarva of\nCodenomicon Ltd, Nokia Siemens Networks, and Wind River on behalf of\ntheir customer, for responsibly reporting CVE-2010-1173; Mario\nMikocevic for responsibly reporting CVE-2010-1436; and Dan Rosenberg\nfor responsibly reporting CVE-2010-1641.\n\nThis update also fixes several bugs. Documentation for these bug fixes\nwill be available shortly from\nhttp://www.redhat.com/docs/en-US/errata/RHSA-2010-0504/Kernel_Security\n_Update/ index.html\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues. The system must be\nrebooted for this update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-0291\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-0622\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-1087\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-1088\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-1173\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-1187\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-1436\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-1437\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-1641\"\n );\n # http://kbase.redhat.com/faq/docs/DOC-31052\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/solutions/31042\"\n );\n # http://www.redhat.com/docs/en-US/errata/RHSA-2010-0504/Kernel_Security_Update/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?8d170822\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2010:0504\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:ND\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_cwe_id(264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-PAE\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-PAE-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/02/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/07/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/07/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 5.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2010-0291\", \"CVE-2010-0622\", \"CVE-2010-1087\", \"CVE-2010-1088\", \"CVE-2010-1173\", \"CVE-2010-1187\", \"CVE-2010-1436\", \"CVE-2010-1437\", \"CVE-2010-1641\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2010:0504\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2010:0504\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-2.6.18-194.8.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-2.6.18-194.8.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-2.6.18-194.8.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-PAE-2.6.18-194.8.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-PAE-devel-2.6.18-194.8.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-debug-2.6.18-194.8.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-debug-2.6.18-194.8.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-debug-2.6.18-194.8.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-debug-devel-2.6.18-194.8.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-debug-devel-2.6.18-194.8.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-debug-devel-2.6.18-194.8.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-devel-2.6.18-194.8.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-devel-2.6.18-194.8.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-devel-2.6.18-194.8.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", reference:\"kernel-doc-2.6.18-194.8.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"kernel-headers-2.6.18-194.8.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-headers-2.6.18-194.8.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-headers-2.6.18-194.8.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-kdump-2.6.18-194.8.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-kdump-devel-2.6.18-194.8.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-xen-2.6.18-194.8.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-xen-2.6.18-194.8.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-xen-devel-2.6.18-194.8.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-xen-devel-2.6.18-194.8.1.el5\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-PAE / kernel-PAE-devel / kernel-debug / etc\");\n }\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-07T15:20:26", "description": "a. Service Console OS update for COS kernel\n\n This patch updates the service console kernel to fix multiple\n security issues.\n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the names CVE-2010-0415, CVE-2010-0307,\n CVE-2010-0291, CVE-2010-0622, CVE-2010-1087, CVE-2010-1437, and\n CVE-2010-1088 to these issues.\n\nb. Likewise package updates\n\n Updates to the likewisekrb5, likewiseopenldap, likewiseopen,\n and pamkrb5 packages address several security issues.\n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the names CVE-2009-0844, CVE-2009-0845,\n CVE-2009-0846, CVE-2009-4212, and CVE-2010-1321 to these issues.", "edition": 25, "published": "2010-11-16T00:00:00", "title": "VMSA-2010-0016 : VMware ESXi and ESX third-party updates for Service Console and Likewise components", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0307", "CVE-2009-0844", "CVE-2010-1437", "CVE-2009-0846", "CVE-2010-0291", "CVE-2010-0415", "CVE-2010-1321", "CVE-2010-0622", "CVE-2010-1088", "CVE-2009-4212", "CVE-2010-1087", "CVE-2009-0845"], "modified": "2010-11-16T00:00:00", "cpe": ["cpe:/o:vmware:esx:4.1", "cpe:/o:vmware:esx:4.0", "cpe:/o:vmware:esxi:4.1"], "id": "VMWARE_VMSA-2010-0016.NASL", "href": "https://www.tenable.com/plugins/nessus/50611", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from VMware Security Advisory 2010-0016. \n# The text itself is copyright (C) VMware Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(50611);\n script_version(\"1.23\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2009-0844\", \"CVE-2009-0845\", \"CVE-2009-0846\", \"CVE-2009-4212\", \"CVE-2010-0291\", \"CVE-2010-0307\", \"CVE-2010-0415\", \"CVE-2010-0622\", \"CVE-2010-1087\", \"CVE-2010-1088\", \"CVE-2010-1321\", \"CVE-2010-1437\");\n script_bugtraq_id(26070, 27006, 27703, 27706, 29502, 30494, 30496, 34257, 34408, 34409, 35193, 35196, 35263, 35416, 37749, 37906, 38027, 38144, 38165, 39044, 39569, 39719, 40235);\n script_xref(name:\"VMSA\", value:\"2010-0016\");\n\n script_name(english:\"VMSA-2010-0016 : VMware ESXi and ESX third-party updates for Service Console and Likewise components\");\n script_summary(english:\"Checks esxupdate output for the patches\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote VMware ESXi / ESX host is missing one or more\nsecurity-related patches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"a. Service Console OS update for COS kernel\n\n This patch updates the service console kernel to fix multiple\n security issues.\n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the names CVE-2010-0415, CVE-2010-0307,\n CVE-2010-0291, CVE-2010-0622, CVE-2010-1087, CVE-2010-1437, and\n CVE-2010-1088 to these issues.\n\nb. Likewise package updates\n\n Updates to the likewisekrb5, likewiseopenldap, likewiseopen,\n and pamkrb5 packages address several security issues.\n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the names CVE-2009-0844, CVE-2009-0845,\n CVE-2009-0846, CVE-2009-4212, and CVE-2010-1321 to these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://lists.vmware.com/pipermail/security-announce/2011/000116.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply the missing patches.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_cwe_id(20, 119, 189, 264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:vmware:esx:4.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:vmware:esx:4.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:vmware:esxi:4.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/11/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/11/16\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"VMware ESX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/VMware/release\", \"Host/VMware/version\");\n script_require_ports(\"Host/VMware/esxupdate\", \"Host/VMware/esxcli_software_vibs\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"vmware_esx_packages.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/VMware/release\")) audit(AUDIT_OS_NOT, \"VMware ESX / ESXi\");\nif (\n !get_kb_item(\"Host/VMware/esxcli_software_vibs\") &&\n !get_kb_item(\"Host/VMware/esxupdate\")\n) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ninit_esx_check(date:\"2010-11-15\");\nflag = 0;\n\n\nif (\n esx_check(\n ver : \"ESX 4.0\",\n patch : \"ESX400-201101401-SG\",\n patch_updates : make_list(\"ESX400-201103401-SG\", \"ESX400-201104401-SG\", \"ESX400-201110401-SG\", \"ESX400-201111201-SG\", \"ESX400-201203401-SG\", \"ESX400-201205401-SG\", \"ESX400-201206401-SG\", \"ESX400-201209401-SG\", \"ESX400-201302401-SG\", \"ESX400-201305401-SG\", \"ESX400-201310401-SG\", \"ESX400-201404401-SG\", \"ESX400-Update03\", \"ESX400-Update04\")\n )\n) flag++;\n\nif (\n esx_check(\n ver : \"ESX 4.1\",\n patch : \"ESX410-201010401-SG\",\n patch_updates : make_list(\"ESX40-TO-ESX41UPDATE01\", \"ESX410-201011402-SG\", \"ESX410-201101201-SG\", \"ESX410-201104401-SG\", \"ESX410-201110201-SG\", \"ESX410-201201401-SG\", \"ESX410-201204401-SG\", \"ESX410-201205401-SG\", \"ESX410-201206401-SG\", \"ESX410-201208101-SG\", \"ESX410-201211401-SG\", \"ESX410-201301401-SG\", \"ESX410-201304401-SG\", \"ESX410-201307401-SG\", \"ESX410-201312401-SG\", \"ESX410-201404401-SG\", \"ESX410-Update01\", \"ESX410-Update02\", \"ESX410-Update03\")\n )\n) flag++;\nif (\n esx_check(\n ver : \"ESX 4.1\",\n patch : \"ESX410-201010419-SG\",\n patch_updates : make_list(\"ESX40-TO-ESX41UPDATE01\", \"ESX410-Update01\", \"ESX410-Update02\", \"ESX410-Update03\")\n )\n) flag++;\n\nif (\n esx_check(\n ver : \"ESXi 4.1\",\n patch : \"ESXi410-201010401-SG\",\n patch_updates : make_list(\"ESXi410-201101201-SG\", \"ESXi410-201104401-SG\", \"ESXi410-201110201-SG\", \"ESXi410-201201401-SG\", \"ESXi410-201204401-SG\", \"ESXi410-201205401-SG\", \"ESXi410-201206401-SG\", \"ESXi410-201208101-SG\", \"ESXi410-201211401-SG\", \"ESXi410-201301401-SG\", \"ESXi410-201304401-SG\", \"ESXi410-201307401-SG\", \"ESXi410-201312401-SG\", \"ESXi410-201404401-SG\", \"ESXi410-Update01\", \"ESXi410-Update02\", \"ESXi410-Update03\")\n )\n) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:esx_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T14:02:31", "description": "This update fixes various security issues and some bugs in the SUSE\nLinux Enterprise 9 kernel.\n\nThe following security issues were fixed :\n\n - A crafted NFS write request might have caused a buffer\n overwrite, potentially causing a kernel crash.\n (CVE-2010-2521)\n\n - The x86_64 copy_to_user implementation might have leaked\n kernel memory depending on specific user buffer setups.\n (CVE-2008-0598)\n\n - drivers/net/r8169.c in the r8169 driver in the Linux\n kernel did not properly check the size of an Ethernet\n frame that exceeds the MTU, which allows remote\n attackers to (1) cause a denial of service (temporary\n network outage) via a packet with a crafted size, in\n conjunction with certain packets containing A characters\n and certain packets containing E characters; or (2)\n cause a denial of service (system crash) via a packet\n with a crafted size, in conjunction with certain packets\n containing '\\0' characters, related to the value of the\n status register and erroneous behavior associated with\n the RxMaxSize register. NOTE: this vulnerability exists\n because of an incorrect fix for CVE-2009-1389.\n (CVE-2009-4537)\n\n - Use-after-free vulnerability in net/ipv4/tcp_input.c in\n the Linux kernel 2.6 when IPV6_RECVPKTINFO is set on a\n listening socket, allowed remote attackers to cause a\n denial of service (kernel panic) via a SYN packet while\n the socket is in a listening (TCP_LISTEN) state, which\n is not properly handled causes the skb structure to be\n freed. (CVE-2010-1188)\n\n - The (1) real_lookup and (2) __lookup_hash functions in\n fs/namei.c in the vfs implementation in the Linux kernel\n did not prevent creation of a child dentry for a deleted\n (aka S_DEAD) directory, which allowed local users to\n cause a denial of service ('overflow' of the UBIFS\n orphan area) via a series of attempted file creations\n within deleted directories. (CVE-2008-3275)\n\n - The nfs_lock function in fs/nfs/file.c in the Linux\n kernel did not properly remove POSIX locks on files that\n are setgid without group-execute permission, which\n allows local users to cause a denial of service (BUG and\n system crash) by locking a file on an NFS filesystem and\n then changing this files permissions, a related issue to\n CVE-2010-0727. (CVE-2007-6733)\n\n - The do_coredump function in fs/exec.c in Linux kernel\n did not change the UID of a core dump file if it exists\n before a root process creates a core dump in the same\n location, which might have allowed local users to obtain\n sensitive information. (CVE-2007-6206)\n\n - fs/namei.c in the Linux kernel did not always follow NFS\n automount 'symlinks,' which allowed attackers to have an\n unknown impact, related to LOOKUP_FOLLOW.\n (CVE-2010-1088)\n\n - Stack-based buffer overflow in the hfs subsystem in the\n Linux kernel allowed remote attackers to have an\n unspecified impact via a crafted Hierarchical File\n System (HFS) filesystem, related to the hfs_readdir\n function in fs/hfs/dir.c. (CVE-2009-4020)\n\n - The processcompl_compat function in\n drivers/usb/core/devio.c in Linux kernel did not clear\n the transfer buffer before returning to userspace when a\n USB command fails, which might have made it easier for\n physically proximate attackers to obtain sensitive\n information (kernel memory). (CVE-2010-1083)", "edition": 26, "published": "2010-08-27T00:00:00", "title": "SuSE9 Security Update : Linux kernel (YOU Patch Number 12636)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4537", "CVE-2010-2521", "CVE-2008-0598", "CVE-2010-0727", "CVE-2007-6733", "CVE-2009-4020", "CVE-2010-1083", "CVE-2007-6206", "CVE-2010-1188", "CVE-2009-1389", "CVE-2008-3275", "CVE-2010-1088"], "modified": "2010-08-27T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE9_12636.NASL", "href": "https://www.tenable.com/plugins/nessus/48901", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(48901);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-6206\", \"CVE-2007-6733\", \"CVE-2008-0598\", \"CVE-2008-3275\", \"CVE-2009-1389\", \"CVE-2009-4020\", \"CVE-2009-4537\", \"CVE-2010-0727\", \"CVE-2010-1083\", \"CVE-2010-1088\", \"CVE-2010-1188\", \"CVE-2010-2521\");\n\n script_name(english:\"SuSE9 Security Update : Linux kernel (YOU Patch Number 12636)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 9 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes various security issues and some bugs in the SUSE\nLinux Enterprise 9 kernel.\n\nThe following security issues were fixed :\n\n - A crafted NFS write request might have caused a buffer\n overwrite, potentially causing a kernel crash.\n (CVE-2010-2521)\n\n - The x86_64 copy_to_user implementation might have leaked\n kernel memory depending on specific user buffer setups.\n (CVE-2008-0598)\n\n - drivers/net/r8169.c in the r8169 driver in the Linux\n kernel did not properly check the size of an Ethernet\n frame that exceeds the MTU, which allows remote\n attackers to (1) cause a denial of service (temporary\n network outage) via a packet with a crafted size, in\n conjunction with certain packets containing A characters\n and certain packets containing E characters; or (2)\n cause a denial of service (system crash) via a packet\n with a crafted size, in conjunction with certain packets\n containing '\\0' characters, related to the value of the\n status register and erroneous behavior associated with\n the RxMaxSize register. NOTE: this vulnerability exists\n because of an incorrect fix for CVE-2009-1389.\n (CVE-2009-4537)\n\n - Use-after-free vulnerability in net/ipv4/tcp_input.c in\n the Linux kernel 2.6 when IPV6_RECVPKTINFO is set on a\n listening socket, allowed remote attackers to cause a\n denial of service (kernel panic) via a SYN packet while\n the socket is in a listening (TCP_LISTEN) state, which\n is not properly handled causes the skb structure to be\n freed. (CVE-2010-1188)\n\n - The (1) real_lookup and (2) __lookup_hash functions in\n fs/namei.c in the vfs implementation in the Linux kernel\n did not prevent creation of a child dentry for a deleted\n (aka S_DEAD) directory, which allowed local users to\n cause a denial of service ('overflow' of the UBIFS\n orphan area) via a series of attempted file creations\n within deleted directories. (CVE-2008-3275)\n\n - The nfs_lock function in fs/nfs/file.c in the Linux\n kernel did not properly remove POSIX locks on files that\n are setgid without group-execute permission, which\n allows local users to cause a denial of service (BUG and\n system crash) by locking a file on an NFS filesystem and\n then changing this files permissions, a related issue to\n CVE-2010-0727. (CVE-2007-6733)\n\n - The do_coredump function in fs/exec.c in Linux kernel\n did not change the UID of a core dump file if it exists\n before a root process creates a core dump in the same\n location, which might have allowed local users to obtain\n sensitive information. (CVE-2007-6206)\n\n - fs/namei.c in the Linux kernel did not always follow NFS\n automount 'symlinks,' which allowed attackers to have an\n unknown impact, related to LOOKUP_FOLLOW.\n (CVE-2010-1088)\n\n - Stack-based buffer overflow in the hfs subsystem in the\n Linux kernel allowed remote attackers to have an\n unspecified impact via a crafted Hierarchical File\n System (HFS) filesystem, related to the hfs_readdir\n function in fs/hfs/dir.c. (CVE-2009-4020)\n\n - The processcompl_compat function in\n drivers/usb/core/devio.c in Linux kernel did not clear\n the transfer buffer before returning to userspace when a\n USB command fails, which might have made it easier for\n physically proximate attackers to obtain sensitive\n information (kernel memory). (CVE-2010-1083)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-6206.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2007-6733/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-0598.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3275.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-1389.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-4020.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-4537.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2010-0727/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-1083.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-1088.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2010-1188/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-2521.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply YOU patch number 12636.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(16, 20, 119, 200, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/08/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/08/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 9 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SUSE9\", cpu:\"i586\", reference:\"kernel-bigsmp-2.6.5-7.323\")) flag++;\nif (rpm_check(release:\"SUSE9\", cpu:\"i586\", reference:\"kernel-debug-2.6.5-7.323\")) flag++;\nif (rpm_check(release:\"SUSE9\", cpu:\"i586\", reference:\"kernel-default-2.6.5-7.323\")) flag++;\nif (rpm_check(release:\"SUSE9\", cpu:\"i586\", reference:\"kernel-smp-2.6.5-7.323\")) flag++;\nif (rpm_check(release:\"SUSE9\", cpu:\"i586\", reference:\"kernel-source-2.6.5-7.323\")) flag++;\nif (rpm_check(release:\"SUSE9\", cpu:\"i586\", reference:\"kernel-syms-2.6.5-7.323\")) flag++;\nif (rpm_check(release:\"SUSE9\", cpu:\"i586\", reference:\"kernel-um-2.6.5-7.323\")) flag++;\nif (rpm_check(release:\"SUSE9\", cpu:\"i586\", reference:\"kernel-xen-2.6.5-7.323\")) flag++;\nif (rpm_check(release:\"SUSE9\", cpu:\"i586\", reference:\"kernel-xenpae-2.6.5-7.323\")) flag++;\nif (rpm_check(release:\"SUSE9\", cpu:\"i586\", reference:\"um-host-install-initrd-1.0-48.36\")) flag++;\nif (rpm_check(release:\"SUSE9\", cpu:\"i586\", reference:\"um-host-kernel-2.6.5-7.323\")) flag++;\nif (rpm_check(release:\"SUSE9\", cpu:\"i586\", reference:\"xen-kmp-3.0.4_2.6.5_7.323-0.2\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:45:59", "description": "Several vulnerabilities have been discovered in the Linux kernel that\nmay lead to a denial of service or privilege escalation. The Common\nVulnerabilities and Exposures project identifies the following\nproblems :\n\n - CVE-2009-4537\n Fabian Yamaguchi reported a missing check for Ethernet\n frames larger than the MTU in the r8169 driver. This may\n allow users on the local network to crash a system,\n resulting in a denial of service.\n\n - CVE-2010-0727\n Sachin Prabhu reported an issue in the GFS2 filesystem.\n Local users can trigger a BUG() altering the permissions\n on a locked file, resulting in a denial of service.\n\n - CVE-2010-1083\n Linus Torvalds reported an issue in the USB subsystem,\n which may allow local users to obtain portions of\n sensitive kernel memory.\n\n - CVE-2010-1084\n Neil Brown reported an issue in the Bluetooth subsystem\n that may permit remote attackers to overwrite memory\n through the creation of large numbers of sockets,\n resulting in a denial of service.\n\n - CVE-2010-1086\n Ang Way Chuang reported an issue in the DVB subsystem\n for Digital TV adapters. By creating a specially-encoded\n MPEG2-TS frame, a remote attacker could cause the\n receiver to enter an endless loop, resulting in a denial\n of service.\n\n - CVE-2010-1087\n Trond Myklebust reported an issue in the NFS filesystem.\n A local user may cause an oops by sending a fatal signal\n during a file truncation operation, resulting in a\n denial of service.\n\n - CVE-2010-1088\n Al Viro reported an issue where automount symlinks may\n not be followed when LOOKUP_FOLLOW is not set. This has\n an unknown security impact.\n\n - CVE-2010-1162\n Catalin Marinas reported an issue in the tty subsystem\n that allows local attackers to cause a kernel memory\n leak, possibly resulting in a denial of service.\n\n - CVE-2010-1173\n Chris Guo from Nokia China and Jukka Taimisto and Olli\n Jarva from Codenomicon Ltd reported an issue in the SCTP\n subsystem that allows a remote attacker to cause a\n denial of service using a malformed init package.\n\n - CVE-2010-1187\n Neil Hormon reported an issue in the TIPC subsystem.\n Local users can cause a denial of service by way of a\n NULL pointer dereference by sending datagrams through\n AF_TIPC before entering network mode.\n\n - CVE-2010-1437\n Toshiyuki Okajima reported a race condition in the\n keyring subsystem. Local users can cause memory\n corruption via keyctl commands that access a keyring in\n the process of being deleted, resulting in a denial of\n service.\n\n - CVE-2010-1446\n Wufei reported an issue with kgdb on the PowerPC\n architecture, allowing local users to write to kernel\n memory. Note: this issue does not affect binary kernels\n provided by Debian. The fix is provided for the benefit\n of users who build their own kernels from Debian source.\n\n - CVE-2010-1451\n Brad Spengler reported an issue on the SPARC\n architecture that allows local users to execute\n non-executable pages.\n\nThis update also includes fixes a regression introduced by a previous\nupdate. See the referenced Debian bug page for details.", "edition": 26, "published": "2010-05-26T00:00:00", "title": "Debian DSA-2053-1 : linux-2.6 - privilege escalation/denial of service/information leak", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-1451", "CVE-2009-4537", "CVE-2010-1437", "CVE-2010-0727", "CVE-2010-1187", "CVE-2010-1162", "CVE-2010-1084", "CVE-2010-1446", "CVE-2010-1083", "CVE-2010-1086", "CVE-2010-1173", "CVE-2010-1088", "CVE-2010-1087"], "modified": "2010-05-26T00:00:00", "cpe": ["cpe:/o:debian:debian_linux:5.0", "p-cpe:/a:debian:debian_linux:linux-2.6"], "id": "DEBIAN_DSA-2053.NASL", "href": "https://www.tenable.com/plugins/nessus/46725", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-2053. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(46725);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2009-4537\", \"CVE-2010-0727\", \"CVE-2010-1083\", \"CVE-2010-1084\", \"CVE-2010-1086\", \"CVE-2010-1087\", \"CVE-2010-1088\", \"CVE-2010-1162\", \"CVE-2010-1173\", \"CVE-2010-1187\", \"CVE-2010-1437\", \"CVE-2010-1446\", \"CVE-2010-1451\");\n script_bugtraq_id(37521, 38393, 38479, 38898, 39042, 39044, 39101, 39120, 39480, 39569, 39719, 39794, 39798);\n script_xref(name:\"DSA\", value:\"2053\");\n\n script_name(english:\"Debian DSA-2053-1 : linux-2.6 - privilege escalation/denial of service/information leak\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been discovered in the Linux kernel that\nmay lead to a denial of service or privilege escalation. The Common\nVulnerabilities and Exposures project identifies the following\nproblems :\n\n - CVE-2009-4537\n Fabian Yamaguchi reported a missing check for Ethernet\n frames larger than the MTU in the r8169 driver. This may\n allow users on the local network to crash a system,\n resulting in a denial of service.\n\n - CVE-2010-0727\n Sachin Prabhu reported an issue in the GFS2 filesystem.\n Local users can trigger a BUG() altering the permissions\n on a locked file, resulting in a denial of service.\n\n - CVE-2010-1083\n Linus Torvalds reported an issue in the USB subsystem,\n which may allow local users to obtain portions of\n sensitive kernel memory.\n\n - CVE-2010-1084\n Neil Brown reported an issue in the Bluetooth subsystem\n that may permit remote attackers to overwrite memory\n through the creation of large numbers of sockets,\n resulting in a denial of service.\n\n - CVE-2010-1086\n Ang Way Chuang reported an issue in the DVB subsystem\n for Digital TV adapters. By creating a specially-encoded\n MPEG2-TS frame, a remote attacker could cause the\n receiver to enter an endless loop, resulting in a denial\n of service.\n\n - CVE-2010-1087\n Trond Myklebust reported an issue in the NFS filesystem.\n A local user may cause an oops by sending a fatal signal\n during a file truncation operation, resulting in a\n denial of service.\n\n - CVE-2010-1088\n Al Viro reported an issue where automount symlinks may\n not be followed when LOOKUP_FOLLOW is not set. This has\n an unknown security impact.\n\n - CVE-2010-1162\n Catalin Marinas reported an issue in the tty subsystem\n that allows local attackers to cause a kernel memory\n leak, possibly resulting in a denial of service.\n\n - CVE-2010-1173\n Chris Guo from Nokia China and Jukka Taimisto and Olli\n Jarva from Codenomicon Ltd reported an issue in the SCTP\n subsystem that allows a remote attacker to cause a\n denial of service using a malformed init package.\n\n - CVE-2010-1187\n Neil Hormon reported an issue in the TIPC subsystem.\n Local users can cause a denial of service by way of a\n NULL pointer dereference by sending datagrams through\n AF_TIPC before entering network mode.\n\n - CVE-2010-1437\n Toshiyuki Okajima reported a race condition in the\n keyring subsystem. Local users can cause memory\n corruption via keyctl commands that access a keyring in\n the process of being deleted, resulting in a denial of\n service.\n\n - CVE-2010-1446\n Wufei reported an issue with kgdb on the PowerPC\n architecture, allowing local users to write to kernel\n memory. Note: this issue does not affect binary kernels\n provided by Debian. The fix is provided for the benefit\n of users who build their own kernels from Debian source.\n\n - CVE-2010-1451\n Brad Spengler reported an issue on the SPARC\n architecture that allows local users to execute\n non-executable pages.\n\nThis update also includes fixes a regression introduced by a previous\nupdate. See the referenced Debian bug page for details.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=573071\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2009-4537\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-0727\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-1083\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-1084\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-1086\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-1087\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-1088\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-1162\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-1173\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-1187\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-1437\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-1446\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-1451\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2010/dsa-2053\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the linux-2.6 and user-mode-linux packages.\n\nFor the stable distribution (lenny), these problems have been fixed in\nversion 2.6.26-22lenny1.\n\nThe user-mode-linux source package was additional rebuilt for\ncompatibility to take advantage of this update. The updated version of\nthe package is 2.6.26-1um-2+22lenny1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:5.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/01/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/05/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/05/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"5.0\", prefix:\"linux-doc-2.6.26\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-486\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-4kc-malta\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-5kc-malta\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-686\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-686-bigmem\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-all\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-all-alpha\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-all-amd64\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-all-arm\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-all-armel\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-all-hppa\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-all-i386\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-all-ia64\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-all-mips\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-all-mipsel\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-all-powerpc\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-all-s390\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-all-sparc\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-alpha-generic\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-alpha-legacy\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-alpha-smp\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-amd64\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-common\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-common-openvz\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-common-vserver\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-common-xen\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-footbridge\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-iop32x\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-itanium\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-ixp4xx\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-mckinley\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-openvz-686\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-openvz-amd64\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-orion5x\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-parisc\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-parisc-smp\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-parisc64\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-parisc64-smp\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-powerpc\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-powerpc-smp\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-powerpc64\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-r4k-ip22\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-r5k-cobalt\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-r5k-ip32\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-s390\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-s390x\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-sb1-bcm91250a\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-sb1a-bcm91480b\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-sparc64\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-sparc64-smp\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-versatile\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-vserver-686\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-vserver-686-bigmem\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-vserver-amd64\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-vserver-itanium\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-vserver-mckinley\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-vserver-powerpc\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-vserver-powerpc64\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-vserver-s390x\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-vserver-sparc64\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-xen-686\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-headers-2.6.26-2-xen-amd64\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-486\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-4kc-malta\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-5kc-malta\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-686\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-686-bigmem\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-alpha-generic\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-alpha-legacy\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-alpha-smp\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-amd64\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-footbridge\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-iop32x\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-itanium\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-ixp4xx\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-mckinley\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-openvz-686\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-openvz-amd64\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-orion5x\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-parisc\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-parisc-smp\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-parisc64\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-parisc64-smp\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-powerpc\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-powerpc-smp\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-powerpc64\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-r4k-ip22\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-r5k-cobalt\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-r5k-ip32\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-s390\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-s390-tape\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-s390x\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-sb1-bcm91250a\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-sb1a-bcm91480b\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-sparc64\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-sparc64-smp\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-versatile\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-vserver-686\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-vserver-686-bigmem\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-vserver-amd64\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-vserver-itanium\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-vserver-mckinley\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-vserver-powerpc\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-vserver-powerpc64\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-vserver-s390x\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-vserver-sparc64\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-xen-686\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-image-2.6.26-2-xen-amd64\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-libc-dev\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-manual-2.6.26\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-modules-2.6.26-2-xen-686\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-modules-2.6.26-2-xen-amd64\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-patch-debian-2.6.26\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-source-2.6.26\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-support-2.6.26-2\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"linux-tree-2.6.26\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"xen-linux-system-2.6.26-2-xen-686\", reference:\"2.6.26-22lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"xen-linux-system-2.6.26-2-xen-amd64\", reference:\"2.6.26-22lenny1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "suse": [{"lastseen": "2016-09-04T11:35:14", "bulletinFamily": "unix", "cvelist": ["CVE-2009-3556", "CVE-2010-0410", "CVE-2009-4020", "CVE-2010-1083", "CVE-2010-1086", "CVE-2010-1088"], "description": "This update fixes lots of bugs and some security issues in the SUSE Linux Enterprise 10 SP 3 kernel.\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2010-03-30T11:45:05", "published": "2010-03-30T11:45:05", "href": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00007.html", "id": "SUSE-SA:2010:019", "title": "remote denial of service in kernel", "type": "suse", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:40:04", "bulletinFamily": "unix", "cvelist": ["CVE-2009-4537", "CVE-2010-0410", "CVE-2009-4020", "CVE-2010-1083", "CVE-2010-1086", "CVE-2010-1088"], "description": "This update fixes several security issues and various bugs in the SUSE Linux Enterprise 10 SP 2 kernel. The bugs fixed include a serious data corruption regression in NFSv4 introduced by the previous update.\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2010-05-06T16:28:01", "published": "2010-05-06T16:28:01", "id": "SUSE-SA:2010:023", "href": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00000.html", "title": "remote denial of service in kernel", "type": "suse", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:03:38", "bulletinFamily": "unix", "cvelist": ["CVE-2009-4537", "CVE-2010-2521", "CVE-2008-0598", "CVE-2010-0727", "CVE-2007-6733", "CVE-2009-4020", "CVE-2010-1083", "CVE-2007-6206", "CVE-2010-1188", "CVE-2009-1389", "CVE-2008-3275", "CVE-2010-1088"], "description": "This update fixes various security issues and some bugs in the SUSE Linux Enterprise 9 kernel. Following security issues were fixed: CVE-2010-2521: A crafted NFS write request might have caused a buffer overwrite, potentially causing a kernel crash. CVE-2008-0598: The x86_64 copy_to_user implementation might have leaked kernel memory depending on specific user buffer setups. CVE-2009-4537: drivers/net/r8169.c in the r8169 driver in the Linux kernel did not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing '\\0' characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389. CVE-2010-1188: Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 when IPV6_RECVPKTINFO is set on a listening socket, allowed remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled causes the skb structure to be freed. CVE-2008-3275: The (1) real_lookup and (2) __lookup_hash functions in fs/namei.c in the vfs implementation in the Linux kernel did not prevent creation of a child dentry for a deleted (aka S_DEAD) directory, which allowed local users to cause a denial of service (\"overflow\" of the UBIFS orphan area) via a series of attempted file creations within deleted directories. CVE-2007-6733: The nfs_lock function in fs/nfs/file.c in the Linux kernel did not properly remove POSIX locks on files that are setgid without group-execute permission, which allows local users to cause a denial of service (BUG and system crash) by locking a file on an NFS filesystem and then changing this files permissions, a related issue to CVE-2010-0727. CVE-2007-6206: The do_coredump function in fs/exec.c in Linux kernel did not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which might have allowed local users to obtain sensitive information. CVE-2010-1088: fs/namei.c in the Linux kernel did not always follow NFS automount \"symlinks,\" which allowed attackers to have an unknown impact, related to LOOKUP_FOLLOW. CVE-2009-4020: Stack-based buffer overflow in the hfs subsystem in the Linux kernel allowed remote attackers to have an unspecified impact via a crafted Hierarchical File System (HFS) filesystem, related to the hfs_readdir function in fs/hfs/dir.c. CVE-2010-1083: The processcompl_compat function in drivers/usb/core/devio.c in Linux kernel did not clear the transfer buffer before returning to userspace when a USB command fails, which might have made it easier for physically proximate attackers to obtain sensitive information (kernel memory).\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2010-09-01T13:59:34", "published": "2010-09-01T13:59:34", "id": "SUSE-SA:2010:036", "href": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00001.html", "type": "suse", "title": "remote denial of service in kernel", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "redhat": [{"lastseen": "2019-08-13T18:44:49", "bulletinFamily": "unix", "cvelist": ["CVE-2010-0291", "CVE-2010-0622", "CVE-2010-1087", "CVE-2010-1088", "CVE-2010-1173", "CVE-2010-1187", "CVE-2010-1436", "CVE-2010-1437", "CVE-2010-1641"], "description": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* multiple flaws were found in the mmap and mremap implementations. A local\nuser could use these flaws to cause a local denial of service or escalate\ntheir privileges. (CVE-2010-0291, Important)\n\n* a NULL pointer dereference flaw was found in the Fast Userspace Mutexes\n(futexes) implementation. The unlock code path did not check if the futex\nvalue associated with pi_state->owner had been modified. A local user could\nuse this flaw to modify the futex value, possibly leading to a denial of\nservice or privilege escalation when the pi_state->owner pointer is\ndereferenced. (CVE-2010-0622, Important)\n\n* a NULL pointer dereference flaw was found in the Linux kernel Network\nFile System (NFS) implementation. A local user on a system that has an\nNFS-mounted file system could use this flaw to cause a denial of service or\nescalate their privileges on that system. (CVE-2010-1087, Important)\n\n* a flaw was found in the sctp_process_unk_param() function in the Linux\nkernel Stream Control Transmission Protocol (SCTP) implementation. A remote\nattacker could send a specially-crafted SCTP packet to an SCTP listening\nport on a target system, causing a kernel panic (denial of service).\n(CVE-2010-1173, Important)\n\n* a flaw was found in the Linux kernel Transparent Inter-Process\nCommunication protocol (TIPC) implementation. If a client application, on a\nlocal system where the tipc module is not yet in network mode, attempted to\nsend a message to a remote TIPC node, it would dereference a NULL pointer\non the local system, causing a kernel panic (denial of service).\n(CVE-2010-1187, Important)\n\n* a buffer overflow flaw was found in the Linux kernel Global File System 2\n(GFS2) implementation. In certain cases, a quota could be written past the\nend of a memory page, causing memory corruption, leaving the quota stored\non disk in an invalid state. A user with write access to a GFS2 file system\ncould trigger this flaw to cause a kernel crash (denial of service) or\nescalate their privileges on the GFS2 server. This issue can only be\ntriggered if the GFS2 file system is mounted with the \"quota=on\" or\n\"quota=account\" mount option. (CVE-2010-1436, Important)\n\n* a race condition between finding a keyring by name and destroying a freed\nkeyring was found in the Linux kernel key management facility. A local user\ncould use this flaw to cause a kernel panic (denial of service) or escalate\ntheir privileges. (CVE-2010-1437, Important)\n\n* a flaw was found in the link_path_walk() function in the Linux kernel.\nUsing the file descriptor returned by the open() function with the\nO_NOFOLLOW flag on a subordinate NFS-mounted file system, could result in a\nNULL pointer dereference, causing a denial of service or privilege\nescalation. (CVE-2010-1088, Moderate)\n\n* a missing permission check was found in the gfs2_set_flags() function in\nthe Linux kernel GFS2 implementation. A local user could use this flaw to\nchange certain file attributes of files, on a GFS2 file system, that they\ndo not own. (CVE-2010-1641, Low)\n\nRed Hat would like to thank Jukka Taimisto and Olli Jarva of Codenomicon\nLtd, Nokia Siemens Networks, and Wind River on behalf of their customer,\nfor responsibly reporting CVE-2010-1173; Mario Mikocevic for responsibly\nreporting CVE-2010-1436; and Dan Rosenberg for responsibly reporting\nCVE-2010-1641.\n\nThis update also fixes several bugs. Documentation for these bug fixes will\nbe available shortly from\nhttp://www.redhat.com/docs/en-US/errata/RHSA-2010-0504/Kernel_Security_Update/index.html\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.\n", "modified": "2017-09-08T12:18:11", "published": "2010-07-01T04:00:00", "id": "RHSA-2010:0504", "href": "https://access.redhat.com/errata/RHSA-2010:0504", "type": "redhat", "title": "(RHSA-2010:0504) Important: kernel security and bug fix update", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:46:48", "bulletinFamily": "unix", "cvelist": ["CVE-2008-7256", "CVE-2009-4138", "CVE-2010-1083", "CVE-2010-1084", "CVE-2010-1086", "CVE-2010-1087", "CVE-2010-1088", "CVE-2010-1162", "CVE-2010-1173", "CVE-2010-1437", "CVE-2010-1643", "CVE-2010-2240", "CVE-2010-2248", "CVE-2010-2521"], "description": "These packages contain the Linux kernel, the core of any Linux operating\nsystem.\n\nSecurity fixes:\n\n* unsafe sprintf() use in the Bluetooth implementation. Creating a large\nnumber of Bluetooth L2CAP, SCO, or RFCOMM sockets could result in arbitrary\nmemory pages being overwritten, allowing a local, unprivileged user to\ncause a denial of service or escalate their privileges. (CVE-2010-1084,\nImportant)\n\n* a flaw in the Unidirectional Lightweight Encapsulation implementation,\nallowing a remote attacker to send a specially-crafted ISO MPEG-2 Transport\nStream frame to a target system, resulting in a denial of service.\n(CVE-2010-1086, Important)\n\n* NULL pointer dereference in nfs_wb_page_cancel(), allowing a local user\non a system that has an NFS-mounted file system to cause a denial of\nservice or escalate their privileges on that system. (CVE-2010-1087,\nImportant)\n\n* flaw in sctp_process_unk_param(), allowing a remote attacker to send a\nspecially-crafted SCTP packet to an SCTP listening port on a target system,\ncausing a denial of service. (CVE-2010-1173, Important)\n\n* race condition between finding a keyring by name and destroying a freed\nkeyring in the key management facility, allowing a local, unprivileged\nuser to cause a denial of service or escalate their privileges.\n(CVE-2010-1437, Important)\n\n* systems using the kernel NFS server to export a shared memory file system\nand that have the sysctl overcommit_memory variable set to never overcommit\n(a value of 2; by default, it is set to 0), may experience a NULL pointer\ndereference, allowing a local, unprivileged user to cause a denial of\nservice or escalate their privileges. (CVE-2008-7256, CVE-2010-1643,\nImportant)\n\n* when an application has a stack overflow, the stack could silently\noverwrite another memory mapped area instead of a segmentation fault\noccurring, which could cause an application to execute arbitrary code.\n(CVE-2010-2240, Important)\n\n* flaw in CIFSSMBWrite() could allow a remote attacker to send a\nspecially-crafted SMB response packet to a target CIFS client, resulting in\na denial of service. (CVE-2010-2248, Important)\n\n* buffer overflow flaws in the kernel's implementation of the server-side\nXDR for NFSv4 could allow an attacker on the local network to send a\nspecially-crafted large compound request to the NFSv4 server, possibly\nresulting in a denial of service or code execution. (CVE-2010-2521,\nImportant)\n\n* NULL pointer dereference in the firewire-ohci driver used for OHCI\ncompliant IEEE 1394 controllers could allow a local, unprivileged user with\naccess to /dev/fw* files to issue certain IOCTL calls, causing a denial of\nservice or privilege escalation. The FireWire modules are blacklisted by\ndefault. If enabled, only root has access to the files noted above by\ndefault. (CVE-2009-4138, Moderate)\n\n* flaw in the link_path_walk() function. Using the file descriptor\nreturned by open() with the O_NOFOLLOW flag on a subordinate NFS-mounted\nfile system, could result in a NULL pointer dereference, causing a denial\nof service or privilege escalation. (CVE-2010-1088, Moderate)\n\n* memory leak in release_one_tty() could allow a local, unprivileged user\nto cause a denial of service. (CVE-2010-1162, Moderate)\n\n* information leak in the USB implementation. Certain USB errors could\nresult in an uninitialized kernel buffer being sent to user-space. An\nattacker with physical access to a target system could use this flaw to\ncause an information leak. (CVE-2010-1083, Low)\n\nRed Hat would like to thank Neil Brown for reporting CVE-2010-1084; Ang Way\nChuang for reporting CVE-2010-1086; Jukka Taimisto and Olli Jarva of\nCodenomicon Ltd, Nokia Siemens Networks, and Wind River on behalf of their\ncustomer, for responsibly reporting CVE-2010-1173; the X.Org security team\nfor reporting CVE-2010-2240, with upstream acknowledging Rafal Wojtczuk as\nthe original reporter; and Marcus Meissner for reporting CVE-2010-1083.\n", "modified": "2019-03-22T23:44:12", "published": "2010-08-17T04:00:00", "id": "RHSA-2010:0631", "href": "https://access.redhat.com/errata/RHSA-2010:0631", "type": "redhat", "title": "(RHSA-2010:0631) Important: kernel-rt security and bug fix update", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:36:30", "bulletinFamily": "unix", "cvelist": ["CVE-2010-1641", "CVE-2010-1437", "CVE-2010-1187", "CVE-2010-0291", "CVE-2010-0622", "CVE-2010-1436", "CVE-2010-1173", "CVE-2010-1088", "CVE-2010-1087"], "description": "[2.6.18-194.8.1.0.1.el5]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- Add entropy support to igb (John Sobecki) [orabug 7607479]\n- [nfs] convert ENETUNREACH to ENOTCONN [orabug 7689332]\n- [NET] Add xen pv/bonding netconsole support (Tina Yang) [orabug 6993043]\n [bz 7258]\n- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [nfsd] fix failure of file creation from hpux client (Wen gang Wang)\n [orabug 7579314]\n- [qla] fix qla not to query hccr (Guru Anbalagane) [Orabug 8746702]\n- [net] bonding: fix xen+bonding+netconsole panic issue (Joe Jin) [orabug 9504524]\n- [rds] Patch rds to 1.4.2-14 (Andy Grover) [orabug 9471572, 9344105]\n RDS: Fix BUG_ONs to not fire when in a tasklet\n ipoib: Fix lockup of the tx queue\n RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)\n RDS: Properly unmap when getting a remote access error (Tina Yang)\n RDS: Fix locking in rds_send_drop_to()\n- [mm] Enahance shrink_zone patch allow full swap utilization, and also be\n NUMA-aware (John Sobecki, Chris Mason, Herbert van den Bergh)\n [orabug 9245919]\n[2.6.18-194.8.1.el5]\n- [net] cnic: fix bnx2x panic w/multiple interfaces enabled (Stanislaw Gruszka) [607087 602402]\n[2.6.18-194.7.1.el5]\n- [virt] don't compute pvclock adjustments if we trust tsc (Glauber Costa) [601080 570824]\n- [virt] add a global synchronization point for pvclock (Glauber Costa) [601080 570824]\n- [virt] enable pvclock flags in vcpu_time_info structure (Glauber Costa) [601080 570824]\n- [misc] add atomic64_cmpxcgh to x86_64 include files (Glauber Costa) [601080 570824]\n- [x86] grab atomic64 types from upstream (Glauber Costa) [601080 570824]\n[2.6.18-194.6.1.el5]\n- [fs] gfs2: fix permissions checking for setflags ioctl (Steven Whitehouse) [595580 595399] {CVE-2010-1641}\n- [mm] clear page errors when issuing a fresh read of page (Rik van Riel) [599739 590763]\n- [misc] keys: do not find already freed keyrings (Vitaly Mayatskikh) [585099 585100] {CVE-2010-1437}\n- [net] sctp: file must be valid before setting timeout (Jiri Pirko) [598355 578261]\n- [net] tg3: fix panic in tg3_interrupt (John Feeney) [600498 569106]\n- [net] e1000/e1000e: implement simple interrupt moderation (Andy Gospodarek) [599332 586416]\n- [net] cnic: Fix crash during bnx2x MTU change (Stanislaw Gruszka) [596385 582367]\n- [net] bxn2x: add dynamic lro disable support (Stanislaw Gruszka) [596385 582367]\n- [net] implement dev_disable_lro api for RHEL5 (Stanislaw Gruszka) [596385 582367]\n- [x86_64] fix time drift due to faulty lost tick tracking (Ulrich Obergfell) [601090 579711]\n- [net] neigh: fix state transitions via Netlink request (Jiri Pirko) [600215 485903]\n- [mm] fix hugepage corruption using vm.drop_caches (Larry Woodman) [599737 579469]\n- [nfs] don't unhash dentry in nfs_lookup_revalidate (Jeff Layton) [596384 582321]\n- [fs] remove unneccessary f_ep_lock from fasync_helper (Lachlan McIlroy) [599730 567479]\n- [xen] set hypervisor present CPUID bit (Paolo Bonzini) [599734 573771]\n[2.6.18-194.5.1.el5]\n- [net] bonding: fix broken multicast with round-robin mode (Andy Gospodarek) [594057 570645]\n- [net] tg3: fix INTx fallback when MSI fails (Steve Best) [592844 587666]\n- [net] sched: fix SFQ qdisc crash w/limit of 2 packets (Jiri Pirko) [594054 579774]\n- [nfs] revert retcode check in nfs_revalidate_mapping() (Jeff Layton) [594061 557423]\n- [misc] futex: handle futex value corruption gracefully (Jerome Marchand) [563093 480396] {CVE-2010-0622}\n- [misc] futex: handle user space corruption gracefully (Jerome Marchand) [563093 480396] {CVE-2010-0622}\n- [misc] futex: fix fault handling in futex_lock_pi (Jerome Marchand) [563093 480396] {CVE-2010-0622}\n- [net] e1000: fix WoL init when WoL disabled in EEPROM (Dean Nelson) [591493 568561]\n- [virtio] fix GFP flags passed by virtio balloon driver (Amit Shah) [591611 584683]\n- [net] sctp: fix skb_over_panic w/too many unknown params (Neil Horman) [584657 584658] {CVE-2010-1173}\n- [acpi] fix WARN on unregister in power meter driver (Matthew Garrett) [592846 576246]\n- [mm] keep get_unmapped_area_prot functional (Danny Feng) [556709 556710] {CVE-2010-0291}\n- [mm] switch do_brk to get_unmapped_area (Danny Feng) [556709 556710] {CVE-2010-0291}\n- [mm] take arch_mmap_check into get_unmapped_area (Danny Feng) [556709 556710] {CVE-2010-0291}\n- [mm] get rid of open-coding in ia64_brk (Danny Feng) [556709 556710] {CVE-2010-0291}\n- [mm] unify sys_mmap* functions (Danny Feng) [556709 556710] {CVE-2010-0291}\n- [mm] kill ancient cruft in s390 compat mmap (Danny Feng) [556709 556710] {CVE-2010-0291}\n- [mm] fix pgoff in have to relocate case of mremap (Danny Feng) [556709 556710] {CVE-2010-0291}\n- [mm] fix the arch checks in MREMAP_FIXED case (Danny Feng) [556709 556710] {CVE-2010-0291}\n- [mm] fix checks for expand-in-place mremap (Danny Feng) [556709 556710] {CVE-2010-0291}\n- [mm] add new vma_expandable helper function (Danny Feng) [556709 556710] {CVE-2010-0291}\n- [mm] move MREMAP_FIXED into its own header (Danny Feng) [556709 556710] {CVE-2010-0291}\n- [mm] move locating vma code and checks on it (Danny Feng) [556709 556710] {CVE-2010-0291}\n[2.6.18-194.4.1.el5]\n- [acpi] warn on hot-add of memory exceeding 4G boundary (Prarit Bhargava) [587957 571544]\n- [net] tipc: fix various oopses in uninitialized code (Neil Horman) [578058 558693] {CVE-2010-1187}\n- [block] cfq-iosched: fix IOPRIO_CLASS_IDLE accounting (Jeff Moyer) [588219 574285]\n- [block] cfq-iosched: async queue allocation per priority (Jeff Moyer) [588219 574285]\n- [block] cfq-iosched: fix async queue behaviour (Jeff Moyer) [588219 574285]\n- [block] cfq-iosched: propagate down request sync flag (Jeff Moyer) [588219 574285]\n- [block] introduce the rq_is_sync macro (Jeff Moyer) [588219 574285]\n- [fs] vfs: fix LOOKUP_FOLLOW on automount symlinks (Jeff Layton) [567815 567816] {CVE-2010-1088}\n- [nfs] fix an oops when truncating a file (Jeff Layton) [567194 567195] {CVE-2010-1087}\n- [fs] fix kernel oops while copying from ext3 to gfs2 (Abhijith Das) [586008 555754] {CVE-2010-1436}", "edition": 4, "modified": "2010-07-01T00:00:00", "published": "2010-07-01T00:00:00", "id": "ELSA-2010-0504", "href": "http://linux.oracle.com/errata/ELSA-2010-0504.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:34:33", "bulletinFamily": "unix", "cvelist": ["CVE-2010-0307", "CVE-2010-2942", "CVE-2010-3904", "CVE-2010-3078", "CVE-2010-2066", "CVE-2010-4081", "CVE-2010-1641", "CVE-2010-2248", "CVE-2010-4073", "CVE-2010-2226", "CVE-2010-0410", "CVE-2010-4072", "CVE-2010-0730", "CVE-2010-2492", "CVE-2010-2521", "CVE-2010-4083", "CVE-2010-1437", "CVE-2010-3859", "CVE-2010-3086", "CVE-2010-0727", "CVE-2010-1187", "CVE-2010-4080", "CVE-2010-2963", "CVE-2010-0291", "CVE-2010-4343", "CVE-2010-3877", "CVE-2010-4158", "CVE-2010-2070", "CVE-2010-2524", "CVE-2010-3296", "CVE-2010-1084", "CVE-2010-3015", "CVE-2010-2938", "CVE-2010-4247", "CVE-2010-4263", "CVE-2010-4258", "CVE-2010-3442", "CVE-2010-4243", "CVE-2010-3066", "CVE-2010-2240", "CVE-2010-1083", "CVE-2010-3081", "CVE-2010-0622", "CVE-2010-3067", "CVE-2010-3699", "CVE-2010-4238", "CVE-2010-1085", "CVE-2010-1086", "CVE-2010-1436", "CVE-2010-4255", "CVE-2010-1173", "CVE-2010-1088", "CVE-2010-1087", "CVE-2010-4075"], "description": "[2.6.18-238.el5]\n- [net] bnx2: remove extra call to pci_map_page (John Feeney) [663509]\n- [fs] nfs: set lock_context field in nfs_readpage_sync (Jeff Layton) [663853]\n[2.6.18-237.el5]\n- [block] fully zeroize request struct in rq_init (Rob Evers) [662154]\n- [scsi] qla4xxx: update to 5.02.04.02.05.06-d0 (Chad Dupuis) [656999]\n- [scsi] qla4xxx: make get_sys_info function return void (Chad Dupuis) [656999]\n- [scsi] qla4xxx: dont default device to FAILED state (Chad Dupuis) [656999]\n- [scsi] qla4xxx: mask bits in F/W Options during init (Chad Dupuis) [656999]\n- [scsi] qla4xxx: update to 5.02.04.01.05.06-d0 (Chad Dupuis) [661768]\n- [scsi] qla4xxx: disable irq instead of req pci_slot_reset (Chad Dupuis) [661768]\n- [scsi] qla4xxx: no device add until scsi_add_host success (Chad Dupuis) [661768]\n- [fs] nfs: set lock_context field in nfs_writepage_sync (Jeff Layton) [660580]\n- [scsi] bfa: fix crash reading driver sysfs statistics (Rob Evers) [659880] {CVE-2010-4343}\n- [misc] cpufeature: avoid corrupting cpuid vendor id (Matthew Garrett) [568751]\n- [char] drm: dont set signal blocker on master process (Dave Airlie) [570604]\n- [fs] nfs: remove problematic calls to nfs_clear_request (Jeff Layton) [656492]\n- [fs] nfs: handle alloc failures in nfs_create_request (Jeff Layton) [656492]\n- [fs] nfs: clean up nfs_create_request (Jeff Layton) [656492]\n- [net] forcedeth: fix race condition in latest backport (Ivan Vecera) [658434]\n- [net] cxgb3: fix read of uninitialized stack memory (Jay Fenlason) [633155] {CVE-2010-3296}\n- [net] tg3: increase jumbo flag threshold (John Feeney) [660506]\n- [net] s2io: fix netdev initialization failure (Bob Picco) [654948]\n- [net] igb: only use vlan_gro_receive if vlans registered (Stefan Assmann) [660190] {CVE-2010-4263}\n- [net] ipv6: try all routers with unknown reachable state (Thomas Graf) [661393]\n- [misc] kernel: fix address limit override in OOPS path (Dave Anderson) [659571] {CVE-2010-4258}\n[2.6.18-236.el5]\n- [powerpc] support DLPAR remove operations (Steve Best) [655089]\n- [net] igb: fix tx packet count (Stefan Assmann) [658801]\n- [usb] serial: new driver MosChip MCS7840 (Stefan Assmann) [574507]\n- [fs] exec: copy fixes into compat_do_execve paths (Oleg Nesterov) [625694] {CVE-2010-4243}\n- [fs] exec: make argv/envp memory visible to oom-killer (Oleg Nesterov) [625694] {CVE-2010-4243}\n- [misc] binfmts: kill bprm->argv_len (Oleg Nesterov) [625694] {CVE-2010-4243}\n- [mm] backport upstream stack guard page /proc reporting (Larry Woodman) [643426]\n- [mm] add guard page for stacks that grow upwards (Johannes Weiner) [630563]\n- [net] tipc: fix information leak to userland (Jiri Pirko) [649892] {CVE-2010-3877}\n- [sound] ALSA: fix sysfs unload and OSS mixer mutex issues (Jaroslav Kysela) [652165]\n- [net] tg3: fix 5719 bugs (John Feeney) [657097]\n- [net] bnx2: update firmware to 6.0.x (John Feeney) [644438]\n- [redhat] configs: add CONFIG_SECURITY_DMESG_RESTRICT (Frantisek Hrbata) [653250]\n- [misc] kernel: restrict unprivileged access to dmesg (Frantisek Hrbata) [653250]\n- [virt] xen: dont allow blkback virtual CDROM device (Andrew Jones) [635638] {CVE-2010-4238}\n- Revert: [xen] cd-rom drive does not recognize new media (Andrew Jones) [635638] {CVE-2010-4238}\n- [net] qlge: fix deadlock when interface is going down (Chad Dupuis) [654420]\n- [net] qlge: reset chip before freeing buffers (Chad Dupuis) [654420]\n- [net] qlge: restore vlan setting during ql_adapter_up (Chad Dupuis) [654420]\n- [scsi] qla4xxx: Update version to V5.02.04.00.05.06-d0 (Chad Dupuis) [656999]\n- [scsi] qla4xxx: Document Driver Versioning Scheme (Chad Dupuis) [656999]\n- [scsi] qla4xxx: Updated the Copyright header to 2010 (Chad Dupuis) [656999]\n- [scsi] qla4xxx: dont process devices untill probe done (Chad Dupuis) [656999]\n- [scsi] qla4xxx: free DDB when application calls for it (Chad Dupuis) [656999]\n- [scsi] qla4xxx: memory wedge with peg_halt test in loop (Chad Dupuis) [656999]\n- [scsi] qla4xxx: clear AF_FW_RECOVERY flag after reset (Chad Dupuis) [656999]\n- [scsi] qla4xxx: fix new IP address caching (Chad Dupuis) [656999]\n- [scsi] qla4xxx: replace hard coded values with macros (Chad Dupuis) [656999]\n- [scsi] qla4xxx: mark dev FAILED on 82XX init failure (Chad Dupuis) [656999]\n- [scsi] qla4xxx: fail init if pci mem write fails (Chad Dupuis) [656999]\n- [scsi] qla4xxx: ensure proper qla4xxx_conn_start state (Chad Dupuis) [656999]\n- [scsi] qla4xxx: do not process interrupts unconditionally (Chad Dupuis) [656999]\n- [scsi] qla4xxx: fix add w/iscsi2_create_conn not done yet (Chad Dupuis) [656999]\n- [scsi] qla4xxx: no fw hung if reset retry is in progress (Chad Dupuis) [656999]\n- [scsi] qla4xxx: correct use of cmd->host_scribble (Chad Dupuis) [656999]\n- [scsi] qla4xxx: msi init request_irq parameter usage fix (Chad Dupuis) [656999]\n- [scsi] qla4xxx: cleanup qla4xxx_wait_for_hba_online (Chad Dupuis) [656999]\n- [scsi] qla4xxx: grab hardware_lock before accessing srb (Chad Dupuis) [656999]\n- [scsi] qla4xxx: remove unwanted check for bad spd (Chad Dupuis) [656999]\n- [scsi] qla4xxx: update AER support for ISP82XX (Chad Dupuis) [656999]\n- [scsi] qla4xxx: clear rom lock if firmware died holding (Chad Dupuis) [656999]\n- [scsi] qla4xxx: CRB Register for Request Queue in-pointer (Chad Dupuis) [656999]\n- [scsi] qla4xxx: dump mailbox registers on System Error (Chad Dupuis) [656999]\n- [scsi] qla4xxx: add support for 8130/8131 AENs (Chad Dupuis) [656999]\n- [scsi] qla4xxx: fix seconds_since_last_heartbeat reset (Chad Dupuis) [656999]\n- [scsi] qla4xxx: no wait for outstanding command complete (Chad Dupuis) [656999]\n- [scsi] qla4xxx: free_irqs on failed initialize_adapter (Chad Dupuis) [656999]\n- [virt] xen: fix netback hotplug regression in xenbus fix (Laszlo Ersek) [635999]\n- [xen] fix 64-bit PV guest user mode segv crashing host (Paolo Bonzini) [658354] {CVE-2010-4255}\n[2.6.18-235.el5]\n- [net] filter: fix backport error in prior filter fix (Jarod Wilson) [651703]\n[2.6.18-234.el5]\n- [s390] vmlogrdr: purge after recording is switched off (Hendrik Brueckner) [653479]\n- [wireless] ieee80211: fix deauthentication (Stanislaw Gruszka) [644367]\n- [wireless] zd1211rw: fix associate after disassociate (Stanislaw Gruszka) [644367]\n- [fs] proc: fix NULL ->i_fop oops (Steve Best) [655083]\n- [scsi] lpfc: Update version to 8.2.0.87.1p (Rob Evers) [655119]\n- [scsi] lpfc: set heartbeat timer off by default (Rob Evers) [655119]\n- [scsi] lpfc: fix NULL deref duing allocation failure (Rob Evers) [655119]\n- [scsi] lpfc: fix remote SLI4 firmware download data bug (Rob Evers) [655119]\n- [scsi] lpfc: fix FDMI_DID login failure after link bounce (Rob Evers) [655119]\n- [scsi] lpfc: handle CVL after nameserver PLOGI timeouts (Rob Evers) [655119]\n- [scsi] lpfc: cleanup mbox cmds in mboxq_cmpl if CVL rcvd (Rob Evers) [655119]\n- [misc] posix-cpu-timers: workaround for mt exec problems (Oleg Nesterov) [656266]\n- [fs] setup_arg_pages: diagnose excessive argument size (Oleg Nesterov) [645227]\n- [net] bnx2x: force interrupt mode for iscsi unset mac (Michal Schmidt) [655885]\n- [scsi] bnx2i: allow to abort connect if request times out (Mike Christie) [653991]\n- [scsi] bnx2i: fix remote TCP RST handling for 570X (1g) (Mike Christie) [653991]\n- [scsi] bnx2i: fix a cid leak issue for 5771X (10g) (Mike Christie) [653991]\n- [scsi] bnx2i: fix endian bug in TMF LUN cmd send (Mike Christie) [653991]\n- [misc] prevent divide by 0 in the kernel during boot (Larry Woodman) [508140]\n- [net] filter: make sure filters dont read uninit memory (Jiri Pirko) [651703] {CVE-2010-4158}\n- [net] inet_diag: make sure we run audited bytecode (Jiri Pirko) [651267]\n- [net] limit sendto/recvfrom/iovec total length to INT_MAX (Jiri Pirko) [645872] {CVE-2010-3859}\n- [bluetooth] hci_ldisc: fix missing NULL check (Jarod Wilson) [655666]\n- [net] be2net: avoid firmware update if interface not open (Ivan Vecera) [651948]\n- [ipc] shm: fix information leak to userland (Danny Feng) [648687] {CVE-2010-4072}\n- [ipc] initialize struct memory to 0 for compat functions (Danny Feng) [648693] {CVE-2010-4073}\n- [net] netxen: dont use reset_devices, it may go away (Chad Dupuis) [643254]\n- [net] netxen: fix kdump (Chad Dupuis) [643254]\n- [net] qlcnic: avoid reset_devices, it may become obsolete (Chad Dupuis) [656008]\n- [net] qlcnic: fix for kdump (Chad Dupuis) [656008]\n- [pci] block on access to temporarily unavailable device (Chad Dupuis) [656008]\n- [serial] serial_core: clean data before filling it (Mauro Carvalho Chehab) [648701] {CVE-2010-4075}\n- [edac] i7core_edac: return -ENODEV if dev already probed (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: properly terminate pci_dev_table (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: fix PCI refcounting on reloads (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: fix refcount error at PCI devices (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: safe to unregister mci when mci NULL (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: fix an oops at i7core probe (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: remove unused member in i7core_pvt (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: remove unused arg in get_dimm_config (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: reduce args of i7core_register_mci (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: use saved pointers (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: check probe counter in i7core_remove (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: call pci_dev_put on alloc failure (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: fix error path of i7core_register_mci (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: fix line order in i7core_register_mci (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: always do get/put for all devices (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: ensure edac pci handler release (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: introduce free_i7core_dev (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: introduce alloc_i7core_dev (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: reduce args of i7core_get_onedevice (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: fix the logic in i7core_remove (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: dont do legacy PCI probe by default (Mauro Carvalho Chehab) [651869]\n- [edac] edac_core: print debug messages at release calls (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: remove PCI devices from devices list (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: MCE NMI handling should stop first (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: improve debug register/remove errors (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: move #if PAGE_SHIFT to edac_core.h (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: terminate the group of udimm counters (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: mark const static vars as such (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: move static vars to the top of file (Mauro Carvalho Chehab) [651869]\n- [virt] xen: add bounds req-process loop in blkback/blktap (Laszlo Ersek) [654546] {CVE-2010-4247}\n- [virt] xen: dont leak dev refs on bad xenbus transitions (Laszlo Ersek) [635999] {CVE-2010-3699}\n- [mm] fix possible integer overflow in mm/fremap.c (Larry Woodman) [637047]\n- [misc] futex: replace LOCK_PREFIX in futex.h (Jiri Pirko) [633176] {CVE-2010-3086}\n[2.6.18-233.el5]\n- [scsi] mpt2sas: use sas device list for enclosure id (Tomas Henzl) [652284]\n- [scsi] ipr: fix mailbox register definition and add delay (Steve Best) [654446]\n- [scsi] ipr: fix lun assignment and comparison (Steve Best) [654446]\n- [powerpc] add AT_BASE_PLATFORM to Aux Vector and power7 (Steve Best) [652279]\n- [infiniband] ehea: use shca_list_lock spinlock (Steve Best) [613797]\n- [powerpc] kdump: CPUs assume context of oopsing CPU (Steve Best) [509792]\n- [scsi] lpfc: Update version for 8.2.0.87 driver release (Rob Evers) [649489]\n- [scsi] lpfc: add handling SLI4 unsolicted ELS RTV (Rob Evers) [649489]\n- [scsi] lpfc: add handling ECHO response support (Rob Evers) [649489]\n- [scsi] lpfc: add handling of SLI4 unsolicted ELS (Rob Evers) [649489]\n- [scsi] lpfc: fix locking for security mailbox commands (Rob Evers) [649489]\n- [scsi] lpfc: abort I/Os and wait on XRI in SLI4 unload (Rob Evers) [649489]\n- [scsi] lpfc: handle devloss timeout in FIP engine (Rob Evers) [649489]\n- [scsi] lpfc: fix crashes on NULL pnode dereference (Rob Evers) [649489]\n- [net] cnic: Add cnic_free_uio (Mike Christie) [651287]\n- [net] cnic: Add cnic_uio_dev struct (Mike Christie) [651287]\n- [net] cnic: Add cnic_free_uio (Mike Christie) [651287]\n- [net] cnic: Fine-tune ring init code (Mike Christie) [651287]\n- [misc] fix dirty_bytes sysctl name (Larry Woodman) [635782]\n- [fs] procfs: acquire inode mutex around llseek operation (Lachlan McIlroy) [644726]\n- [virt] netfront: default to copying instead of flipping (Laszlo Ersek) [653262]\n- [virt] netback: dont balloon up for copying receivers (Laszlo Ersek) [653501]\n- [net] rds: fix rds_iovec page count overflow (Jiri Pirko) [647422]\n- [net] virtio_net: add link status handling (Jason Wang) [649573]\n- [net] be2net: Update be2net to version 2.102.512r (Ivan Vecera) [647259]\n- [char] watchdog: another LPC Controller ID for Patsburg (David Milburn) [570868]\n- [misc] another LPC Controller ID for Intel Patsburg PCH (David Milburn) [570868]\n- [i2c] i2c-i801: Add Intel Patsburg device ID (David Milburn) [570868]\n- [misc] pci: update Intel Patsburg defines (David Milburn) [570868]\n- [misc] x86/PCI irq and pci_ids for Intel Patsburg Devices (David Milburn) [570868]\n- [sound] ALSA HD Audio for Intel Patsburg DeviceIDs (David Milburn) [570868]\n- [char] watchdog: TCO Watchdog for Intel Patsburg Devices (David Milburn) [570868]\n- [ata] ahci: AHCI and RAID mode for Intel Patsburg Devices (David Milburn) [570868]\n- [ata] ata_piix: IDE Mode SATA for Intel Patsburg Devices (David Milburn) [570868]\n- [net] fix deadlock in sock_queue_rcv_skb (Danny Feng) [652537]\n- [scsi] qla2xxx: check null fcport in _queuecommands (Chad Dupuis) [644863]\n- [net] qlcnic: Fix missing error codes (Chad Dupuis) [637194]\n- [usb] wacom: add support for Cintiq 21UX2 (Aristeu Rozanski) [652731]\n- [xen] hvm: add HVMOP_get_time hypercall (Paolo Bonzini) [638082]\n[2.6.18-232.el5]\n- [scsi] mpt2sas: use correct pci_resource_flag for compare (Tomas Henzl) [649885]\n- [sound] rme9652: prevent reading uninitialized stack mem (Stanislaw Gruszka) [648709 648714] {CVE-2010-4080 CVE-2010-4081}\n- [net] packet: fix information leak to userland (Jiri Pirko) [649898]\n- [ipc] sys_semctl: fix kernel stack leakage (Danny Feng) [648722] {CVE-2010-4083}\n- [misc] kernel: remove yield from stop_machine paths (Oleg Nesterov) [634454]\n- [fs] dlm: reduce cond_resched during send (David Teigland) [604139]\n- [fs] dlm: use TCP_NODELAY (David Teigland) [604139]\n- [fs] nfs: fix a referral error Oops (Steve Dickson) [556886]\n- [fs] gfs2: fix race in unlinked inode deallocation (Robert S Peterson) [643165]\n- [scsi] retry on DID_REQUEUE errors (Mike Christie) [627836]\n- [net] sctp: do not reset packet during sctp_packet_config (Jiri Pirko) [637867]\n- [net] bnx2: add AER support (John Feeney) [617024]\n- [net] bonding: no lock on copy/clear VLAN list on slave (Andy Gospodarek) [627974]\n- [scsi] gdth: prevent integer overflow in ioc_general (Frantisek Hrbata) [651176]\n[2.6.18-231.el5]\n- [scsi] scsi_dh_alua: remove IBM Power Virtual SCSI ALUA (Steve Best) [567292]\n- [fs] gfs2: flock (LOCK_EX|LOCK_NB) blocks (Robert S Peterson) [648602]\n- [scsi] lpfc: update version for 8.2.0.86 driver release (Rob Evers) [645881]\n- [scsi] lpfc: fix race sending FDISC to un-init VPI (Rob Evers) [645881]\n- [scsi] lpfc: fix mailbox handling for UNREG_RPI_ALL case (Rob Evers) [645881]\n- [kernel] add stop_machine barrier to fix lock contention (Prarit Bhargava) [634454]\n- [scsi] bnx2i: fix ip address formatting and oops (Mike Christie) [646708]\n- [scsi] be2iscsi: remove premature free of cid (Mike Christie) [640029]\n- [fs] proc: make proc pid limits world readable (Jiri Olsa) [611535]\n- [ide] atiixp: fix locking hang in ide layer ATIIXP driver (James Leddy) [586482]\n- [security] only check mmap_min_addr perms for write (Eric Paris) [623519]\n- [ata] sata_sil24: add DID for another adaptec flavor (David Milburn) [640586]\n- [s390] cio: prevent panic in I/O cancel function (Hendrik Brueckner) [647807]\n- [s390] cio: prevent panic after unexpected I/O interrupt (Hendrik Brueckner) [647502]\n[2.6.18-230.el5]\n- [fs] nfs: fix regression in NFS Direct I/O path (Steve Dickson) [647297]\n- [fs] nfs: allow different protocol mounts to same server (Steve Dickson) [460659]\n- [scsi] lpfc: update version for 8.2.0.85 driver release (Rob Evers) [639028]\n- [scsi] lpfc: fix a BUG_ON in lpfc_abort_handler (Rob Evers) [639028]\n- [scsi] lpfc: use pci reset function on driver unload (Rob Evers) [639028]\n- [scsi] lpfc: replace some spin_lock_irqs w/spin_locks (Rob Evers) [639028]\n- [scsi] lpfc: fail io w/lost frame and target check cond (Rob Evers) [639028]\n- [scsi] lpfc: fix abort WQEs for FIP frames (Rob Evers) [639028]\n- [scsi] lpfc: update version for 8.2.0.84 driver release (Rob Evers) [639028]\n- [scsi] lpfc: unreg all rpi mbox command before unreg vpi (Rob Evers) [639028]\n- [scsi] lpfc: make all error values negative (Rob Evers) [639028]\n- [scsi] lpfc: remove duplicate code from lpfc_els_retry (Rob Evers) [639028]\n- [scsi] lpfc: fix circular spinlock dep w/scsi midlayer (Rob Evers) [639028]\n- [scsi] lpfc: update version for 8.2.0.83 driver release (Rob Evers) [639028]\n- [scsi] lpfc: fix FLOGI issue with McData4700 FC switch (Rob Evers) [639028]\n- [scsi] lpfc: fix possible roundrobin failover failure (Rob Evers) [639028]\n- [scsi] lpfc: fix unregister of unused FCF on timeout (Rob Evers) [639028]\n- [scsi] lpfc: fix heartbeat timeout during pause test (Rob Evers) [639028]\n- [scsi] lpfc: update version for 8.2.0.82 driver release (Rob Evers) [639028]\n- [scsi] lpfc: fix lpfc_els_retry delay/retry for PLOGI (Rob Evers) [639028]\n- [scsi] lpfc: streamline some spin locks (Rob Evers) [639028]\n- [scsi] lpfc: fix lpfc_initial_flogi return on failure (Rob Evers) [639028]\n- [scsi] lpfc: fix stray state update issue with new FCF (Rob Evers) [639028]\n- [scsi] lpfc: treat FCF prop with different index as error (Rob Evers) [639028]\n- [scsi] lpfc: fix misc auth issues on EmulexSecure FC HBA (Rob Evers) [639028]\n- [scsi] lpfc: update version for 8.2.0.81 driver release (Rob Evers) [639028]\n- [scsi] lpfc: move unload flag earlier in vport delete (Rob Evers) [639028]\n- [scsi] lpfc: fix IOCB leak on FDISC completion (Rob Evers) [639028]\n- [scsi] lpfc: fix possible crash on non-SLI4 hba (Rob Evers) [639028]\n- [scsi] mpt2sas: fix panic w/direct attached SEP (Jarod Wilson) [641086]\n- [redhat] spec: clean up rpmbuild kabideps detritus (Jarod Wilson) [644129]\n- [net] bnx2: Increase max rx ring size from 1K to 2K (Andy Gospodarek) [640026]\n- [net] bnx2: fixup broken NAPI accounting (Andy Gospodarek) [640026]\n- [s390] qeth: portno 1 support for OSM-device insufficient (Hendrik Brueckner) [644008]\n[2.6.18-229.el5]\n- [pci] include DL580 G7 in bfsort whitelist (Tony Camuso) [644879]\n- [net] igb: fix TX hang when loading igb with max_vfs > 7 (Stefan Assmann) [645284]\n- [virt] fix timekeeping_use_tsc check in init_tsc_timer (Prarit Bhargava) [643926]\n- [net] bonding: support netconsole over bonded link (Neil Horman) [235343]\n- [virt] xen: increase txqueuelen of netback vif devices (Miroslav Rezanina) [539626]\n- [sound] core: prevent heap corruption in snd_ctl_new (Jerome Marchand) [638484] {CVE-2010-3442}\n- [net] updated drivers need version string updates too (Andy Gospodarek) [635027]\n- [misc] softlockup: increase timeout to 60 seconds (Don Zickus) [643707]\n- [virt] xen: fix vdso failure under xen pv environment (Danny Feng) [644860]\n- [scsi] qla2xxx: fix zero test on array in ql_fc_loopback (Chad Dupuis) [644136]\n- [usb] net/catc: change NICs TX_MAX_BURST, fixes probe (Bob Picco) [637826]\n- [virt] console: dont block guest if host doesnt read (Amit Shah) [644735]\n- [media] video: remove compat code for VIDIOCSMICROCODE (Mauro Carvalho Chehab) [642471] {CVE-2010-2963}\n- [xen] vtd: let IOMMU use another IRQ without conflict (Don Dugger) [575790]\n- [net] bonding: correctly process non-linear skbs (Andy Gospodarek) [619070]\n- [net] rds: fix local privilege escalation (Eugene Teo) [642898] {CVE-2010-3904}\n[2.6.18-228.el5]\n- [char] tpm: pay attention to IRQ info from PNP in tpm_tis (Stefan Assmann) [636760]\n- [misc] cpufreq: add missing cpufreq_cpu_put (Prarit Bhargava) [643080]\n- [md] fix softlockup issue waiting for resync to finish (James Paradis) [573106]\n- [s390] dasd_eckd: remove PSF order/suborder ioctl check (John Feeney) [565973]\n- [fs] xfs: fix speculative allocation beyond eof (Dave Chinner) [638753]\n[2.6.18-227.el5]\n- [net] ixgbe: add option to control interrupt mode (Andy Gospodarek) [571495]\n- [md] raid0: fix data corruption on 32-bit w/large storage (Stanislaw Gruszka) [573185]\n- [scsi] fix write buffer length in scsi_req_map_sg (Steve Best) [637235]\n- [scsi] ipr: back out isr optimization changes (Steve Best) [634213]\n- [scsi] ipr: fix rsrc addr format and add attr for dev ID (Steve Best) [634213]\n- [fs] jbd2: properly align sized slab caches (Eric Sandeen) [638961]\n- [fs] ext4: dont scan/accumulate too many pages (Eric Sandeen) [572930]\n- [fs] gfs2: fix fatal filesystem consistency error (Robert S Peterson) [529914]\n- [scsi] lpfc: update version for 8.2.0.80 driver release (Rob Evers) [619917]\n- [scsi] lpfc: add Security Crypto support to CONFIG_PORT (Rob Evers) [619917]\n- [scsi] lpfc: remove unused variables (Rob Evers) [619917]\n- [scsi] lpfc: log msg 0318 is a warning, not an error (Rob Evers) [619917]\n- [scsi] lpfc: fix bug w/cable swap and non-empty nodelist (Rob Evers) [619917]\n- [scsi] lpfc: fix a failure to roundrobin on all FCFs (Rob Evers) [619917]\n- [scsi] lpfc: fix heartbeat timeout during fabric reconfig (Rob Evers) [619917]\n- [scsi] lpfc: update version for 8.2.0.79 driver release (Rob Evers) [619917]\n- [scsi] lpfc: fix a Clear Virtual Link recovery failure (Rob Evers) [619917]\n- [scsi] lpfc: clear VFI_REGISTERED flag after UNREG_VFI (Rob Evers) [619917]\n- [scsi] lpfc: ignore failure of REG_VPI mbox w/UPD bit set (Rob Evers) [619917]\n- [scsi] lpfc: fix ioctl using inactive ndlp for ct resp (Rob Evers) [619917]\n- [scsi] lpfc: fix bug w/ndlp not activated post-cable swap (Rob Evers) [619917]\n- [scsi] lpfc: add support UPD bit of REG_VPI mailbox cmd (Rob Evers) [619917]\n- [scsi] lpfc: fix driver discovery issue after link bounce (Rob Evers) [619917]\n- [scsi] lpfc: fix VLAN ID 0xFFF set to reg_fcfi mbox cmd (Rob Evers) [619917]\n- [scsi] lpfc: update version for 8.2.0.78 driver release (Rob Evers) [619917]\n- [scsi] lpfc: fix race condition causing >1 FLOGI commands (Rob Evers) [619917]\n- [scsi] lpfc: enhance round-robin FCF failover algorithm (Rob Evers) [619917]\n- [scsi] lpfc: clear Ignore Reg Login when purging mailbox (Rob Evers) [619917]\n- [scsi] lpfc: fix for ELS commands stuck on txq (Rob Evers) [619917]\n- [scsi] lpfc: added target queuedepth module parameter (Rob Evers) [619917]\n- [scsi] lpfc: fix RoundRobin FCF failover issue (Rob Evers) [619917]\n- [scsi] re-enable transistions from OFFLINE to RUNNING (Mike Christie) [641193]\n- [edac] i7300_edac: properly init per-csrow memory size (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: better initialize page counts (Mauro Carvalho Chehab) [487428]\n- [redhat] configs: enable edac debugging debug kernels (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: backport driver to RHEL5.6 codebase (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: add appropriate MAINTAINERS info (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: coding style cleanups (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: improve inline comments/documentation (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: reorganize file contents (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: properly detect channel on CE errors (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: enrich FBD info for corrected errors (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: enrich FBD error info for fatal errors (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: pre-allocate buffer for error messages (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: fix MTR x4/x8 detection logic (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: make debug messages consistent (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: remove stale get_error_info logic (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: add error registers cleanup support (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: add support for reporting FBD errors (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: properly detect error correction type (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: detect if device is in single mode (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: add detection of enhanced scrub mode (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: clear error bit after reading (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: add error detection for global errors (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: better PCI device names (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: Add FIXME about error correction type (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: add global error registers (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: display info if ECC is enabled or not (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: new driver for Intel i7300 chipset (Mauro Carvalho Chehab) [487428]\n- [mm] kswapd: dont get stuck in D state w/fragmented mem (Larry Woodman) [609668]\n- [misc] x86_64: fix hang at Booting processor 1/8 APIC (John Villalovos) [639851]\n- [misc] oprofile: add backtraces for compat mode processes (Jiri Olsa) [622024]\n- [net] tg3: re-enable 5717 B0 support (John Feeney) [634320]\n- [net] tg3: fix 5717/57765/5719 memory leak (John Feeney) [631963]\n- [net] tg3: display FW version, handle FW events correctly (John Feeney) [634325]\n- [net] bnx2: improve tx fast path performance (John Feeney) [632057]\n- [net] enic: update to upstream version 1.4.1.2 (Andy Gospodarek) [568111]\n- [net] ixgbe: fix 82598 link issue and panic w/shared irq (Andy Gospodarek) [637331]\n- [net] mlx4: bump max log_mtts_per_seg memory reservation (Jay Fenlason) [636198]\n- [usb] net: add support for CDC EEM (Don Zickus) [572519]\n- [scsi] qla2xxx: clear post-uncorrectable non-fatal errors (Chad Dupuis) [572258]\n- [net] qlcnic: fix poll implementation (Chad Dupuis) [625084]\n- [net] qlcnic: TSO feature added for vlan devices (Chad Dupuis) [625084]\n- [net] qlcnic: fix diag resource allocation (Chad Dupuis) [625084]\n- [net] qlcnic: fix loopback test (Chad Dupuis) [625084]\n- [net] qlcnic: fix bandwidth check (Chad Dupuis) [625084]\n- [net] qlcnic: fix gro support (Chad Dupuis) [625084]\n- [s390] kernel: fix fork vs /proc/stat race (Hendrik Brueckner) [627298]\n- [misc] amd_iommu: fix kdump OOM issue seen with iommu=pt (Bhavna Sarathy) [627663]\n- [fs] execve: fix interactivity and response to SIGKILL (Dave Anderson) [629176]\n- [virt] virtio_console: fix userspace NULL buffer submits (Amit Shah) [636046]\n- [virt] virtio_console: fix poll blocking when data ready (Amit Shah) [636020]\n- [virt] virtio_console: send SIGIO as needed for host evts (Amit Shah) [636053]\n- [virt] virtio_console: make hot-unplug safe (Amit Shah) [628828]\n- [net] virtio_net: defer skb allocation in receive path (Anthony Liguori) [565560]\n- [misc] increase logbuf size to 512K (Don Zickus) [563535]\n- [xen] hvm: correct accuracy of pmtimer (Andrew Jones) [633028]\n- [xen] fix guest crash on non-EPT machine may crash host (Paolo Bonzini) [621430] {CVE-2010-2938}\n[2.6.18-226.el5]\n- [net] bonding: fix IGMP report on slave during failover (Flavio Leitner) [637764]\n[2.6.18-225.el5]\n- [usb] serial/pl2303: add id for HP LD220-HP POS display (Don Zickus) [580698]\n[2.6.18-224.el5]\n- [scsi] mpt2sas: recover from injected PCIe bus errors (Tomas Henzl) [568281]\n- [message] fusion: remove unnecessary printk flooding logs (Tomas Henzl) [629081]\n- [scsi] scsi_dh_alua: handle transitioning state correctly (Mike Snitzer) [619361]\n- [scsi] lpfc: fix ioctl crash in lpfc_nlp_put (Rob Evers) [625841]\n- [net] trace: fix sk_buff typo in network tracepoints (Neil Horman) [568614]\n- [net] sched: fix info leak in traffic policing (Neil Horman) [636392]\n- [md] dm: fix deadlock with fsync vs. resize in lvm (Mikulas Patocka) [624068]\n- [misc] amd_iommu: fix slab corruption with iommu enabled (Larry Woodman) [530619]\n- [mm] add dirty_background_bytes and dirty_bytes sysctls (Larry Woodman) [635782]\n- [scsi] add scsi_dispatch_* tracepoints (Jiri Olsa) [568290]\n- [misc] oprofile: support Intel CPU Family 6, Model 22, 29 (Jiri Olsa) [493047]\n- [fs] aio: fix flush_workqueue deadlock (Jeff Moyer) [546700]\n- [net] be2net: use generated MAC addr for VFs, fix BUG_ON (Ivan Vecera) [630680]\n- [fs] sysfs: add labeling support for sysfs (Eric Paris) [582374]\n- [selinux] inode_*secctx hooks to access security ctx info (Eric Paris) [582374]\n- [fs] xattr: refactor vfs_setxattr for SELinux hook use (Eric Paris) [582374]\n- [redhat] configs: compile TCG modules for kernel-xen (Andrew Jones) [636100]\n- [net] netxen: fix poll implementation (Chad Dupuis) [625079]\n- [net] netxen: fix a race in netxen_nic_get_stats() (Chad Dupuis) [625079]\n- [net] netxen: update version 4.0.74 (Chad Dupuis) [625079]\n- [net] netxen: fix feature setting for vlan devices (Chad Dupuis) [625079]\n- [net] netxen: fix tx csum setting (Chad Dupuis) [625079]\n- [scsi] qla2xxx: recover on mmio_enable function for 82XX (Chad Dupuis) [613134]\n- [scsi] qla2xxx: add AER support for 82XX (Chad Dupuis) [613134]\n- [misc] amd_iommu: change default to passthrough mode (Bhavna Sarathy) [628018]\n- [misc] amd_iommu: add passthrough mode support (Bhavna Sarathy) [561127]\n- [misc] amd: dont use mwait_idle on AMD CPUs (Bhavna Sarathy) [610199]\n- [misc] amd: show L3 cache info for all CPU families (Bhavna Sarathy) [610199]\n- [misc] amd: unify L3 cache index disable checking (Bhavna Sarathy) [610199]\n- [misc] amd: avoid dupe sysfs bits for thresholding banks (Bhavna Sarathy) [610199]\n- [misc] amd: remove superfluous CPU family/model check (Bhavna Sarathy) [610199]\n- [misc] fix race in pid generation causing immediate reuse (Dave Anderson) [634850]\n[2.6.18-223.el5]\n- [redhat] kabi: add net symbols for RHEL5.6 (Jon Masters) [547689 555708 558999 568558 569606 613193]\n- [redhat] kabi: add Block and SCSI symbols for RHEL5.6 (Jon Masters) [547689 558999 566767 569606 574557]\n- [redhat] kabi: add PCI kernel symbols for RHEL5.6 (Jon Masters) [547689 555708 566767 568558 569606 597143 613193]\n- [redhat] kabi: add core kernel symbols for RHEL5.6 (Jon Masters) [545218 562242]\n- [net] ipvs: add one-packet scheduler (Thomas Graf) [578836]\n- [pci] fix pci_mmcfg_init making some memory uncacheable (Shyam Iyer) [581933]\n- [virt] xen: fix crashing of x86 hvm guest on x86_64 (Radim Krcmar) [605697]\n- [scsi] fix disk spinup for shorter path restore times (Rob Evers) [608109]\n- [scsi] aacraid: fix file system falsely going read-only (Rob Evers) [523920]\n- [misc] x86: fix cpuid_level on Intel pre-model 13 cpus (Prarit Bhargava) [606851]\n- [net] cxgb3: alt buffer freeing strategy when xen dom0 (Paolo Bonzini) [488882]\n- [net] bonding: enable output slave selection (Neil Horman) [516289]\n- [md] dm-raid1: fix data lost at mirror log failure (Mikulas Patocka) [555197]\n- [md] kcopyd: dm snapshot performance improvement (Mikulas Patocka) [466088]\n- [scsi] increase sync cache timeout (Mike Christie) [592322]\n- [scsi] log msg when getting Unit Attention (Mike Christie) [585431]\n- [virt] xen: add dummy mwait for xen to make it compile (Luming Yu) [573514]\n- [x86_64] use apic as main timer if non-stop-apic timer (Luming Yu) [573514]\n- [acpi] cpu: use MWAIT for C-state (Luming Yu) [573514]\n- [net] ipv4/defrag: check socket type before reference (Jiri Olsa) [632266]\n- [net] ipv4: prevent chained skb destined to UFO device (Jiri Olsa) [633450]\n- [block] cfq: no merges for queues w/no process references (Jeff Moyer) [605265]\n- [fs] aio: check for multiplication overflow in io_submit (Jeff Moyer) [629449] {CVE-2010-3067}\n- [misc] make compat_alloc_user_space incorporate access_ok (Don Howard) [634464] {CVE-2010-3081}\n- [fs] xfs: prevent reading uninitialized stack memory (Dave Chinner) [630807] {CVE-2010-3078}\n- [fs] aio: fix cleanup in io_submit_one (Jeff Moyer) [631721] {CVE-2010-3066}\n[2.6.18-222.el5]\n- [cpufreq] powernow-k8: fix per core frequency control (Bhavna Sarathy) [502397]\n- [misc] uid/gid: fix integer overflow in groups_search (Jerome Marchand) [629626]\n- [virt] xen: remove dead code (Paolo Bonzini) [507846]\n- [virt] xen: dont give up ballooning under mem pressure (Paolo Bonzini) [507846]\n- [net] ipv4: fix oops in writing to forwarding sysctl (Neil Horman) [629638]\n- [net] trace: backport some networking tracepoints (Neil Horman) [568614]\n- [misc] rename topology_*_cpumask back to *_siblings (Michal Schmidt) [633388]\n- [scsi] 3w_sas: add new 3ware SAS driver (Tomas Henzl) [572011]\n- [scsi] 3w-9xxx: update to 2.26.08.007-2.6.18RH (Tomas Henzl) [572004]\n- [scsi] megaraid: fix suspend function (Tomas Henzl) [630927]\n- [net] ipv6: add modes to do RA/RS when in forwarding mode (Thomas Graf) [614064]\n- [fs] nfsv4: fix bug when server returns NFS4ERR_RESOURCE (Steve Dickson) [620502]\n- [fs] nfsv4: ensure lockowners are labelled correctly (Steve Dickson) [620502]\n- [fs] nfsv4: add support for RELEASE_LOCKOWNER operation (Steve Dickson) [620502]\n- [fs] nfsv4: clean up for lockowner XDR encoding (Steve Dickson) [620502]\n- [fs] nfsv4: ensure we track lock state in r/w requests (Steve Dickson) [620502]\n- [scsi] qla4xxx: add PCIe AER support (Chad Dupuis) [624710]\n- [scsi] qla4xxx: update version to 5.02.03.00.05.06-d1 (Chad Dupuis) [623675]\n- [scsi] qla4xxx: resolve name space error with qla2xxx (Chad Dupuis) [623675]\n- [net] qlcnic: add AER support and miscellaneous fixes (Chad Dupuis) [614281]\n- [net] qlcnic: add NIC partitioning and other misc fixes (Chad Dupuis) [614281]\n- [net] qlcnic: misc upstream fixes for RHEL5.6 (Chad Dupuis) [614281]\n- [net] ipv4: fix buffer overflow in icmpmsg_put (Frantisek Hrbata) [601391]\n- [proc] allow access to /proc//fd after setuid (Danny Feng) [617707]\n- [fs] xfs: fix missing untrusted inode lookup tag (Dave Chinner) [607032]\n- [wireless] fixes from 2.6.32.18 (Stanislaw Gruszka) [621105]\n- [wireless] fixes from 2.6.32.17 (Stanislaw Gruszka) [621105]\n- [wireless] fixes from 2.6.32.16 (Stanislaw Gruszka) [621105]\n- [wireless] fixes from 2.6.32.14 (Stanislaw Gruszka) [621105]\n- [wireless] fixes from 2.6.32.13 (Stanislaw Gruszka) [621105]\n- [wireless] fixes from 2.6.32.12 (Stanislaw Gruszka) [621105]\n- [wireless] fixes from 2.6.32.11 (Stanislaw Gruszka) [621105]\n- [wireless] fixes from 2.6.32.10 (Stanislaw Gruszka) [621105]\n- [wireless] fixes from 2.6.32.9 (Stanislaw Gruszka) [621105]\n- [wireless] fixes from 2.6.32.8 (Stanislaw Gruszka) [621105]\n- [xen] emulate task switching (Paolo Bonzini) [625903]\n- [xen] introduce hvm_set_cr3 (Paolo Bonzini) [625903]\n- [xen] introduce hvm_virtual_to_linear_addr (Paolo Bonzini) [625903]\n- [xen] introduce hvm_set_segment_register (Paolo Bonzini) [625903]\n- [xen] hvm: big cleanups and fixes to event deliver logic (Paolo Bonzini) [625903]\n- [xen] vmx: simplify event-injection logic (Paolo Bonzini) [625903]\n- [xen] xm trigger NMI support for HVM guests (Paolo Bonzini) [625902]\n- [xen] virtual NMI support (Paolo Bonzini) [625902]\n- [xen] emulate injection of guest NMI (Paolo Bonzini) [625902]\n- [xen] introduce get_isa_irq_vector and is_isa_irq_masked (Paolo Bonzini) [625902]\n- [xen] hvm: fix UP suspend/resume/migration w/PV drivers (Miroslav Rezanina) [629773]\n[2.6.18-221.el5]\n- [acpi] check _PPC state on cpufreq start (Matthew Garrett) [581037]\n- [fs] aio: bump i_count instead of using igrab (Jeff Moyer) [626963]\n- [redhat] dont generate kABI deps when building w/o kABI (Jon Masters) [456765]\n- [watchdog] support for iTCO on Ibex Peak and Cougar Point (John Villalovos) [534152]\n- [edac] amd64_edac: whitespace cleanups (Bhavna Sarathy) [568576]\n- [edac] amd64_edac: minor formatting fix (Bhavna Sarathy) [568576]\n- [edac] amd64_edac: fix operator precedence error (Bhavna Sarathy) [568576]\n- [edac] amd64_edac: fix syndrome calculation on K8 (Bhavna Sarathy) [568576]\n- [edac] amd64_edac: simplify ECC override handling (Bhavna Sarathy) [568576]\n- [edac] amd64_edac: do not falsely trigger kerneloops (Bhavna Sarathy) [568576]\n- [edac] amd64_edac: restrict PCI config space access (Bhavna Sarathy) [568576]\n- [edac] amd64_edac: fix forcing module load/unload (Bhavna Sarathy) [568576]\n- [edac] amd64_edac: fix driver instance freeing (Bhavna Sarathy) [568576]\n- [edac] amd64_edac: fix k8 chip select reporting (Bhavna Sarathy) [568576]\n- [edac] amd64_edac: add leaner syndrome decoding algorithm (Bhavna Sarathy) [568576]\n- [scsi] bnx2i: link hba and cnic device before device reg (Mike Christie) [578005]\n- [scsi] bnx2i: make fw use statsn field to build header (Mike Christie) [578005]\n- [net] cnic: select bug fixes from upstream for RHEL5.6 (Mike Christie) [595548 619767]\n- [scsi] bnx2i: update version to bnx2i-2.1.3 (Mike Christie) [568606]\n- [scsi] bnx2i: add chip cleanup for remove module path (Mike Christie) [568606]\n- [scsi] bnx2i: rebind CFC cleanup to cm_abort/close comp (Mike Christie) [568606]\n- [scsi] bnx2i: add support for additional TMFs (Mike Christie) [568606]\n- [scsi] bnx2i: fix protocol violation on nopout responses (Mike Christie) [568606]\n- [scsi] bnx2i: fix response panic on unsolicited NOP-In (Mike Christie) [568606]\n- [scsi] bnx2i: fix bugs in handling of unsolicited NOP-Ins (Mike Christie) [568606]\n- [scsi] bnx2i: add host param ISCSI_HOST_PARAM_IPADDRESS (Mike Christie) [568606]\n- [scsi] bnx2i: fix TCP graceful termination initiation (Mike Christie) [568606]\n- [scsi] bnx2i: fine tune misc destroy timeout values (Mike Christie) [568606]\n- [scsi] bnx2i: optimize bnx2i_stop connection clean up (Mike Christie) [568606]\n- [scsi] bnx2i: create active linklist holding endpoints (Mike Christie) [568606]\n- [scsi] bnx2i: split hardware cleanup from ep_disconnect (Mike Christie) [568606]\n- [fs] dlm: fix try 1cb failure, part 2 (Abhijith Das) [504188]\n- [fs] dlm: no node callback when try 1cb lock req fails (David Teigland) [504188]\n- [misc] crypto: add Intel x86_64 hardware CRC32 support (Prarit Bhargava) [626018]\n- [net] bnx2: update to v2.0.8+ with new 5709 firmware j15 (John Feeney) [568601]\n- [net] tg3: update to 3.108+ and add 5718 B0, 5719 support (John Feeney) [567462]\n- [misc] move dev_name to device.h (John Feeney) [568551]\n- [misc] add WARN_ONCE macro (John Feeney) [568551]\n- [dma_v3] update I/O AT and DCA drivers (John Feeney) [568551]\n- [net] forcedeth: update to latest upstream for RHEL5.6 (Ivan Vecera) [628831]\n- [net] e1000e: update to upstream version 1.2.7-k2 (Andy Gospodarek) [566021]\n- [net] qla2xxx: fix display of link down state (Chad Dupuis) [627612]\n- [scsi] qla2xxx: rom lock recover if fw hangs holding lock (Chad Dupuis) [619814]\n- [scsi] qla2xxx: update AER support, do early abort cmds (Chad Dupuis) [619814]\n- [scsi] qla2xxx: add IS_QLA82XX check in update_fw_options (Chad Dupuis) [619814]\n- [scsi] qla2xxx: cover UNDERRUN case where SCSI status set (Chad Dupuis) [619814]\n- [scsi] qla2xxx: fix set fw hung and complete waiting mbx (Chad Dupuis) [619814]\n- [scsi] qla2xxx: fix seconds_since_last_heartbeat reset (Chad Dupuis) [619814]\n- [scsi] qla2xxx: correct extended sense-data handling (Chad Dupuis) [619814]\n- [scsi] qla2xxx: dont {s,g}et port MBC if invalid port id (Chad Dupuis) [619814]\n- [scsi] qla2xxx: stop firmware before doing init firmware (Chad Dupuis) [619814]\n- [xen] oprofile: force use of architectural perfmon (Don Dugger) [538564]\n- [xen] oprofile: support Intels arch perfmon registers (Don Dugger) [538564]\n- [xen] oprofile: add support for Core i7 and Atom (Don Dugger) [538564]\n[2.6.18-220.el5]\n- [block] cciss: version string to 3.6.22.RH1 (Tomas Henzl) [568830]\n- [block] cciss: bus_unregister_once not once per hba (Tomas Henzl) [568830]\n- [block] cciss: rename cciss_sector_size (Tomas Henzl) [568830]\n- [block] cciss: make log_unit_to_scsi3addr an inline (Tomas Henzl) [568830]\n- [block] cciss: fix enxio weirdness (Tomas Henzl) [568830]\n- [block] cciss: reorder functions (Tomas Henzl) [568830]\n- [block] cciss: fix raid level sysfs permissions (Tomas Henzl) [568830]\n- [block] cciss: make device attributes static (Tomas Henzl) [568830]\n- [block] cciss: make cciss_seq_show handle drv_array holes (Tomas Henzl) [568830]\n- [block] cciss: add via_ioctl param to rebuild_lun_table (Tomas Henzl) [568830]\n- [block] cciss: add support for multi-lun tape devices (Tomas Henzl) [568830]\n- [block] cciss: notify scsi midlayer of device changes (Tomas Henzl) [568830]\n- [block] cciss: fix scatter-gather on scsi side (Tomas Henzl) [568830]\n- [block] cciss: add more commands for tapes (Tomas Henzl) [568830]\n- [block] cciss: factor out scsi dma code (Tomas Henzl) [568830]\n- [block] cciss: eliminate unnecessary pointer use (Tomas Henzl) [568830]\n- [block] cciss: dont use void pointer for hba (Tomas Henzl) [568830]\n- [block] cciss: detect bad alignment (Tomas Henzl) [568830]\n- [block] cciss: factor out sg chain block mapping code (Tomas Henzl) [568830]\n- [block] cciss: fix DMA direction kludge (Tomas Henzl) [568830]\n- [block] cciss: simplify scatter gather code (Tomas Henzl) [568830]\n- [block] cciss: factor out scatter gather alloc and free (Tomas Henzl) [568830]\n- [block] cciss: enhanced scatter-gather support (Tomas Henzl) [568830]\n- [block] cciss: remove the scan thread (Tomas Henzl) [568830]\n- [block] cciss: fix scsi status typo (Tomas Henzl) [568830]\n- [block] cciss: remove sendcmd (Tomas Henzl) [568830]\n- [block] cciss: clean up code in cciss_shutdown (Tomas Henzl) [568830]\n- [block] cciss: retry driver cmds with unit attention cond (Tomas Henzl) [568830]\n- [block] cciss: no pci_release_regions on regions not held (Tomas Henzl) [568830]\n- [block] cciss: fix memory leak in cciss_init_one (Tomas Henzl) [568830]\n- [block] cciss: dynamically allocate drive info struct (Tomas Henzl) [568830]\n- [block] cciss: fix raid label related magic number (Tomas Henzl) [568830]\n- [block] cciss: no check busy initializing in cciss open (Tomas Henzl) [568830]\n- [block] cciss: add usage_count attribute to logical drive (Tomas Henzl) [568830]\n- [block] cciss: add raid_level attribute to logical drives (Tomas Henzl) [568830]\n- [block] cciss: add lunid attribute to log drives in /sys (Tomas Henzl) [568830]\n- [block] cciss: dont call putdisk excessively (Tomas Henzl) [568830]\n- [block] cciss: zero out drive info on removal (Tomas Henzl) [568830]\n- [block] cciss: handle special case for /dev/cciss/c0d0 (Tomas Henzl) [568830]\n- [block] cciss: handle cases when cciss_add_disk fails (Tomas Henzl) [568830]\n- [block] cciss: fix and rearrange logical drive sysfs code (Tomas Henzl) [568830]\n- [block] cciss: dynamic allocate struct device for logical (Tomas Henzl) [568830]\n- [block] cciss: Use helper functions to access drive_data (Tomas Henzl) [568830]\n- [block] cciss: remove withirq parameter where possible (Tomas Henzl) [568830]\n- [block] cciss: remove sysfs entries during driver cleanup (Tomas Henzl) [568830]\n- [block] cciss: add cciss_sysfs_stat_inquiry function (Tomas Henzl) [568830]\n- [block] cciss: add CTLR_LUNID define (Tomas Henzl) [568830]\n- [block] cciss: Remove unused was_only_controller_node (Tomas Henzl) [568830]\n- [block] cciss: fix problem with LUN addressing (Tomas Henzl) [568830]\n- [block] cciss: fix problem with SG_IO completions (Tomas Henzl) [568830]\n- [block] cciss: retry commands from within sendcmd_withirq (Tomas Henzl) [568830]\n- [block] cciss: change SCSI error handling code (Tomas Henzl) [568830]\n- [block] cciss: remove sendcmd reject processing (Tomas Henzl) [568830]\n- [block] cciss: let scsi error handling work w/interrupts (Tomas Henzl) [568830]\n- [block] cciss: factor out error processing code (Tomas Henzl) [568830]\n- [block] cciss: factor out target status code (Tomas Henzl) [568830]\n- [block] cciss: simplify device addressing methods (Tomas Henzl) [568830]\n- [block] cciss: factor out sendcmd_withirq core (Tomas Henzl) [568830]\n- [block] cciss: use uninterruptible timeout when waiting (Tomas Henzl) [568830]\n- [block] cciss: fix lun reset code (Tomas Henzl) [568830]\n- [block] cciss: factor out sendcmd core for sane interface (Tomas Henzl) [568830]\n- [block] cciss: remove double setting of h->busy (Tomas Henzl) [568830]\n- [block] cciss: disable scan thread, it prevents rmmod (Tomas Henzl) [568830]\n- [net] netxen: fix inconsistent lock state (Chad Dupuis) [562937]\n- [net] netxen: protect tx timeout recovery by rtnl lock (Chad Dupuis) [562937]\n- [net] netxen: fix for kdump (Chad Dupuis) [562937]\n- [net] netxen: fix caching window register (Chad Dupuis) [562937]\n- [net] netxen: fix rcv buffer leak (Chad Dupuis) [562937]\n- [net] netxen: fix memory leaks in error path (Chad Dupuis) [562937]\n- [net] netxen: remove unnecessary returns (Chad Dupuis) [562937]\n- [net] netxen: handle queue manager access (Chad Dupuis) [562937]\n- [net] netxen: to fix onchip memory access. (Chad Dupuis) [562937]\n- [net] netxen: remove unnecessary size checks (Chad Dupuis) [562937]\n- [net] netxen: fix register usage (Chad Dupuis) [562937]\n- [net] netxen: fix deadlock in aer (Chad Dupuis) [562937]\n- [net] netxen: fix interrupt for NX2031 (Chad Dupuis) [562937]\n- [net] netxen: fix fw load from file (Chad Dupuis) [562937]\n- [net] netxen: validate unified romimage (Chad Dupuis) [562937]\n- [net] netxen: fix corner cases of firmware recovery (Chad Dupuis) [562937]\n- [net] netxen: update version to 4.0.73 (Chad Dupuis) [562937]\n- [net] netxen: fix tx csum status (Chad Dupuis) [562937]\n- [net] netxen: added sanity check for pci map (Chad Dupuis) [562937]\n- [net] netxen: fix warning in ioaddr for NX3031 chip (Chad Dupuis) [562937]\n- [net] netxen: fix bios version calculation (Chad Dupuis) [562937]\n- [net] netxen: disable on NX_P3_B1 hardware (Chad Dupuis) [562937]\n- [net] netxen: protect resource cleanup by rtnl lock (Chad Dupuis) [562937]\n- [net] netxen: fix tx timeout recovery for NX2031 chip (Chad Dupuis) [562937]\n- [net] netxen: fix sparse warning (Chad Dupuis) [562937]\n- [net] netxen: fix license header (Chad Dupuis) [562937]\n- [net] netxen: fix endianness intr coalesce (Chad Dupuis) [562937]\n- [net] netxen: fix endianness read mac address (Chad Dupuis) [562937]\n- [net] netxen: use DEFINE_PCI_DEVICE_TABLE() (Chad Dupuis) [562937]\n- [net] netxen: update version to 4.0.72 (Chad Dupuis) [562937]\n- [net] netxen: fix set mac addr (Chad Dupuis) [562937]\n- [net] netxen: fix smatch warning (Chad Dupuis) [562937]\n- [net] netxen: fix tx ring memory leak (Chad Dupuis) [562937]\n- [net] netxen: fix ethtool link test (Chad Dupuis) [562937]\n- [net] netxen: move && and || to end of previous line (Chad Dupuis) [562937]\n- [net] netxen: fix ethtool register dump (Chad Dupuis) [562937]\n- [net] netxen: fix unified fw size check (Chad Dupuis) [562937]\n- [net] netxen: support pci error handlers (Chad Dupuis) [562937]\n- [net] netxen: fix tx timeout recovery (Chad Dupuis) [562937]\n- [net] netxen: minor suspend resume fixes (Chad Dupuis) [562937]\n- [net] netxen: use module parameter correctly (Chad Dupuis) [562937]\n- [net] netxen: fix firmware type check (Chad Dupuis) [562937]\n- [net] netxen: fix napi intr enable check (Chad Dupuis) [562937]\n- [net] netxen: protect device reset by rtnl_lock (Chad Dupuis) [562937]\n- [net] netxen: fix failure cases for fw hang recovery (Chad Dupuis) [562937]\n- [net] netxen: fix debug tools access for NX2031 (Chad Dupuis) [562937]\n- [misc] clone: fix race between copy_process and de_thread (Jiri Olsa) [590864]\n- [s390] dasd: let recovery cqr get flags from failed cqr (Hendrik Brueckner) [628838]\n- [net] ipv4: fix leak, rcu and length in route cache gc (Thomas Graf) [541224]\n- [net] tcp: zero out rx_opt in tcp_disconnect (Thomas Graf) [539560]\n- [net] ipv6: Update Neighbor Cache when IPv6 RA received (Thomas Graf) [560870]\n- [net] ipv6: Plug sk_buff leak in ipv6_rcv (Thomas Graf) [574913]\n- [redhat] configs: enable building k10temp sensor driver (Michal Schmidt) [443745]\n- [hwmon] add k10temp sensor driver (Michal Schmidt) [443745]\n- [pci] add AMD 10h, 11h PCI IDs to pci_ids.h (Michal Schmidt) [443745]\n- [net] vxge: fix multicast issues (Michal Schmidt) [608598]\n- [net] vxge: show startup message with KERN_INFO (Michal Schmidt) [608598]\n- [net] vxge: fix memory leak in vxge_alloc_msix error path (Michal Schmidt) [608598]\n- [net] vxge: fix checkstack warning in vxge_probe (Michal Schmidt) [608598]\n- [net] vxge: remove unnecessary returns from void functs (Michal Schmidt) [608598]\n- [net] vxge: version update (Michal Schmidt) [608598]\n- [net] vxge: pass correct number of VFs value to sriov (Michal Schmidt) [608598]\n- [net] vxge: allow load for all enumerated pci functions (Michal Schmidt) [608598]\n- [net] vxge: fix possible memory leak in device init (Michal Schmidt) [608598]\n- [net] vxge: add missing vlan_rx_kill_vid method (Michal Schmidt) [594404 608598]\n- [net] vxge: remove trailing space in messages (Michal Schmidt) [608598]\n- [net] vxge: use pci_dma_mapping_error to test return val (Michal Schmidt) [608598]\n- [net] vxge: use DEFINE_PCI_DEVICE_TABLE (Michal Schmidt) [608598]\n- [net] vxge: use DMA_BIT_MASK instead of plain values (Michal Schmidt) [608598]\n- [net] vxge: move && and || to end of previous line (Michal Schmidt) [608598]\n- [net] bnx2x: fix wrong return from bnx2x_trylock_hw_lock (Michal Schmidt) [572012]\n- [net] bnx2x: small fix in stats handling (Michal Schmidt) [572012]\n- [net] bnx2x: update bnx2x version to 1.52.53-4 (Michal Schmidt) [572012]\n- [net] bnx2x: fix PHY locking problem (Michal Schmidt) [572012]\n- [net] bnx2x: adjust confusing if indentation (Michal Schmidt) [572012]\n- [net] bnx2x: load firmware in open instead of probe (Michal Schmidt) [572012]\n- [net] bnx2x: fix net/ip6_checksum.h include (Michal Schmidt) [572012]\n- [net] bnx2x: update driver version to 1.52.53-3 (Michal Schmidt) [572012]\n- [net] bnx2x: move statistics handling code to own files (Michal Schmidt) [572012]\n- [net] bnx2x: create separate file for ethtool routines (Michal Schmidt) [572012]\n- [net] bnx2x: create bnx2x_cmn.* files (Michal Schmidt) [572012]\n- [net] bnx2x: main netdev does not need ->poll, ->weight (Michal Schmidt) [572012]\n- [net] bnx2x: move global variable load_count to bnx2x.h (Michal Schmidt) [572012]\n- [net] bnx2x: store module parameters in main structure (Michal Schmidt) [572012]\n- [net] bnx2x: create separate folder for bnx2x driver (Michal Schmidt) [572012]\n- [net] bnx2x: set RXHASH for LRO packets (Michal Schmidt) [572012]\n- [net] bnx2x: return -EINVAL for unsupported flags (Michal Schmidt) [572012]\n- [net] bnx2x: fail when trying to setup unsupported features (Michal Schmidt) [572012]\n- [net] bnx2x: fix link problem with some DACs (Michal Schmidt) [572012]\n- [net] bnx2x: protect a SM state change (Michal Schmidt) [572012]\n- [net] bnx2x: avoid TX timeout when stopping device (Michal Schmidt) [572012]\n- [net] bnx2x: fix check to get RX hash (Michal Schmidt) [572012]\n- [net] bnx2x: remove two unneeded prefetch calls (Michal Schmidt) [572012]\n- [net] bnx2x: add support for receive hashing (Michal Schmidt) [572012]\n- [net] bnx2x: update date and version to 1.52.53-1 (Michal Schmidt) [572012]\n- [net] bnx2x: dont report link down if already down (Michal Schmidt) [572012]\n- [net] bnx2x: rework power state handling code (Michal Schmidt) [572012]\n- [net] bnx2x: use register mask to avoid parity error (Michal Schmidt) [572012]\n- [net] bnx2x: fix MSI-X enabling flow (Michal Schmidt) [572012]\n- [net] bnx2x: add new statistics (Michal Schmidt) [572012]\n- [net] bnx2x: white space and formatting fixups (Michal Schmidt) [572012]\n- [net] bnx2x: protect code with NOMCP (Michal Schmidt) [572012]\n- [net] bnx2x: increase DMAE max write size for 57711 (Michal Schmidt) [572012]\n- [net] bnx2x: add skeleton VPD firmware version read code (Michal Schmidt) [572012]\n- [net] bnx2x: parity error handling for 57710 and 57711 (Michal Schmidt) [572012]\n- [net] bnx2x: use DEFINE_PCI_DEVICE_TABLE() (Michal Schmidt) [572012]\n- [net] bnx2x: move && and || to end of previous line (Michal Schmidt) [572012]\n- [net] bnx2x: remove trailing space in messages (Michal Schmidt) [572012]\n- [net] bnx2x: clean up debug prints (Michal Schmidt) [572012]\n- [net] bnx2x: use macro for phy address (Michal Schmidt) [572012]\n- [net] bnx2x: convert more to %pM (Michal Schmidt) [572012]\n- [net] bnx2x: use pci_ioremap_bar (Michal Schmidt) [572012]\n- [net] bnx2x: make NAPI poll routine closer to upstream (Michal Schmidt) [572012]\n- [net] bnx2x: typo fixes (Michal Schmidt) [572012]\nmacro helpers (Michal Schmidt) [572012]\n- [net] bnx2x: use DMA_BIT_MASK(64) over DMA_64BIT_MASK (Michal Schmidt) [572012]\n- [net] sfc: update to upstream version 2.6.36-rc1 code (Michal Schmidt) [556476]\n- [net] sfc: undo now unnecessary RHEL workqueue changes (Michal Schmidt) [556476]\n- [net] netdevice: add netdev_for_each_mc_addr (Michal Schmidt) [556476]\n- [misc] add round_jiffies_up and related routines (Michal Schmidt) [556476]\n- [net] core: bug fix for vlan + gro issue (Michal Schmidt) [556476]\n- [net] vlan/bridge: fix skb_pull_rcsum fatal exception (Michal Schmidt) [556476]\n- [fs] proc: add file position and flags info in /proc (Jerome Marchand) [498081]\n- [net] e100*/igb*/ixgb*: add missing read memory barrier (Andy Gospodarek) [629761]\n- [net] igb/igbvf: turn on TSO for VLAN interfaces (Andy Gospodarek) [629457]\n- [net] vlan: control vlan device TSO status with ethtool (Andy Gospodarek) [629457]\n- [xen] vtd: fix parameter iommu=no-intremap (Paolo Bonzini) [576478]\n[2.6.18-219.el5]\n- [net] udp: fix bogus UFO packet generation (Jarod Wilson) [632266]\n- [virt] xen: fix xennet driver to not corrupt data (Neil Horman) [630129]\n- [virt] fix 64-bit compile issue in VMWare TSC update (Prarit Bhargava) [538022]\n[2.6.18-218.el5]\n- [net] tcp: prevent sending past receiver window with TSO (Thomas Graf) [494400]\n- [misc] netdevice: add printk helpers for net drivers (Michal Schmidt) [629634]\n- [misc] drivers: remove private definitions of pr_* macros (Michal Schmidt) [629634]\n- [misc] kernel: add pr_* family of printk helper macros (Michal Schmidt) [629634]\n- [infiniband] iw_cxgb3: always define states[] (Michal Schmidt) [629634]\n- [net] ifb: fix syntax error in pr_debug usage (Michal Schmidt) [629634]\n- [net] tg3: disable PME bit during resume (John Feeney) [598530]\n- [net] netfilter: fix crashes caused by fragment jumps (Jiri Pirko) [617268]\n- [virt] update VMWare TSC code (Prarit Bhargava) [538022]\n[2.6.18-217.el5]\n- [time] implement fine grained accounting for PM timer (Ulrich Obergfell) [586285]\n- [time] initialize tick_nsec based on kernel parameters (Ulrich Obergfell) [586285]\n- [time] introduce 'pmtimer_fine_grained' kernel parameter (Ulrich Obergfell) [586285]\n- [scsi] ibmvfc: Fix terminate_rport_io (Steve Best) [628615]\n- [fs] ext3: flush disk caches on fsync when needed (Eric Sandeen) [592961]\n- [fs] ext4: move aio completion after unwritten extent con (Eric Sandeen) [617690]\n- [fs] xfs: move aio completion after unwritten extent conv (Eric Sandeen) [617690]\n- [fs] direct-io: move aio_complete into ->end_io (Eric Sandeen) [617690]\n- [fs] ext4: quota updates for RHEL5.6 (Eric Sandeen) [457153]\n- [fs] ext4: quota infrastructure updates for RHEL5.6 (Eric Sandeen) [457153]\n- [fs] ext4: core updates for RHEL5.6 (Eric Sandeen) [457153]\n- [fs] ext4: add new kernel helpers for RHEL5.6 (Eric Sandeen) [457153]\n- [infiniband] sync iser driver with upstream for RHEL5.6 (Mike Christie) [623595]\n- [net] cxgb3: dont flush workqueue if called from wq (Doug Ledford) [630124]\n- [net] cxgb3: get fatal parity error status on interrupt (Doug Ledford) [630124]\n- [net] cxgb3: clear fatal parity error register on init (Doug Ledford) [630124]\n- [net] cxgb3: add define for fatal parity error bit (Doug Ledford) [630124]\n- [net] qlge: update driver version to 1.00.00.25 (Chad Dupuis) [567402]\n- [net] qlge: fix a eeh handler to not add a pending timer (Chad Dupuis) [567402]\n- [net] qlge: update driver version to 1.00.00.24 (Chad Dupuis) [567402]\n- [net] qlge: remove error pkt flags, enable net csum error (Chad Dupuis) [567402]\n- [net] qlge: restore promiscuous setting in ql_adapter_up (Chad Dupuis) [567402]\n- [net] qlge: change cpu_to_be16 to htons for udp checksum (Chad Dupuis) [567402]\n- [net] qlge: remove firmware dependency for MPI coredump (Chad Dupuis) [567402]\n- [net] qlge: adding ndev->last_rx = jiffies (Chad Dupuis) [567402]\n- [net] qlge: fix pktgen issue reported by Cisco (Chad Dupuis) [567402]\n- [virtio] fix balloon without VIRTIO_BALLOON_F_STATS_VQ (Amit Shah) [601692]\n- [virtio] fix sched while atomic in virtio_balloon stats (Amit Shah) [601692]\n- [virtio] add memory stat reporting to balloon driver (Amit Shah) [601692]\n[2.6.18-216.el5]\n- [net] hashlimit: check allocation before freeing memory (Wade Mealing) [615229]\n- [net] clusterip: check allocation before freeing memory (Wade Mealing) [615227]\n- [ia64] mca: save I-resources when INIT is sent (Takao Indoh) [471136]\n- [scsi] mpt2sas: update to 05.101.00.02 (Tomas Henzl) [568281]\n- [scsi] ipr: bump the version number and date (Steve Best) [626566]\n- [scsi] ipr: fix resource type update and add attributes (Steve Best) [626566]\n- [scsi] ipr: fix transition to operational on new adapters (Steve Best) [626566]\n- [scsi] ipr: change endian swap key for hw spec change (Steve Best) [626566]\n- [scsi] ipr: add support for Obsidian-E embedded adapter (Steve Best) [626566]\n- [scsi] ipr: add MMIO write for BIST on 64-bit adapters (Steve Best) [626566]\n- [scsi] ipr: move setting of allow_restart flag (Steve Best) [626566]\n- [scsi] ipr: add writeq definition if needed (Steve Best) [626566]\n- [scsi] ipr: add endian swap enable for 64-bit adapters (Steve Best) [626566]\n- [scsi] ipr: fix resource path display and formatting (Steve Best) [626566]\n- [scsi] ipr: improve interrupt service routine performance (Steve Best) [626566]\n- [scsi] ipr: set data list length in request control block (Steve Best) [626566]\n- [scsi] ipr: fix register read address on 64-bit adapters (Steve Best) [626566]\n- [scsi] ipr: add resource path to IOA status area struct (Steve Best) [626566]\n- [scsi] ipr: implement fixes for 64-bit adapter support (Steve Best) [626566]\n- [scsi] ipr: fix compile warning (Steve Best) [626566]\n- [fs] ext4: allocate ->s_blockgroup_lock separately (Eric Sandeen) [614957]\n- [pci] xen: disable broken msi/msix on ia64 xen (Radim Krcmar) [518463]\n- [misc] fix non-CONFIG_NUMA x86_64 compile (Prarit Bhargava) [583673]\n- [pnp] ignore both UNSET and DISABLED ioresources (Prarit Bhargava) [560540]\n- [pnp] reserve system board iomem and ioport resources (Prarit Bhargava) [560540]\n- [net] ipv4: add IP_NODEFRAG option for IPv4 socket (Jiri Olsa) [562220]\n- [nfs] sunrpc: cancel task_cleanup work in xprt_destroy (Jeff Layton) [611938]\n- [fs] nfs: fix file create failure with HPUX client (Jeff Layton) [605720]\n- [net] ixgbe: update to upstream version 2.0.84-k2 (Andy Gospodarek) [568602]\n- [net] vlan: add VLAN bitfield defines (Andy Gospodarek) [566027]\n- [net] igb: actually support self_test ethtool command (Andy Gospodarek) [593862]\n- [net] ixgbe: actually support self_test ethtool command (Andy Gospodarek) [593862]\n- [net] ixgbevf: update to version 1.0.0-k1 (Andy Gospodarek) [566027]\n- [net] bonding: fix ALB mode to balance traffic on VLANs (Andy Gospodarek) [578531]\n- [net] igb: do register dump just before resetting adapter (Andy Gospodarek) [568602]\n- [kernel] nmi_watchdog: output count during check on boot (Don Zickus) [613667]\n- [misc] nmi: fix bogus nmi watchdog stuck messages (Don Zickus) [455323]\n- [virt] nmi: dont print NMI stuck messages on guests (Don Zickus) [455323]\n- [misc] nmi_watchdog: add /proc/sys/kernel/nmi_watchdog (Don Zickus) [455323]\n- [misc] scripts: use system python instead of env (Don Zickus) [521878]\n- [pci] sr-iov: fix broken resource alignment calculations (Don Dutile) [523341]\n- [pci] clean up resource alignment management (Don Dutile) [523341]\n- [pci] sr-iov: assign pci resources earlier (Don Dutile) [523341]\n- [net] vxge: update version to reflect RHEL5.6 changes (Bob Picco) [580413]\n- [net] vxge: set func_id 0 as privileged for normal func (Bob Picco) [580413]\n- [net] vxge: fix MSIX interrupt configuration (Bob Picco) [580413]\n- [net] vxge: fix ethtool -d output (Bob Picco) [580413]\n- [net] vxge: align tmemory only if misaligned (Bob Picco) [580413]\n- [net] vxge: fix hw buffer starvation from short packets (Bob Picco) [580413]\n- [net] vxge: fix receive stall w/ driver/chip out-of-sync (Bob Picco) [580413]\n- [cpufreq] add APERF/MPERF support for AMD processors (Bhavna Sarathy) [621335]\n- [xen] vmx: fix handling of FS/GS base MSRs (Michal Novotny) [613187]\n- [xen] hv: improve backtrace support on ia64 (Andrew Jones) [499553]\n- [xen] support new AMD family 0x15 CPU and NB hardware (Bhavna Sarathy) [619092]\n- [xen] allow dom0 to control core performance boost (Bhavna Sarathy) [568771]\n- [xen] add support for dom0 to access APERF/MPERF for AMD (Bhavna Sarathy) [568772]\n[2.6.18-215.el5]\n- [sound] ALSA HDA driver update for RHEL5.6 (Jaroslav Kysela) [592199]\n- [net] igbvf: update to latest upstream for RHEL5.6 (Stefan Assmann) [566028]\n- [net] igb: update igb driver to support Portville ACS (Stefan Assmann) [566024]\n- [net] igb: fix error in igb AER code (Stefan Assmann) [612212]\n- [ata] libata: fix suspend/resume for ATA SEMB devices (David Milburn) [622559]\n- [ata] sata_mv: msi masking fix (David Milburn) [554872]\n- [ata] sata_mv: Properly initialize main irq mask (David Milburn) [554872]\n- [ata] sata_mv: remove bogus nsect restriction (David Milburn) [554872]\n- [ata] sata_mv: dont read hc_irq_cause (David Milburn) [554872]\n- [ata] sata_mv: add the Gen IIE flag to the SoC devices (David Milburn) [554872]\n- [ata] sata_mv: dont issue two DMA commands concurrently (David Milburn) [554872]\n- [ata] sata_mv: safer logic for limit warnings (David Milburn) [554872]\n- [ata] sata_mv: warn on PIO with multiple DRQs (David Milburn) [554872]\n- [ata] sata_mv: enable async_notify for 60x1 Rev.C0 and up (David Milburn) [554872]\n- [s390] zfcp: Do not print bit mask as link speed (Hendrik Brueckner) [619857]\n- [s390] dasd: force online does not work (Hendrik Brueckner) [619466]\n- [s390] dasd: allocate fallback cqr for reserve/release (Hendrik Brueckner) [619465]\n- [s390] qeth: wait for finished recovery (Hendrik Brueckner) [619456]\n- [s390] qeth: avoid loop if ipa command response missing (Hendrik Brueckner) [619451]\n- [s390] zfcp: no force close when port is already closed (Hendrik Brueckner) [612263]\n- [s390] zfcp: Do not unblock rport from REOPEN_PORT_FORCED (Hendrik Brueckner) [612266]\n- [s390] zfcp: Fail erp after timeout (Hendrik Brueckner) [612261]\n- [message] fusion: update to 3.4.15 (Tomas Henzl) [568292]\n- [net] ipv6: reroute packets after netfilter mangling (Thomas Graf) [517327]\n- [scsi] lpfc: update driver from 8.2.0.76.1p to 8.2.0.77 (Rob Evers) [603806]\n- [virt] xenbus: avoid deadlock unregistering xenbus watch (Paolo Bonzini) [429102]\n- [ia64] kdump: prevent hang on INIT interrupt during boot (Neil Horman) [506694]\n- [net] qla3xxx: fix oops on too-long netdev priv structure (Neil Horman) [620508]\n- [kprobes] kretprobe: set status to fix fault handling (Josh Stone) [615121]\n- [net] bonding: fix a race in calls to slave MII ioctls (Flavio Leitner) [621280]\n- [virt] xen-kernel: improve backtrace support on ia64 (Andrew Jones) [499553]\n- [acpi] thinkpad-acpi: lock down video output state access (Don Howard) [607037]\n- [fs] xfs: fix untrusted inode number lookup (Dave Chinner) [624862]\n[2.6.18-214.el5]\n- [mm] accept an abutting stack segment (Jiri Pirko) [607858] {CVE-2010-2240}\n- [fs] fix dcache accounting bug (Josef Bacik) [596548]\n- [scsi] mptsas: enable TLR for SSP TAPE drives (Tomas Henzl) [599420]\n- [scsi] sas: add transport layer retry support (Tomas Henzl) [599420]\n- [scsi] fix potential kmalloc failure in scsi_get_vpd_page (Tomas Henzl) [599420]\n- [scsi] fix bugs in scsi_vpd_inquiry (Tomas Henzl) [599420]\n- [scsi] add VPD helper (Tomas Henzl) [599420]\n- [x86_64] implement vDSO randomization (Danny Feng) [459763]\n- [virt] xen: dont adjust time for ntp clock slowing (Bretislav Kabele) [553407]\n- [net] ibmveth: fix lost IRQ that leads to service loss (Steve Best) [626841]\n- [scsi] cxgb3i: sync driver with upstream for RHEL5.6 (Mike Christie) [567444]\n- [net] sched: fix some kernel memory leaks (Jiri Pirko) [624638] {CVE-2010-2942}\n- [tpm] autoload tpm_tis driver (John Feeney) [530123]\n- [usb] fix usbfs information leak (Eugene Teo) [566629] {CVE-2010-1083}\n- [virtio] console: Backport driver for RHEL 5.6 (Amit Shah) [620037]\n- [virtio] add virtqueue_ vq_ops wrappers (Amit Shah) [620037]\n- [virtio] initialize vq->data entries to NULL (Amit Shah) [620037]\n- [virtio] add ability to detach unused buffers from vrings (Amit Shah) [620037]\n- [virtio] make add_buf return capacity remaining (Amit Shah) [620037]\n- [virtio] find_vqs/del_vqs virtio operations (Amit Shah) [620037]\n- [virtio] add names to virtqueue struct (Amit Shah) [620037]\n- [virtio] more neatening of virtio_ring macros (Amit Shah) [620037]\n- [virtio] fix BAD_RING, START_US and END_USE macros (Amit Shah) [620037]\n[2.6.18-213.el5]\n- [mm] pass correct mm when growing stack (Jiri Pirko) [607858] {CVE-2010-2240}\n- [mm] fix up some user-visible effects of stack guard page (Jiri Pirko) [607858] {CVE-2010-2240}\n- [mm] fix page table unmap for stack guard page properly (Jiri Pirko) [607858] {CVE-2010-2240}\n- [mm] fix missing unmap for stack guard page failure case (Jiri Pirko) [607858] {CVE-2010-2240}\n- [mm] keep a guard page below a grow-down stack segment (Jiri Pirko) [607858] {CVE-2010-2240}\n- [net] tcp: fix div by zero in congestion control protos (Neil Horman) [608641]\n- [net] tcp: tcp_vegas ssthresh bug fix (Thomas Graf) [612709]\n- [net] tcp: tcp_vegas cong avoid fix (Thomas Graf) [612709]\n- [net] tcp: fix overflow bug in Vegas (Thomas Graf) [612709]\n- [net] tcp: fix Vegas bug in disabling slow start (Thomas Graf) [612709]\n- [net] tcp: increase Vegas default alpha and beta params (Thomas Graf) [612709]\n- [net] tcp: tcp_hybla zero congestion window growth fix (Thomas Graf) [612709]\n- [net] tcp: htcp last_cong bug fix (Thomas Graf) [612709]\n- [net] tcp: TCP cubic v2.2 (Thomas Graf) [612709]\n- [net] tcp: faster cube root (Thomas Graf) [612709]\n- [net] tcp: backport cubic update for net-2.6.22 (Thomas Graf) [612709]\n- [net] tcp: set Cubic and BIC default thresholds to zero (Thomas Graf) [612709]\n- [net] tcp: congestion control initialization (Thomas Graf) [612709]\n- [net] tcp: uninline tcp_is_cwnd_limited (Thomas Graf) [612709]\n- [net] tcp: move prior_in_flight collect to better spot (Thomas Graf) [612709]\n- [fs] ext4: consolidate in_range definitions (Eric Sandeen) [624332] {CVE-2010-3015}\n- [net] dont double count UDP_INERRORS (Neil Horman) [618818]\n- [scsi] be2iscsi: sync with upstream for RHEL5.6 (Mike Christie) [569643]\n- [mmc] sdhci: fix system cannot enter S4 with SD card (Matthew Garrett) [606899]\n- [cpufreq] powernow-k8: support AMD Core Performance Boost (Matthew Garrett) [568751]\n- [fs] cifs: remove force parm from cifs_unix_info_to_inode (Jeff Layton) [619112]\n- [fs] nfs: fix NFS4ERR_FILE_OPEN handling in Linux/NFS (Jeff Layton) [604044]\n- [usb] fix test of wrong variable in create_by_name (Don Howard) [594635]\n- [s390] cio: fix cause of unexpected recovery actions (Hendrik Brueckner) [621330]\n[2.6.18-212.el5]\n- [ipmi] add parameter to limit CPU usage in kipmid (Takao Indoh) [494680]\n- [net] bnx2x: Added GRO support (Stanislaw Gruszka) [573114]\n- [net] bnx2x: fix memory barriers (Stanislaw Gruszka) [569370]\n- [ppc] partition hibernation support (Steve Best) [565570]\n- [ppc] Add resume handler to powerpc time management code (Steve Best) [565570]\n- [scsi] ibmvscsi: Fix soft lockup on resume (Steve Best) [565570]\n- [scsi] ibmvfc: Fix soft lockup on resume (Steve Best) [565570]\n- [scsi] ibmvfc: Add suspend/resume support (Steve Best) [565570]\n- [scsi] ibmvscsi: Add suspend/resume support (Steve Best) [565570]\n- [net] ibmveth: Add suspend/resume support (Steve Best) [565570]\n- [ppc] vio: add power management support (Steve Best) [565570]\n- [ppc] add hooks to put CPU in appropriate offline state (Steve Best) [565570]\n- [virt] xen: fix passthrough of SR-IOV VF (Paolo Bonzini) [582886]\n- [mm] add option to skip ZERO_PAGE mmap of /dev/zero (Larry Woodman) [619541]\n- [net] bonding: check if clients MAC addr has changed (Flavio Leitner) [610234]\n- [virt] xen: fix pud_present compile warnings (Don Zickus) [590760]\n- [xen] CPU synchronization during MTRR register update (Don Dugger) [594546]\n[2.6.18-211.el5]\n- [pci] fix remove of proc entry for hotplug devices (Wade Mealing) [618114]\n- [ide]: atiixp: no pio autotune on AMD Hudson2 (Prarit Bhargava) [618075]\n- [pci] msi: add option for lockless interrupt mode (Prarit Bhargava) [599295]\n- [virt] xenbus: implement O_NONBLOCK (Paolo Bonzini) [470801]\n- [net] ip4v/tcp: no additional reset on closed sockets (Neil Horman) [605259]\n- [misc] xen: fix migration using xen-vnif in smp hvm guest (Miroslav Rezanina) [555910]\n- [edac] fix i7core_edac in multi-socket systems (Mauro Carvalho Chehab) [468877]\n- [net] arp_tables: fix unaligned accesses (Jiri Pirko) [582268]\n- [fs] ext3: handle journal_start failure properly (Josef Bacik) [588599]\n- [misc] handle dead hung uninterruptible tasks correctly (Jerome Marchand) [582237]\n- [fs] ecryptfs: fix ecryptfs_uid_hash buffer overflow (Jerome Marchand) [611387] {CVE-2010-2492}\n- [infiniband] check local reserved ports (Jerome Marchand) [557884]\n- [infiniband] randomize local port allocation (Jerome Marchand) [557884]\n- [net] reserve ports for apps using fixed port numbers (Jerome Marchand) [557884]\n- [kernel] sysctl: add proc_do_large_bitmap (Jerome Marchand) [557884]\n- [scsi] lpfc: use kernel-provided random32 (Jarod Wilson) [605816]\n- [lib] make tausworthe random32 generator available to all (Jarod Wilson) [605816]\n- [net] be2net: increase POST timeout for EEH recovery (Ivan Vecera) [616512]\n- [hwmon] coretemp: get TjMax value from MSR (Dean Nelson) [580699]\n- [hwmon] coretemp: detect the thermal sensors by CPUID (Dean Nelson) [580699]\n- [fs] xfs: rename XFS_IGET_BULKSTAT to XFS_IGET_UNTRUSTED (Dave Chinner) [607032]\n- [fs] xfs: validate untrusted inode numbers during lookup (Dave Chinner) [607032]\n- [fs] xfs: always use iget in bulkstat (Dave Chinner) [607032]\n- [s390] qeth: support for OSA CHPID types OSX and OSM (Hendrik Brueckner) [599644]\n- [s390] qeth: dont allow layer switch with open interface (Hendrik Brueckner) [612195]\n- [s390] zfcp: fix reference counting on adisc (Hendrik Brueckner) [610089]\n- [s390] kernel: initrd vs bootmem bitmap (Hendrik Brueckner) [610837]\n- [s390] hypfs: fix high cpu time output (Hendrik Brueckner) [589282]\n- [s390] dasd: fix race between tasklet and dasd_sleep_on (Hendrik Brueckner) [593756]\n- [s390] cmm: fix module unload handling (Hendrik Brueckner) [598549]\n- [fs] gfs: clean up stuffed file data copy handling (Abhijith Das) [580867]\n[2.6.18-210.el5]\n- [scsi] ips driver sleeps while holding spin_lock (Steve Best) [616961]\n- [net] fix lockups and dupe addresses w/bonding and ipv6 (Shyam Iyer) [516985]\n- [scsi] megaraid_sas: update driver to version 4.31 (Tomas Henzl) [564249]\n- [scsi] megaraid_sas: update driver to version 4.27 (Rob Evers) [564249]\n- [net] nat: avoid rerouting packets if only key changed (Jiri Pirko) [566144]\n- [fs] cifs: remove bogus check in NTLM session setup code (Jeff Layton) [479418]\n- [ata] ahci: add em_buffer attribute for AHCI hosts (David Milburn) [568364]\n- [scsi] qla4xxx: add support for ISP82XX (Chad Dupuis) [546592]\n- [scsi] qla4xxx: Fixes from upstream for 5.6 (Chad Dupuis) [546592]\n- [scsi] qla2xxx: more upstream updates for RHEL 5.6 (Chad Dupuis) [567428]\n- [scsi] qla2xxx: add support for ISP82XX (Chad Dupuis) [567428]\n- [scsi] qla2xxx: more updates from upstream for RHEL 5.6 (Chad Dupuis) [567428]\n- [scsi] qla2xxx: update to 8.03.01.05.05.06-k (Chad Dupuis) [567428]\n- [xen] correct bitsize calculation for 32-on-64 (Andrew Jones) [616827]\n[2.6.18-209.el5]\n- [net] r8169: fix for broken register writes (Ivan Vecera) [581654]\n- [serial] remove contact info for ite887x chip support (Dean Nelson) [563271]\n- [serial] fix modpost warning in ite887x driver (Dean Nelson) [563271]\n- [serial] add support for ite887x chips (Dean Nelson) [563271]\n- [parport] increase ite887xs I/O port range (Dean Nelson) [563271]\n- [scsi] qla2xxx: update firmware to version 5.03.02 (Chad Dupuis) [578444 598946]\n- [fs] cifs: reject DNS upcall add_key req from userspace (Jeff Layton) [612171] {CVE-2010-2524}\n- [security] keys: new key flag for add_key from userspace (Jeff Layton) [612171] {CVE-2010-2524}\n[2.6.18-208.el5]\n- [fs] gfs2: fix rename causing kernel oops (Robert S Peterson) [602025]\n- [misc] io_apic: skip timer_irq_works check when on VMware (Prarit Bhargava) [575309]\n- [scsi] be2iscsi: fix for 64k data length sge (Mike Christie) [608801]\n- [mm] fix excessive memory reclaim from zones w/lots free (Larry Woodman) [604779]\n- [mm] properly release all hugepages on database shutdown (Larry Woodman) [593131]\n- [net] fix accept_local handling for dev with no xattrs (Jiri Olsa) [601370]\n- [fs] nfs: i_nlinks changes must set NFS_INO_INVALID_ATTR (Jeff Layton) [601800]\n- [fs] nfs: fix resolution in nfs_inode_attrs_need_update (Jeff Layton) [601800]\n- [fs] nfs: fix compiler warnings introduced recently (Jeff Layton) [601800]\n- [fs] nfs: fix attribute updates even more (Jeff Layton) [601800]\n- [fs] nfs: fix the NFS attribute update (Jeff Layton) [601800]\n- [fs] nfs: clean up inode handling functions (Jeff Layton) [601800]\n- [fs] nfs: nfs_refresh_inode should clear cache_validity (Jeff Layton) [601800]\n- [fs] nfs: use nfs_refresh_inode in __nfs_revalidate_inode (Jeff Layton) [601800]\n- [ata] ahci, pata_marvell: fixup competition for PATA port (David Milburn) [237372]\n- [net] qlcnic: Add QLCNIC to Kconfig and Makefile (Chad Dupuis) [562723]\n- [net] qlcnic: enable building driver module (Chad Dupuis) [562723]\n- [net] qlcnic: remove extra space from board names (Chad Dupuis) [562723]\n- [net] qlcnic: fix bios version check (Chad Dupuis) [562723]\n- [net] qlcnic: validate unified fw image (Chad Dupuis) [562723]\n- [net] qlcnic: fix multicast handling (Chad Dupuis) [562723]\n- [net] qlcnic: additional driver statistics. (Chad Dupuis) [562723]\n- [net] qlcnic: fix tx csum status (Chad Dupuis) [562723]\n- [net] qlcnic: add loopback diagnostic test (Chad Dupuis) [562723]\n- [net] qlcnic: add interrupt diagnostic test (Chad Dupuis) [562723]\n- [net] qlcnic: support LED blink for device identification (Chad Dupuis) [562723]\n- [net] qlcnic: protect resoruce cleanup by rtnl lock (Chad Dupuis) [562723]\n- [net] qlcnic: clear device reset state after fw recovery (Chad Dupuis) [562723]\n- [net] qlcnic: add ethernet identifier in board info (Chad Dupuis) [562723]\n- [net] qlcnic: use DEFINE_PCI_DEVICE_TABLE (Chad Dupuis) [562723]\n- [net] qlcnic: add Qlogic ethernet driver for CNA devices (Chad Dupuis) [562723]\n- Revert: [fs] cifs: reject DNS upcall add_key req from userspace (Jeff Layton) [612171] {CVE-2010-2524}\n- Revert: [security] keys: new key flag for add_key from userspace (Jeff Layton) [612171] {CVE-2010-2524}\n[2.6.18-207.el5]\n- [usb] uhci: fix oops in uhci_scan_schedule (Pete Zaitcev) [516851]\n- [wireless] rtl818x: use cancel_work_sync (Stanislaw Gruszka) [582191]\n- [wireless] iwlwifi: use cancel_work_sync (Stanislaw Gruszka) [582191]\n- [wireless] ath9k: use cancel_work_sync (Stanislaw Gruszka) [582191]\n- [wireless] rt2x00: use cancel_work_sync (Stanislaw Gruszka) [582191]\n- Revert: [wireless] rt2x00: fix work cancel race condition (Stanislaw Gruszka) [582191]\n- [wireless] use cancel_work_sync in mac80211 and core (Stanislaw Gruszka) [582191]\n- [misc] workqueue: add cancel_work_sync to include (Stanislaw Gruszka) [582191]\n- [net] igb: drop support for UDP hashing w/ RSS (Stefan Assmann) [613780]\n- [misc] signals: avoid unnecessary credentials check (Oleg Nesterov) [459901]\n- [acpi] tell platformthat we support fixed hw T-states (Matthew Garrett) [569590]\n- [edac] i7core_edac: Backport driver to RHEL5 (Mauro Carvalho Chehab) [468877]\n- [edac] i7core_edac: add driver for new Nehalem (Mauro Carvalho Chehab) [468877]\n- [x86_64] mce: fix misplaced 'continue' in mce.c (Mauro Carvalho Chehab) [468877]\n- [pci] Add a probing code that seeks for an specific bus (Mauro Carvalho Chehab) [468877]\n- [edac] add support for DDR3 at EDAC core (Mauro Carvalho Chehab) [468877]\n- [wireless] Kconfig: select WIRELESS_COMPAT as needed (John Linville) [583767]\n- [i386] oprofile: fix detection of Intel CPU family 6 (John Villalovos) [581919]\n- [misc] intel: support for Intel Cougar Point Chipset (John Villalovos) [566854]\n- [fs] xfs: dont let swapext operate on write-only files (Jiri Pirko) [605161] {CVE-2010-2226}\n- [fs] nfs: fix bug in nfsd4 read_buf (Jiri Olsa) [612035] {CVE-2010-2521}\n- [fs] nfsd: add lockdep annotation to nfsd4 recover code (Jeff Layton) [567092]\n- [fs] nfs: wait for close before silly-renaming (Jeff Layton) [565974]\n- [fs] cifs: enable CONFIG_CIFS_STATS (Jeff Layton) [574795]\n- [net] sunrpc: translate an -ENETUNREACH to -ENOTCONN (Jeff Layton) [481372]\n- [fs] cifs: merge CIFSSMBQueryEA with CIFSSMBQAllEAs (Jeff Layton) [527268]\n- [fs] cifs: verify lengths of QueryAllEAs reply (Jeff Layton) [527268]\n- [fs] cifs: increase maximum buffer size in CIFSSMBQAllEAs (Jeff Layton) [527268]\n- [fs] cifs: rename name_len to list_len in CIFSSMBQAllEAs (Jeff Layton) [527268]\n- [fs] cifs: clean up indentation in CIFSSMBQAllEAs (Jeff Layton) [527268]\n- [fs] cifs: reject DNS upcall add_key req from userspace (Jeff Layton) [612171] {CVE-2010-2524}\n- [fs] cifs: add parens around smb_var in BCC macros (Jeff Layton) [527268]\n- [security] keys: new key flag for add_key from userspace (Jeff Layton) [612171] {CVE-2010-2524}\n- [specfile] skip xen tarball and patching if building w/o xen (Jarod Wilson)\n- [specfile] replace ancient and deprecated rpm syntax (Jarod Wilson)\n- [virt] xen: remove sysdata hack from irq-xen.c (Paolo Bonzini) [561390]\n- [xen] msi fixmap cleanup and vector teardown (Don Dugger) [516236]\n[2.6.18-206.el5]\n- [x86] kprobes: introduce kprobes jump optimization (Masami Hiramatsu) [516313]\n- [x86] add x86_64 alternatives_text_reserved interface (Masami Hiramatsu) [516313]\n- [x86_64] kprobes: upstream update for rhel5.6 (Masami Hiramatsu) [516313]\n- [x86_64] add instruction decoder API (Masami Hiramatsu) [516313]\n- [fusion] mpt: fix deregister calls in exit path (hiro muneda) [581523]\n- [net] cxgb3: wait longer for control packets on init (Steve Best) [587670]\n- [scsi] scsi_dh_alua: add IBM Power Virtual SCSI ALUA dev (Steve Best) [567292]\n- [fs] gfs2: fix stuck in inode wait, no glocks stuck (Robert S Peterson) [595397]\n- [message] mptsas: fix disk add failing due to timeout (Rob Evers) [542892]\n- [scsi] lpfc: update from 8.2.0.73.1p to 8.2.0.76.1p (Rob Evers) [591674]\n- [scsi] lpfc: update from 8.2.0.63.p3 to 8.2.0.73.1p (Rob Evers) [571862]\n- [i2c] fix exports types for recently added i2c symbols (Prarit Bhargava) [611774]\n- [virt] xen: fix 32-bit syscalls on 64-bit kernel (Paolo Bonzini) [561394]\n- [virt] xen: add tracepoint for kernel pagefault event (Paolo Bonzini) [561385]\n- [security] selinux: fix race with re-parenting (Oleg Nesterov) [556675]\n- [net] sctp: fix length checks (Neil Horman) [605305]\n- [acpi] intel: avoid skipping ARB_DISABLE on model 0x0e (Matthew Garrett) [602846]\n- [block] cfq-iosched: fix bad locking in changed_ioprio (Jeff Moyer) [582435]\n- [block] cfq-iosched: kill cfq_exit_lock (Jeff Moyer) [582435]\n- [fs] cifs: fix kernel BUG with remote OS/2 server (Jeff Layton) [608588] {CVE-2010-2248}\n- [fs] cifs: dont try busy-file rename unless in same dir (Jeff Layton) [603706]\n- [fs] nfsd: dont break lease while servicing COMMIT call (Jeff Layton) [575817]\n- [fs] force target reval when following LAST_BIND symlinks (Jeff Layton) [571518]\n- [net] be2net: update to v2.102.348r with SR-IOV support (Ivan Vecera) [568388]\n- [net] virtio_net: add set_multicast_list (Herbert Xu) [552574]\n- [net] gro: fix bogus gso_size on the first fraglist entry (Herbert Xu) [588015]\n- [time] fix softlockups in RHEL5 virt guests (Glauber Costa) [607443]\n- [time] count ticks when loss gt cycle_accounted_limit (Glauber Costa) [584679]\n- [net] e1000e: dont inadvertently re-set INTX_DISABLE (Dean Nelson) [496127]\n- [scsi] fixup size on read capacity failure (David Milburn) [569654]\n- [s390] smsgiucv: add missing check for z/VM (Hendrik Brueckner) [590737]\n- [s390] zcore: fix reipl device detection (Hendrik Brueckner) [587027]\n- [s390] zcrypt: print error message for 8/72 error (Hendrik Brueckner) [563545]\n- [s390] kernel: fix dump indicator (Hendrik Brueckner) [546288]\n- [net] bluetooth: fix possible bad memory access via sysfs (Mauro Carvalho Chehab) [576021] {CVE-2010-1084}\n[2.6.18-205.el5]\n- [scsi] ipr: adds PCI ID definitions for new adapters (Steve Best) [563589]\n- [scsi] ipr: add support for new IOASCs (Steve Best) [563589]\n- [scsi] ipr: add support for multiple stages of init (Steve Best) [563589]\n- [scsi] ipr: implement shutdown changes (Steve Best) [563589]\n- [scsi] ipr: hardware assisted smart dump functionality (Steve Best) [563589]\n- [scsi] ipr: add error handling updates for next gen chip (Steve Best) [563589]\n- [scsi] ipr: update the config table for next gen chip (Steve Best) [563589]\n- [scsi] ipr: define register offsets for next gen chip (Steve Best) [563589]\n- [scsi] ipr: add command structures for next gen chip (Steve Best) [563589]\n- [scsi] ipr: differentiate pci-x and pci-e based adapters (Steve Best) [563589]\n- [scsi] ipr: add test for MSI interrupt support (Steve Best) [563589]\n- [scsi] ipr: add message to error table (Steve Best) [563589]\n- [scsi] ipr: handle logically bad block write errors (Steve Best) [563589]\n- [scsi] ipr: convert to use the data buffer accessors (Steve Best) [563589]\n- [scsi] ipr: add some defines that are missing in RHEL5.5 (Steve Best) [563589]\n- [scsi] ipr: add workaround for MSI interrupts on P7 (Steve Best) [572333]\n- [net] tcp: fix rcv mss estimate for lro (Stanislaw Gruszka) [593801]\n- [virt] xen netback: copy skbuffs if head crosses pages (Paolo Bonzini) [578259]\n- [virt] xen: handle softirqs at end of event processing (Paolo Bonzini) [564523]\n- [virt] fix tsccount clocksource under kvm guests (Glauber Costa) [581396]\n- [net] benet: compat header cleanups, part 2 (Ivan Vecera) [546740]\n- [net] benet: compat header cleanups, part 1 (Prarit Bhargava) [546740]\n- [net] bnx2: compat header cleanups (Prarit Bhargava) [546740]\n- [net] e1000/e1000e: compat header cleanup (Prarit Bhargava) [546740]\n- [net] enic: compat header cleanup (Prarit Bhargava) [546740]\n- [net] forcedeth: compat header cleanup (Prarit Bhargava) [546740]\n- [net] igb: compat header cleanups (Prarit Bhargava) [546740]\n- [net] ixgbe: compat header cleanups (Prarit Bhargava) [546740]\n- [net] myri10ge: compat header cleanups (Prarit Bhargava) [546740]\n- [net] netxen: compat header cleanup (Prarit Bhargava) [546740]\n- [net] niu: compat header cleanup (Prarit Bhargava) [546740]\n- [net] qlge: compat header cleanup (Prarit Bhargava) [546740]\n- [net] r8169: compat header cleanups, part 2 (Ivan Vecera) [546740]\n- [net] r8169: compat header cleanups, part 1 (Prarit Bhargava) [546740]\n- [net] sfc: compat header cleanups (Prarit Bhargava) [546740]\n- [net] sky2: compat header cleanup (Prarit Bhargava) [546740]\n- [net] tg3: compat header cleanup (Prarit Bhargava) [546740]\n- [net] bonding: compat header cleanup (Prarit Bhargava) [546740]\n- [net] move compat header file contents to proper includes (Prarit Bhargava) [546740]\n- [net] ethernet: compat header cleanups (Prarit Bhargava) [546740]\n- [net] chelsio: compat header cleanups (Prarit Bhargava) [546740]\n- [net] s2io: compat header cleanups (Prarit Bhargava) [546740]\n- [net] vxge: compat header cleanup (Prarit Bhargava) [546740]\n- [infiniband] compat header cleanups (Prarit Bhargava) [546740]\n- [scsi] compat header cleanups (Prarit Bhargava) [546740]\n- [misc] readq/writeq compat header cleanup (Prarit Bhargava) [546740]\n- [pci] compat header cleanups (Prarit Bhargava) [546740]\n- [misc] compat.h cleanup: add cancel_delayed_work_sync (Prarit Bhargava) [546740]\n- [i2c] compat header cleanups (Prarit Bhargava) [546740]\n- [fs] nfs: fix memory leak when using -onolock on nfs v2/3 (Jeff Layton) [592908]\n[2.6.18-204.el5]\n- [fs] gfs2: fix ordering of ordered writes (Steven Whitehouse) [581013]\n- [net] cnic: fix bnx2x panic w/multiple interfaces enabled (Stanislaw Gruszka) [602402]\n- [x86_64] unify apic mapping code (Prarit Bhargava) [573858]\n- [virt] xen: fix Connected state after netback dev closed (Paolo Bonzini) [591548]\n- [net] ipv4: add sysctl to accept packets w/local source (Jiri Olsa) [601370]\n- [nfs] fix unitialized list head on error exit in recovery (Jeff Layton) [569342]\n- [virt] virtio_blk: add support for cache flushes (Christoph Hellwig) [571735]\n- [xen] ia64: unset be from the task psr (Andrew Jones) [587477] {CVE-2010-2070}\n[2.6.18-203.el5]\n- [misc] permit larger than 2TB USB and FW drives (Pete Zaitcev) [503864]\n- [net] cnic: fix panic when nl msg rcvd when device down (Stanislaw Gruszka) [595862]\n- [infiniband] ehca: require in_wc in process_mad (Steve Best) [571517]\n- [net] igb: Add support for pci-e Advanced Error Reporting (Stefan Assmann) [568221]\n- [fs] ext4: MOVE_EXT cant overwrite append-only files (Eric Sandeen) [601008] {CVE-2010-2066}\n- [net] wireless: convert reg_regdb_search_lock to mutex (John Linville) [597334]\n- [net] tcp: dont send keepalive probes if receiving data (Flavio Leitner) [593040]\n- [hwmon] add support for additional CPU models to coretemp (Dean Nelson) [559228]\n- [fs] gfs2: use -EUSERS when mounting w/o enough journals (Abhijith Das) [600387]\n- [misc] workqueue: make cancel_work_sync EXPORT_SYMBOL_GPL (Oleg Nesterov) [596626]\n[2.6.18-202.el5]\n- [fs] gfs2: fix permissions checking for setflags ioctl (Steven Whitehouse) [595399] {CVE-2010-1641}\n- [mm] clear page errors when issuing a fresh read of page (Rik van Riel) [590763]\n- [misc] keys: do not find already freed keyrings (Vitaly Mayatskikh) [585100] {CVE-2010-1437}\n- [misc] workqueue: silence kabi checker (Stanislaw Gruszka) [596626]\n- [misc] workqueue: implement cancel_work_sync (Oleg Nesterov) [596626]\n- [misc] workqueue: implement try_to_grab_pending (Oleg Nesterov) [596626]\n- [misc] workqueue: prep flush_cpu_workqueue for additions (Oleg Nesterov) [596626]\n- [misc] workqueue: implement wait_on_work (Oleg Nesterov) [596626]\n- [misc] workqueue: add set_wq_data and get_wq_data helpers (Oleg Nesterov) [596626]\n- [misc] workqueue: cwq instead of wq where appropriate (Oleg Nesterov) [596626]\n- [misc] workqueue: initial prep for cancel_work_sync (Oleg Nesterov) [596626]\n- [net] sctp: file must be valid before setting timeout (Jiri Pirko) [578261]\n- [net] tg3: fix panic in tg3_interrupt (John Feeney) [569106]\n- [net] e1000/e1000e: implement simple interrupt moderation (Andy Gospodarek) [586416]\n- [virt] dont compute pvclock adjustments if we trust tsc (Glauber Costa) [570824]\n- [virt] add a global synchronization point for pvclock (Glauber Costa) [570824]\n- [virt] enable pvclock flags in vcpu_time_info structure (Glauber Costa) [570824]\n- [misc] add atomic64_cmpxcgh to x86_64 include files (Glauber Costa) [570824]\n- [x86] grab atomic64 types from upstream (Glauber Costa) [570824]\n- [pci] cleanup error return for pcix get/set mmrbc calls (Dean Nelson) [578492]\n- [pci] fix pcix access of PCI_X_CMD get/set mmrbc calls (Dean Nelson) [578492]\n- [pci] fix return value from pcix_get_max_mmrbc() (Dean Nelson) [578492]\n- [pci] prepare for backport of upstream fixes and cleanup (Dean Nelson) [578492]\n- [net] ipv6: fix more memory leaks when ndisc_init fails (Amerigo Wang) [555338]\n- [xen] bring back VMXE/SVME flags (Andrew Jones) [570091]\n[2.6.18-201.el5]\n- [s390] qdio: continue polling for buffer state ERROR (Hendrik Brueckner) [565531]\n- [pci] acpiphp: fix missing acpiphp_glue_exit (Prarit Bhargava) [515556]\n- [net] cnic: Fix crash during bnx2x MTU change (Stanislaw Gruszka) [582367]\n- [net] bxn2x: add dynamic lro disable support (Stanislaw Gruszka) [582367]\n- [net] implement dev_disable_lro api for RHEL5 (Stanislaw Gruszka) [582367]\n[2.6.18-200.el5]\n- [fs] getrusage: fill ru_maxrss value (Amerigo Wang) [466157]\n- [net] bonding: fix broken multicast with round-robin mode (Andy Gospodarek) [570645]\n- [usb] input: fix keyboard LEDs on all the time (Pete Zaitcev) [513934]\n- [x86_64] fix time drift due to faulty lost tick tracking (Ulrich Obergfell) [579711]\n- [cciss] remove extraneous printk (Tomas Henzl) [582465]\n- [sunrpc] fix AUTH_SYS using sec=sys export option (Sachin Prabhu) [573652]\n- [misc] fix itimers periodic tics precision (Stanislaw Gruszka) [441134]\n- [net] tg3: fix INTx fallback when MSI fails (Steve Best) [587666]\n- [fs] quota: fix possible infinite loop in quota code (Eric Sandeen) [546060]\n- [misc] add {thread,core}_siblings_list to /sys (Prarit Bhargava) [570610]\n- [misc] add /sys/devices/system/node/nodeX/cpulist files (Prarit Bhargava) [572285]\n- [net] tun: orphan an skb on tx (Michael S. Tsirkin) [584412]\n- [edac] fix panic when a corrected error happens on i5000 (Mauro Carvalho Chehab) [533391]\n- [net] iwlwifi: re-enable IWLWIFI_LEDS (John Linville) [582003]\n- [net] calc TCPs connection closethreshold as time value (Jiri Pirko) [582722]\n- [net] sched: fix SFQ qdisc crash w/limit of 2 packets (Jiri Pirko) [579774]\n- [net] missed and reordered checks in {arp,ip,ip6}_tables (Jiri Pirko) [554563]\n- [net] neigh: fix state transitions via Netlink request (Jiri Pirko) [485903]\n- [net] route: fix BUG_ON in rt_secret_rebuild_oneshot (Jiri Olsa) [566104]\n- [net] netfilter: fix vmalloc ENOMEM caused by iptables (Jiri Olsa) [570491]\n- [block] cciss: fix multi-line printk log level (Jerome Marchand) [556921]\n- [nfs] revert retcode check in nfs_revalidate_mapping() (Jeff Layton) [557423]\n- [nfs] dont decode GETATTR if DELEGRETURN returned error (Jeff Layton) [551028]\n- [md] dm-log: fix bad log status after failure (Jonathan E Brassow) [570583]\n- [net] igmp: fix ip_mc_sf_allow race (Flavio Leitner) [552886]\n- [hwmon] add 0x prefix to hex coretemp module output (Dean Nelson) [571864]\n- [net] e1000e: fix WoL init when WoL disabled in EEPROM (Dean Nelson) [568562]\n- [ata] libata: handle semb signature (David Milburn) [533093]\n- [ata] libata-acpi: missing _SDD is not an error (David Milburn) [559815]\n- [scsi] sg: rate limit warning (Doug Ledford) [536937]\n- [net] tun: check supplemental groups in TUN/TAP driver (Danny Feng) [540786]\n- [s390] nss: add missing .previous call to asm function (Hendrik Brueckner) [581522]\n- [misc] lockdep: dump stack when hitting a limit (Amerigo Wang) [546554]\n- [net] ipv6: dont panic when kmem_cache_create fails (Amerigo Wang) [555338]\n- [misc] ipc: HARD_MSGMAX should be higher on 64bit (Amerigo Wang) [548334]\n- [fs] gfs2: make quota file size a multiple of gfs2_quota (Abhijith Das) [546455]\n[2.6.18-199.el5]\n- [mm] fix hugepage corruption using vm.drop_caches (Larry Woodman) [579469]\n- [misc] taskstats: enable CONFIG_TASK_XACCT (Jiri Olsa) [516961]\n- [misc] taskstats: new structure/cmd to avoid KABI break (Jiri Olsa) [516961]\n- [misc] taskstats: common fix for KABI breakage (Jiri Olsa) [516961]\n- [misc] taskstats: upgrade to version 4 (Jiri Olsa) [516961]\n- [misc] futex: handle futex value corruption gracefully (Jerome Marchand) [480396] {CVE-2010-0622}\n- [misc] futex: handle user space corruption gracefully (Jerome Marchand) [480396] {CVE-2010-0622}\n- [misc] futex: fix fault handling in futex_lock_pi (Jerome Marchand) [480396] {CVE-2010-0622}\n- [x86] utrace: block-step fix (Jerome Marchand) [463950]\n- [nfs] dont unhash dentry in nfs_lookup_revalidate (Jeff Layton) [582321]\n- [net] sunrpc: fix panic when reloading rpcsec_gss_krb5 (Harshula Jayasuriya) [570044]\n- [net] bonding: fix updating of speed/duplex changes (Andy Gospodarek) [567604]\n- [net] e1000: fix WoL init when WoL disabled in EEPROM (Dean Nelson) [568561]\n- [ata] ahci: support FIS-based switching (David Milburn) [474294]\n- [audit] make sure filterkey rules are reported (Alexander Viro) [579479]\n- [audit] clean up rule ordering, part 2 (Alexander Viro) [579479]\n- [audit] clean up rule ordering, part 1 (Alexander Viro) [579479]\n- [audit] fix selinux_audit_rule_update w/audit_inode_hash (Alexander Viro) [579479]\n- [virtio] fix GFP flags passed by virtio balloon driver (Amit Shah) [584683]\n- [net] sctp: fix skb_over_panic w/too many unknown params (Neil Horman) [584658] {CVE-2010-1173}\n- [xen] arpl on MMIO area crashes the guest (Paolo Bonzini) [572982] {CVE-2010-0730}\n[2.6.18-198.el5]\n- [acpi] warn on hot-add of memory exceeding 4G boundary (Prarit Bhargava) [571544]\n- [net] tipc: fix various oopses in uninitialized code (Neil Horman) [558693] {CVE-2010-1187}\n- [acpi] fix WARN on unregister in power meter driver (Matthew Garrett) [576246]\n- [block] cfq-iosched: fix IOPRIO_CLASS_IDLE accounting (Jeff Moyer) [574285]\n- [block] cfq-iosched: async queue allocation per priority (Jeff Moyer) [574285]\n- [block] cfq-iosched: fix async queue behaviour (Jeff Moyer) [574285]\n- [block] cfq-iosched: propagate down request sync flag (Jeff Moyer) [574285]\n- [block] introduce the rq_is_sync macro (Jeff Moyer) [574285]\n- [fs] vfs: fix LOOKUP_FOLLOW on automount symlinks (Jeff Layton) [567816] {CVE-2010-1088}\n- [nfs] fix an oops when truncating a file (Jeff Layton) [567195] {CVE-2010-1087}\n- [net] bnx2: fix lost MSI-X problem on 5709 NICs (John Feeney) [511368]\n- [misc] make the keyring quotas controllable via /proc/sys (Amerigo Wang) [441243]\n- [fs] fix kernel oops while copying from ext3 to gfs2 (Abhijith Das) [555754] {CVE-2010-1436}\n[2.6.18-197.el5]\n- [cpu] fix boot crash in 32-bit install on AMD cpus (Bhavna Sarathy) [575799]\n[2.6.18-196.el5]\n- [mm] fix boot on s390x after bootmem overlap patch (Amerigo Wang) [550974]\n- [net] bnx2: avoid restarting cnic in some contexts (Andy Gospodarek) [554706]\n- [misc] add missing CVE labels for entries in 2.6.18-195.el5 (Jarod Wilson)\n[2.6.18-195.el5]\n- [redhat] make sha512hmac sig failure more obvious (Jarod Wilson)\n- [mm] keep get_unmapped_area_prot functional (Danny Feng) [556710] {CVE-2010-0291}\n- [mm] switch do_brk to get_unmapped_area (Danny Feng) [556710] {CVE-2010-0291}\n- [mm] take arch_mmap_check into get_unmapped_area (Danny Feng) [556710] {CVE-2010-0291}\n- [mm] get rid of open-coding in ia64_brk (Danny Feng) [556710] {CVE-2010-0291}\n- [mm] unify sys_mmap* functions (Danny Feng) [556710] {CVE-2010-0291}\n- [mm] kill ancient cruft in s390 compat mmap (Danny Feng) [556710] {CVE-2010-0291}\n- [mm] fix pgoff in have to relocate case of mremap (Danny Feng) [556710] {CVE-2010-0291}\n- [mm] fix the arch checks in MREMAP_FIXED case (Danny Feng) [556710] {CVE-2010-0291}\n- [mm] fix checks for expand-in-place mremap (Danny Feng) [556710] {CVE-2010-0291}\n- [mm] add new vma_expandable helper function (Danny Feng) [556710] {CVE-2010-0291}\n- [mm] move MREMAP_FIXED into its own header (Danny Feng) [556710] {CVE-2010-0291}\n- [mm] move locating vma code and checks on it (Danny Feng) [556710] {CVE-2010-0291}\n- [iscsi] fix slow failover times (Mike Christie) [570681]\n- [misc] kernel: fix elf load DoS on x86_64 (Danny Feng) [560553] {CVE-2010-0307}\n- [netlink] connector: delete buggy notification code (Jiri Olsa) [561685] {CVE-2010-0410}\n- [sound] hda_intel: avoid divide by zero in azx devices (Jaroslav Kysela) [567172] {CVE-2010-1085}\n- [dvb] fix endless loop when decoding ULE at dvb-core (Mauro Carvalho Chehab) [569242] {CVE-2010-1086}\n- [scsi] fnic: fix tx queue handling (Mike Christie) [576709]\n- [fusion] mptsas: fix event_data alignment (Tomas Henzl) [570000]\n- [edac] fix internal error message in amd64_edac driver (Bhavna Sarathy) [569938]\n- [fs] remove unneccessary f_ep_lock from fasync_helper (Lachlan McIlroy) [567479]\n- [x86_64] fix floating point state corruption after signal (Oleg Nesterov) [560891]\n- [mm] dont let reserved memory overlap bootmem_map (Amerigo Wang) [550974]\n- [s390] kernel: correct TLB flush of page table entries (Hendrik Brueckner) [545527]\n- [xen] iommu: clear IO-APIC pins on boot and shutdown (Paolo Bonzini) [548201]\n- [xen] vtd: fix ioapic pin array (Don Dugger) [563546]\n- [xen] set hypervisor present CPUID bit (Paolo Bonzini) [573771]\n[2.6.18-194.el5]\n- [net] mlx4: pass attributes down to vlan interfaces (Doug Ledford) [573098]\n- [block] cfq-iosched: fix sequential read perf regression (Jeff Moyer) [571818]\n[2.6.18-193.el5]\n- [fs] gfs2: locking fix for potential dos (Steven Whitehouse) [572390] {CVE-2010-0727}\n- [acpi] power_meter: avoid oops on driver load (Matthew Garrett) [566575]\n- [net] r8169: fix assignments in backported net_device_ops (Ivan Vecera) [568040]\n- [net] virtio_net: refill rx buffer on out-of-memory (Herbert Xu) [554078]", "edition": 72, "modified": "2011-01-20T00:00:00", "published": "2011-01-20T00:00:00", "id": "ELSA-2011-0017", "href": "http://linux.oracle.com/errata/ELSA-2011-0017.html", "title": "Oracle Linux 5.6 kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "centos": [{"lastseen": "2019-12-20T18:27:40", "bulletinFamily": "unix", "cvelist": ["CVE-2010-1641", "CVE-2010-1437", "CVE-2010-1187", "CVE-2010-0291", "CVE-2010-0622", "CVE-2010-1436", "CVE-2010-1173", "CVE-2010-1088", "CVE-2010-1087"], "description": "**CentOS Errata and Security Advisory** CESA-2010:0504\n\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* multiple flaws were found in the mmap and mremap implementations. A local\nuser could use these flaws to cause a local denial of service or escalate\ntheir privileges. (CVE-2010-0291, Important)\n\n* a NULL pointer dereference flaw was found in the Fast Userspace Mutexes\n(futexes) implementation. The unlock code path did not check if the futex\nvalue associated with pi_state->owner had been modified. A local user could\nuse this flaw to modify the futex value, possibly leading to a denial of\nservice or privilege escalation when the pi_state->owner pointer is\ndereferenced. (CVE-2010-0622, Important)\n\n* a NULL pointer dereference flaw was found in the Linux kernel Network\nFile System (NFS) implementation. A local user on a system that has an\nNFS-mounted file system could use this flaw to cause a denial of service or\nescalate their privileges on that system. (CVE-2010-1087, Important)\n\n* a flaw was found in the sctp_process_unk_param() function in the Linux\nkernel Stream Control Transmission Protocol (SCTP) implementation. A remote\nattacker could send a specially-crafted SCTP packet to an SCTP listening\nport on a target system, causing a kernel panic (denial of service).\n(CVE-2010-1173, Important)\n\n* a flaw was found in the Linux kernel Transparent Inter-Process\nCommunication protocol (TIPC) implementation. If a client application, on a\nlocal system where the tipc module is not yet in network mode, attempted to\nsend a message to a remote TIPC node, it would dereference a NULL pointer\non the local system, causing a kernel panic (denial of service).\n(CVE-2010-1187, Important)\n\n* a buffer overflow flaw was found in the Linux kernel Global File System 2\n(GFS2) implementation. In certain cases, a quota could be written past the\nend of a memory page, causing memory corruption, leaving the quota stored\non disk in an invalid state. A user with write access to a GFS2 file system\ncould trigger this flaw to cause a kernel crash (denial of service) or\nescalate their privileges on the GFS2 server. This issue can only be\ntriggered if the GFS2 file system is mounted with the \"quota=on\" or\n\"quota=account\" mount option. (CVE-2010-1436, Important)\n\n* a race condition between finding a keyring by name and destroying a freed\nkeyring was found in the Linux kernel key management facility. A local user\ncould use this flaw to cause a kernel panic (denial of service) or escalate\ntheir privileges. (CVE-2010-1437, Important)\n\n* a flaw was found in the link_path_walk() function in the Linux kernel.\nUsing the file descriptor returned by the open() function with the\nO_NOFOLLOW flag on a subordinate NFS-mounted file system, could result in a\nNULL pointer dereference, causing a denial of service or privilege\nescalation. (CVE-2010-1088, Moderate)\n\n* a missing permission check was found in the gfs2_set_flags() function in\nthe Linux kernel GFS2 implementation. A local user could use this flaw to\nchange certain file attributes of files, on a GFS2 file system, that they\ndo not own. (CVE-2010-1641, Low)\n\nRed Hat would like to thank Jukka Taimisto and Olli Jarva of Codenomicon\nLtd, Nokia Siemens Networks, and Wind River on behalf of their customer,\nfor responsibly reporting CVE-2010-1173; Mario Mikocevic for responsibly\nreporting CVE-2010-1436; and Dan Rosenberg for responsibly reporting\nCVE-2010-1641.\n\nThis update also fixes several bugs. Documentation for these bug fixes will\nbe available shortly from\nhttp://www.redhat.com/docs/en-US/errata/RHSA-2010-0504/Kernel_Security_Update/index.html\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2010-July/028785.html\nhttp://lists.centos.org/pipermail/centos-announce/2010-July/028786.html\n\n**Affected packages:**\nkernel\nkernel-PAE\nkernel-PAE-devel\nkernel-debug\nkernel-debug-devel\nkernel-devel\nkernel-doc\nkernel-headers\nkernel-xen\nkernel-xen-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2010-0504.html", "edition": 3, "modified": "2010-07-02T11:14:41", "published": "2010-07-02T11:14:40", "href": "http://lists.centos.org/pipermail/centos-announce/2010-July/028785.html", "id": "CESA-2010:0504", "title": "kernel security update", "type": "centos", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "vmware": [{"lastseen": "2019-11-06T16:05:44", "bulletinFamily": "unix", "cvelist": ["CVE-2010-0307", "CVE-2009-0844", "CVE-2010-1437", "CVE-2009-0846", "CVE-2010-0291", "CVE-2010-0415", "CVE-2010-1321", "CVE-2010-0622", "CVE-2010-1088", "CVE-2009-4212", "CVE-2010-1087", "CVE-2009-0845"], "description": "a. Service Console OS update for COS kernel \nThis patch updates the service console kernel to fix multiple security issues. \n \nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2010-0415, CVE-2010-0307, CVE-2010-0291, CVE-2010-0622, CVE-2010-1087, CVE-2010-1437, and CVE-2010-1088 to these issues. \n \nColumn 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. \n\n", "edition": 4, "modified": "2011-01-04T00:00:00", "published": "2010-11-15T00:00:00", "id": "VMSA-2010-0016", "href": "https://www.vmware.com/security/advisories/VMSA-2010-0016.html", "title": "VMware ESXi and ESX third party updates for Service Console and Likewise components", "type": "vmware", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "debian": [{"lastseen": "2020-11-11T13:24:20", "bulletinFamily": "unix", "cvelist": ["CVE-2010-1451", "CVE-2009-4537", "CVE-2010-1437", "CVE-2010-0727", "CVE-2010-1187", "CVE-2010-1162", "CVE-2010-1084", "CVE-2010-1446", "CVE-2010-1083", "CVE-2010-1086", "CVE-2010-1173", "CVE-2010-1088", "CVE-2010-1087"], "description": "- ----------------------------------------------------------------------\nDebian Security Advisory DSA-2053-1 security@debian.org\nhttp://www.debian.org/security/ dann frazier\nMay 25, 2010 http://www.debian.org/security/faq\n- ----------------------------------------------------------------------\n\nPackage : linux-2.6\nVulnerability : privilege escalation/denial of service/information leak\nProblem type : local\nDebian-specific: no\nCVE Id(s) : CVE-2009-4537 CVE-2010-0727 CVE-2010-1083 CVE-2010-1084\n CVE-2010-1086 CVE-2010-1087 CVE-2010-1088 CVE-2010-1162\n CVE-2010-1173 CVE-2010-1187 CVE-2010-1437 CVE-2010-1446\n CVE-2010-1451\nDebian Bug(s) : 573071\n \nSeveral vulnerabilities have been discovered in the Linux kernel that\nmay lead to a denial of service or privilege escalation. The Common\nVulnerabilities and Exposures project identifies the following problems:\n\nCVE-2009-4537\n\n Fabian Yamaguchi reported a missing check for Ethernet frames larger\n than the MTU in the r8169 driver. This may allow users on the local\n network to crash a system, resulting in a denial of service.\n\nCVE-2010-0727\n\n Sachin Prabhu reported an issue in the GFS2 filesystem. Local users\n can trigger a BUG() altering the permissions on a locked file,\n resulting in a denial of service.\n\nCVE-2010-1083\n\n Linus Torvalds reported an issue in the USB subsystem, which may allow\n local users to obtain portions of sensitive kernel memory.\n\nCVE-2010-1084\n\n Neil Brown reported an issue in the Bluetooth subsystem that may\n permit remote attackers to overwrite memory through the creation\n of large numbers of sockets, resulting in a denial of service.\n\nCVE-2010-1086\n\n Ang Way Chuang reported an issue in the DVB subsystem for Digital\n TV adapters. By creating a specially-encoded MPEG2-TS frame, a remote\n attacker could cause the receiver to enter an endless loop, resulting\n in a denial of service.\n\nCVE-2010-1087\n\n Trond Myklebust reported an issue in the NFS filesystem. A local\n user may cause an oops by sending a fatal signal during a file\n truncation operation, resulting in a denial of service.\n\nCVE-2010-1088\n\n Al Viro reported an issue where automount symlinks may not\n be followed when LOOKUP_FOLLOW is not set. This has an unknown\n security impact.\n\nCVE-2010-1162\n\n Catalin Marinas reported an issue in the tty subsystem that allows\n local attackers to cause a kernel memory leak, possibly resulting\n in a denial of service.\n\nCVE-2010-1173\n\n Chris Guo from Nokia China and Jukka Taimisto and Olli Jarva from\n Codenomicon Ltd reported an issue in the SCTP subsystem that allows\n a remote attacker to cause a denial of service using a malformed init\n package.\n\nCVE-2010-1187\n\n Neil Hormon reported an issue in the TIPC subsystem. Local users can\n cause a denial of service by way of a NULL pointer dereference by\n sending datagrams through AF_TIPC before entering network mode.\n\nCVE-2010-1437\n\n Toshiyuki Okajima reported a race condition in the keyring subsystem.\n Local users can cause memory corruption via keyctl commands that\n access a keyring in the process of being deleted, resulting in a\n denial of service.\n\nCVE-2010-1446\n\n Wufei reported an issue with kgdb on the PowerPC architecture,\n allowing local users to write to kernel memory. Note: this issue\n does not affect binary kernels provided by Debian. The fix is\n provided for the benefit of users who build their own kernels\n from Debian source.\n\nCVE-2010-1451\n\n Brad Spengler reported an issue on the SPARC architecture that allows\n local users to execute non-executable pages.\n\nThis update also includes fixes a regression introduced by a previous\nupdate. See the referenced Debian bug page for details.\n\nFor the stable distribution (lenny), these problems have been fixed in\nversion 2.6.26-22lenny1.\n\nWe recommend that you upgrade your linux-2.6 and user-mode-linux\npackages.\n\nThe following matrix lists additional source packages that were\nrebuilt for compatibility with or to take advantage of this update:\n\n Debian 5.0 (lenny)\n user-mode-linux 2.6.26-1um-2+22lenny1\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\nDebian GNU/Linux 5.0 alias lenny\n- --------------------------------\n\nStable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26.orig.tar.gz\n Size/MD5 checksum: 61818969 85e039c2588d5bf3cb781d1c9218bbcb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-22lenny1.dsc\n Size/MD5 checksum: 5778 713b8a3f2bc10816264a81c0a9eb7860\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-22lenny1.diff.gz\n Size/MD5 checksum: 7894925 86ecf2ca8808aea84b0af06317616a6c\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.26-2_2.6.26-22lenny1_all.deb\n Size/MD5 checksum: 126228 be9c5c392a1ab0cf0a297063abf983f6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.26_2.6.26-22lenny1_all.deb\n Size/MD5 checksum: 1764832 b0d63ac0b12a0679867b8b53bf4c3a54\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.26_2.6.26-22lenny1_all.deb\n Size/MD5 checksum: 2871892 c5c0e0d8ea193812566f9481e6ca8440\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.26_2.6.26-22lenny1_all.deb\n Size/MD5 checksum: 48764508 9a203c801fd068d282d1cbb11fbab68f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.26_2.6.26-22lenny1_all.deb\n Size/MD5 checksum: 4627886 fe792ad0bcf2c9f8ac4bb496e9885a20\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.26_2.6.26-22lenny1_all.deb\n Size/MD5 checksum: 110906 6ef2c4468e55570a3e571021299d4760\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-smp_2.6.26-22lenny1_alpha.deb\n Size/MD5 checksum: 374304 046703c72d1bf6bcc81cb462e0f4d7ec\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-generic_2.6.26-22lenny1_alpha.deb\n Size/MD5 checksum: 372708 a6922d1de2035d2745d5ad56a6e38eb9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-generic_2.6.26-22lenny1_alpha.deb\n Size/MD5 checksum: 28676342 687312e7cdf46a79c7c4b974cbe5b542\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-22lenny1_alpha.deb\n Size/MD5 checksum: 3620318 4c7448f11e8a63ddec95b7ddaf6e9c02\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-smp_2.6.26-22lenny1_alpha.deb\n Size/MD5 checksum: 29374588 452a568c8f74d69e3b7ba6e1685d4863\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-legacy_2.6.26-22lenny1_alpha.deb\n Size/MD5 checksum: 373176 fbda1e3fb70a213ee26ab4e0a5af16a7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-alpha_2.6.26-22lenny1_alpha.deb\n Size/MD5 checksum: 110428 82fc153ba577607964e55ce0d5eba8a8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-22lenny1_alpha.deb\n Size/MD5 checksum: 110404 9e24c63932b52a18206f951f18438a90\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-22lenny1_alpha.deb\n Size/MD5 checksum: 760714 dbef4d63df60be4c54e5a8999b2f1203\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-legacy_2.6.26-22lenny1_alpha.deb\n Size/MD5 checksum: 28661322 db654cfdd26ec48b75fbf73bae54d15b\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-22lenny1_amd64.deb\n Size/MD5 checksum: 391290 529d0af88248eeb9db6c720147c3c9c9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-amd64_2.6.26-22lenny1_amd64.deb\n Size/MD5 checksum: 1809098 2119049dd7757d1a7aa9b0cb6d65a4e6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-22lenny1_amd64.deb\n Size/MD5 checksum: 753158 c06cd160c023755232e79c187b20a98e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-amd64_2.6.26-22lenny1_amd64.deb\n Size/MD5 checksum: 391970 7e2145ea394dcbd739307b7cff343ffc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-amd64_2.6.26-22lenny1_amd64.deb\n Size/MD5 checksum: 387348 d76eb180fa81f742ee87d9524f3bc5a3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-amd64_2.6.26-22lenny1_amd64.deb\n Size/MD5 checksum: 20949852 a3c0bd81f9f9cc96d2e42521fb963fb9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-22lenny1_amd64.deb\n Size/MD5 checksum: 3757248 db362b7459220059221418a2b1542659\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-amd64_2.6.26-22lenny1_amd64.deb\n Size/MD5 checksum: 110338 19ec7c8ca6e51c0a93352a059f9d5df8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-amd64_2.6.26-22lenny1_amd64.deb\n Size/MD5 checksum: 19315990 c185e17d0ca1ed640106dbb828c919f8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-amd64_2.6.26-22lenny1_amd64.deb\n Size/MD5 checksum: 110374 0e703e2b4306ca1e68cc61460ef86686\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-amd64_2.6.26-22lenny1_amd64.deb\n Size/MD5 checksum: 21102730 604476ba9a35fdb435b4409e5323cf89\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-22lenny1_amd64.deb\n Size/MD5 checksum: 3724662 ae8fed857d819d7a3dd5b3085c367085\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-22lenny1_amd64.deb\n Size/MD5 checksum: 3780338 a2cd8cdd414be8c412bd923576ccb456\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-22lenny1_amd64.deb\n Size/MD5 checksum: 3856722 9621b8e802a4e482de1db03572b0f72d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-22lenny1_amd64.deb\n Size/MD5 checksum: 20931422 9d71c45188552af06abd5a04d62b7c84\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-22lenny1_amd64.deb\n Size/MD5 checksum: 110350 acdbea58008fec881f380752f9fc3ea6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-amd64_2.6.26-22lenny1_amd64.deb\n Size/MD5 checksum: 397220 709b723fefd37764ab8bffb079eb312f\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-22lenny1_arm.deb\n Size/MD5 checksum: 12494622 96304f7aa2bddb3ea2ef404afaa4a513\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-footbridge_2.6.26-22lenny1_arm.deb\n Size/MD5 checksum: 352980 44e27ad26963a2c1dbed9240b28d7c5b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-footbridge_2.6.26-22lenny1_arm.deb\n Size/MD5 checksum: 10294730 8066047f7d15cd2f7a6c93018cfaae37\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-22lenny1_arm.deb\n Size/MD5 checksum: 369410 e26f28edccaeabf04dec8e4d2d8cc88f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-22lenny1_arm.deb\n Size/MD5 checksum: 11443274 d9232ed2bbde0e851f72488a2eea831d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-arm_2.6.26-22lenny1_arm.deb\n Size/MD5 checksum: 110444 631821dedb019f48b3133246338f4521\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-22lenny1_arm.deb\n Size/MD5 checksum: 751260 027d7225ddd40e26f12a9c7c7cc17b55\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-22lenny1_arm.deb\n Size/MD5 checksum: 4140556 a36e76af416da97176639d34a6dd42a2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-22lenny1_arm.deb\n Size/MD5 checksum: 368088 8388881b72ce56cef47cb61a51abfe8d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-22lenny1_arm.deb\n Size/MD5 checksum: 11731284 cc6e8949fe66950db619eb2996332572\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-22lenny1_arm.deb\n Size/MD5 checksum: 110404 611a83d9ddb07104525d3ae7eca714b8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-22lenny1_arm.deb\n Size/MD5 checksum: 364180 878a5bd8fa6419dd6efe6422c7a14cbc\n\narmel architecture (ARM EABI)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-22lenny1_armel.deb\n Size/MD5 checksum: 365700 0327b96ec1802e56c4ffee19ce1c9dc5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-22lenny1_armel.deb\n Size/MD5 checksum: 368810 05ee76d995844fc8461223846ab41802\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-22lenny1_armel.deb\n Size/MD5 checksum: 110358 830c76ccdf7d7c99f3ea84e1e8bc962d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-22lenny1_armel.deb\n Size/MD5 checksum: 11691670 0ecbec767291466b244fd83506f1e112\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-armel_2.6.26-22lenny1_armel.deb\n Size/MD5 checksum: 110392 c64900dc9ec3812df164d47c006ecffe\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-22lenny1_armel.deb\n Size/MD5 checksum: 11399558 2d16b67f176b8223bd4dd33b90217a2e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-versatile_2.6.26-22lenny1_armel.deb\n Size/MD5 checksum: 340088 3b6e8d8210d6e6e68eee6ddc2cab8f09\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-22lenny1_armel.deb\n Size/MD5 checksum: 4136736 42aebe2283d941bb7724daf03882914d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-22lenny1_armel.deb\n Size/MD5 checksum: 12451186 f22b998fbdfa29023573bf9b6988dba9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-22lenny1_armel.deb\n Size/MD5 checksum: 751906 d1d0480ba764b4ca3bdae8a651acd066\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-versatile_2.6.26-22lenny1_armel.deb\n Size/MD5 checksum: 9606938 569b72a642446ac1ffe4ed2aa13f50aa\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-22lenny1_armel.deb\n Size/MD5 checksum: 370546 a3f2c479e65c9ae3be17641001b33afc\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc-smp_2.6.26-22lenny1_hppa.deb\n Size/MD5 checksum: 302516 dd1800b19f0df391bd05658a0a7846c0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-22lenny1_hppa.deb\n Size/MD5 checksum: 110354 479a0788049f39e648e57a3c5007b993\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-22lenny1_hppa.deb\n Size/MD5 checksum: 3598606 4429cb37eda685553dde7198e5b47fd5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-22lenny1_hppa.deb\n Size/MD5 checksum: 762928 fe2e02babc93f6bdcc16c8f7ad8a5a88\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64_2.6.26-22lenny1_hppa.deb\n Size/MD5 checksum: 301842 1e58cca757600c08424118ace4a50da5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-hppa_2.6.26-22lenny1_hppa.deb\n Size/MD5 checksum: 110374 9198f6103932b14d766b0e4c32110806\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc_2.6.26-22lenny1_hppa.deb\n Size/MD5 checksum: 301034 890ed76fde4dedddcb9db60f7ba0091d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64_2.6.26-22lenny1_hppa.deb\n Size/MD5 checksum: 17127808 a2cffd928aa5e30ab9f1f30e41b9aed1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64-smp_2.6.26-22lenny1_hppa.deb\n Size/MD5 checksum: 17678124 53aa5bddb6f2af761a8bfcb1fef54d02\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc_2.6.26-22lenny1_hppa.deb\n Size/MD5 checksum: 15784596 c892e98e5ab6fcf6aa84aa5e5021309f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc-smp_2.6.26-22lenny1_hppa.deb\n Size/MD5 checksum: 16388546 0ce6b1186e64e745a0680088d2c9fcad\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64-smp_2.6.26-22lenny1_hppa.deb\n Size/MD5 checksum: 303348 6991ba8c20ae638798fda57540014d30\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 399720 ee32214acdf697edca92068f2d64f8b3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-i386_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 110450 191bb7f29ece9f8ea2f8cff03efae3cd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-686_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 398126 32ef574340b20e8f2c7465f2290a8c0b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 413242 a5f35b11ae06961132fd16e21d5b5337\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-486_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 409820 586c33fc476019b08a3b75816d9bf520\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-686_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 110392 3f9c02cb47bc1070b92358227e030768\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686-bigmem_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 20530142 c8e9146e82955c0dda3bcabe8b7542ef\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686-bigmem_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 20509696 98b0e600e9bca75f016f1c4878d9d8e7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 767274 369a4858f7dfa2560ec664a08fdbac42\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 3865974 0510efa636bb1554f9a2c040c1ee6f19\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 20409094 798b4bb9a4b8d81affc30dbc2f284cc3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-686_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 20679068 6b6c2a57037f510313311d76849a9b0a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 3807640 6b21b3346b8196f19ea59d16a2e7b8f4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-686_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 18198474 627d51edc59f86bd8dfe2e7a74a25723\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 20381812 493e6acfd2d47e456d1471ef44dd18ba\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-686_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 1596580 5f456e26e01a793881871f4d683b13b1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-686_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 417750 057786734b1771be73cea6c484a09cce\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686-bigmem_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 410364 4f381b525756e6cf131be68398e58fe7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 110394 46fba74b6675f6df2057da14ba3931f9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 409858 99ce0b8165bd71e4b90745ad5a7577d1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 3947966 aabcdf68ca8c4d35d87ad2eecb569517\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-486_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 20350468 fb0caa5f722a968820562223577a4e74\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 21022322 befe070ada9e62a69c15f38c9f0e706a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 3842206 b5e7820e844761d65d8dbf0a4ea639e5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686-bigmem_2.6.26-22lenny1_i386.deb\n Size/MD5 checksum: 411454 771b6960fbfd4658124eac3673e01e90\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-itanium_2.6.26-22lenny1_ia64.deb\n Size/MD5 checksum: 359186 d2391d9bdb5fe861abe5fbd0f9f2f989\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-22lenny1_ia64.deb\n Size/MD5 checksum: 3659176 8df0d712004a67cafedb9b4926970368\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-mckinley_2.6.26-22lenny1_ia64.deb\n Size/MD5 checksum: 359256 18a5fda7c38b900462ea120ae04a3c98\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-mckinley_2.6.26-22lenny1_ia64.deb\n Size/MD5 checksum: 34440420 2eddbf5140a8dc8a4a74d4e11a77ea44\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-22lenny1_ia64.deb\n Size/MD5 checksum: 751862 329f5ddfc14f4f6e63aa3834f7a927fe\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-22lenny1_ia64.deb\n Size/MD5 checksum: 3691882 19f4f11bbad0443a7ae7153823bcc0e7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-mckinley_2.6.26-22lenny1_ia64.deb\n Size/MD5 checksum: 359722 f3d89cc673ff0f2e5b7ff2e718ff44f1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-itanium_2.6.26-22lenny1_ia64.deb\n Size/MD5 checksum: 34252074 96729f987e7b7e02802b240da3a3293c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-mckinley_2.6.26-22lenny1_ia64.deb\n Size/MD5 checksum: 34376386 f97af824a762b90b102d84f5c1bf65f8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-22lenny1_ia64.deb\n Size/MD5 checksum: 110350 9881f68b5f5446c4c773dc60d655a589\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-itanium_2.6.26-22lenny1_ia64.deb\n Size/MD5 checksum: 34191126 c5412cb1277801d2a2488be36dc1ad0e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-ia64_2.6.26-22lenny1_ia64.deb\n Size/MD5 checksum: 110386 c1ddbef0eeae94731617e277b32018c6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-itanium_2.6.26-22lenny1_ia64.deb\n Size/MD5 checksum: 359654 cba07c82268fc13d6007ecf4be2c8508\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r4k-ip22_2.6.26-22lenny1_mips.deb\n Size/MD5 checksum: 262068 31c1aadffe81551bef675f9bc91b6f1e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-5kc-malta_2.6.26-22lenny1_mips.deb\n Size/MD5 checksum: 29432478 38c75d466da039b9e2ac1c70898b50ae\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-5kc-malta_2.6.26-22lenny1_mips.deb\n Size/MD5 checksum: 358936 9ec1ce1473362c253cf4dc7d2fd791f6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-22lenny1_mips.deb\n Size/MD5 checksum: 3966442 111674b840698cede9cdf3ecec2d5e3b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1a-bcm91480b_2.6.26-22lenny1_mips.deb\n Size/MD5 checksum: 302384 7f9f26f809e46a4748158588402d7ace\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-4kc-malta_2.6.26-22lenny1_mips.deb\n Size/MD5 checksum: 359360 d07b20a27666a8cb2c43f03eeb729c57\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r5k-ip32_2.6.26-22lenny1_mips.deb\n Size/MD5 checksum: 285392 9d513d80efd66be3e9ba7fa929b13b5f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1-bcm91250a_2.6.26-22lenny1_mips.deb\n Size/MD5 checksum: 303780 3a507cccd77e01f7449a8ff73a3e5f6f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-22lenny1_mips.deb\n Size/MD5 checksum: 760156 80eaea319450a06fe9c2310bdff051e2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-4kc-malta_2.6.26-22lenny1_mips.deb\n Size/MD5 checksum: 23504896 f928208abb4eb3ade6185409df5fa417\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1-bcm91250a_2.6.26-22lenny1_mips.deb\n Size/MD5 checksum: 20252984 09ee52755ae4cf03ca082e8dbc977206\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1a-bcm91480b_2.6.26-22lenny1_mips.deb\n Size/MD5 checksum: 20244176 3c568fce5cab57746ca1dc53c8fcc754\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-22lenny1_mips.deb\n Size/MD5 checksum: 110400 6676cd4c8df659937bac47ed0c08bf37\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-mips_2.6.26-22lenny1_mips.deb\n Size/MD5 checksum: 110464 fcbbce5e6741f1a1ec4830dba9a8ee91\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r4k-ip22_2.6.26-22lenny1_mips.deb\n Size/MD5 checksum: 11542616 0ead2243e1d4c2cb50760d97f9a6a2f7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r5k-ip32_2.6.26-22lenny1_mips.deb\n Size/MD5 checksum: 15769388 08c7a66b4f1a5c9bc9f8cc5683d5786f\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1-bcm91250a_2.6.26-22lenny1_mipsel.deb\n Size/MD5 checksum: 19682018 7e665290822815634b1666523270919e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-mipsel_2.6.26-22lenny1_mipsel.deb\n Size/MD5 checksum: 110460 445931c0ad4fa00f8875f5cbaf9d83aa\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1a-bcm91480b_2.6.26-22lenny1_mipsel.deb\n Size/MD5 checksum: 19667420 02ae9fef2fea1c4ccd667c73025039f9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-22lenny1_mipsel.deb\n Size/MD5 checksum: 760930 064ffab1507d84791e943528662e4c86\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r5k-cobalt_2.6.26-22lenny1_mipsel.deb\n Size/MD5 checksum: 297650 4433daa21c6e697d8c1bb33355e14ee1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-4kc-malta_2.6.26-22lenny1_mipsel.deb\n Size/MD5 checksum: 359828 870a33c1aea0535ab0b25f3016aa9623\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-4kc-malta_2.6.26-22lenny1_mipsel.deb\n Size/MD5 checksum: 23074870 998294807dde61335d413ecf50fdbf3b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-22lenny1_mipsel.deb\n Size/MD5 checksum: 3967560 590a467f25e74daf442dfd54caaf104e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1-bcm91250a_2.6.26-22lenny1_mipsel.deb\n Size/MD5 checksum: 303240 9620ba551b29adb6052e13f8277347c0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1a-bcm91480b_2.6.26-22lenny1_mipsel.deb\n Size/MD5 checksum: 302768 59fe05d578020afc8e1e8fe3fce3b41c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-5kc-malta_2.6.26-22lenny1_mipsel.deb\n Size/MD5 checksum: 28568828 86e20054979d1ffc56c24f5db73d044a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-22lenny1_mipsel.deb\n Size/MD5 checksum: 110406 3a073335ba3488e55549b82e005fefda\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r5k-cobalt_2.6.26-22lenny1_mipsel.deb\n Size/MD5 checksum: 15056072 429c33859de62cdfaa86e809e8625bec\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-5kc-malta_2.6.26-22lenny1_mipsel.deb\n Size/MD5 checksum: 359706 43272f2843e3b39735812c24aad332f5\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-22lenny1_powerpc.deb\n Size/MD5 checksum: 110358 eb7bc8e6a28a6801bc7be5d22bf95a2f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc_2.6.26-22lenny1_powerpc.deb\n Size/MD5 checksum: 23581674 48797e6c39bef5a0fd120d973b541f07\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc_2.6.26-22lenny1_powerpc.deb\n Size/MD5 checksum: 363808 c2c489e8798d50db73d709367e390113\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc-smp_2.6.26-22lenny1_powerpc.deb\n Size/MD5 checksum: 365378 a4c38de9a287a71e84d09d5474393d41\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-powerpc_2.6.26-22lenny1_powerpc.deb\n Size/MD5 checksum: 110392 9dd420c73a4b0c7d55fe2372a439adfb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc64_2.6.26-22lenny1_powerpc.deb\n Size/MD5 checksum: 23420066 5bf69b74154de2ae05db3280f2070b74\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-22lenny1_powerpc.deb\n Size/MD5 checksum: 3782640 31d483da8ccb87dbd7f75200515c8b3f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc64_2.6.26-22lenny1_powerpc.deb\n Size/MD5 checksum: 23474914 42ba4ae5a23355aba50cb1a8c018a631\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc_2.6.26-22lenny1_powerpc.deb\n Size/MD5 checksum: 366524 a3970adc5168a37d49f28c5ce4ca05ff\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-22lenny1_powerpc.deb\n Size/MD5 checksum: 746782 d0ef1631862e4130479ce4e3da0a6050\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-22lenny1_powerpc.deb\n Size/MD5 checksum: 3814900 2b936155fef59a231764ca014043b806\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc64_2.6.26-22lenny1_powerpc.deb\n Size/MD5 checksum: 370710 35281c3da9947c322b12a014adabbcad\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc_2.6.26-22lenny1_powerpc.deb\n Size/MD5 checksum: 23159310 22caa95faeb5687d37e677b4e34503b6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc64_2.6.26-22lenny1_powerpc.deb\n Size/MD5 checksum: 371066 9961d473b25000f7bb7a23bde2720323\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc-smp_2.6.26-22lenny1_powerpc.deb\n Size/MD5 checksum: 23557104 bd8ab7bd0594a795f34dac94ee24ffae\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-22lenny1_s390.deb\n Size/MD5 checksum: 758022 786d9ca518b1a573caf38f5492104cc4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-s390x_2.6.26-22lenny1_s390.deb\n Size/MD5 checksum: 238208 3155d20f0210f5fd9a2e27fc28165502\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390_2.6.26-22lenny1_s390.deb\n Size/MD5 checksum: 236574 05d74c2012431ee9bdae90e172a82de0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390x_2.6.26-22lenny1_s390.deb\n Size/MD5 checksum: 237136 7950ba3ebfc31e3cf6536b34eccaf684\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390x_2.6.26-22lenny1_s390.deb\n Size/MD5 checksum: 7828888 56510e3515975d5ed979a55fb0bb14b7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390-tape_2.6.26-22lenny1_s390.deb\n Size/MD5 checksum: 1633146 654e757be4670f764a99049c7984aa98\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-22lenny1_s390.deb\n Size/MD5 checksum: 3633806 0c911d5a677f4fdb22f44cf617cd8374\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390_2.6.26-22lenny1_s390.deb\n Size/MD5 checksum: 7534830 da50ed9bfd6846d2ab2ced362b19ab4e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-s390x_2.6.26-22lenny1_s390.deb\n Size/MD5 checksum: 7889984 06c9c7d89731808d7e376986cc472843\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-22lenny1_s390.deb\n Size/MD5 checksum: 110394 68dd1fe380aa0c9ba6caa84f934569fd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-s390_2.6.26-22lenny1_s390.deb\n Size/MD5 checksum: 110416 c1d7fd64b9efab8228f305d5474de5d1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-22lenny1_s390.deb\n Size/MD5 checksum: 3598560 f63cbef687984b543d1152e013bc95fe\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64_2.6.26-22lenny1_sparc.deb\n Size/MD5 checksum: 14291528 b0e802720e53cb53650b8a2d75d1588d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-sparc64_2.6.26-22lenny1_sparc.deb\n Size/MD5 checksum: 304718 aa3ebf9c5e7cde5fc11513c27b4396d0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-sparc_2.6.26-22lenny1_sparc.deb\n Size/MD5 checksum: 110370 d746af2e449aaf644370d7b88a03cf2d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-sparc64_2.6.26-22lenny1_sparc.deb\n Size/MD5 checksum: 14631258 b056f4f2245e4e2da6ef8e7549224226\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64-smp_2.6.26-22lenny1_sparc.deb\n Size/MD5 checksum: 14611896 ad3108a56bbacf863b4f18521275887c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-22lenny1_sparc.deb\n Size/MD5 checksum: 800838 114ac1590a19b405fcacfb06ee36e55a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-22lenny1_sparc.deb\n Size/MD5 checksum: 3820700 fff1d7baf26f32217a8100ca14875708\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-22lenny1_sparc.deb\n Size/MD5 checksum: 110352 02deff17df2e96a0ed208d786bdf9315\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-22lenny1_sparc.deb\n Size/MD5 checksum: 3785870 518b0d1f9d0d13adce8d6707726031ab\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64_2.6.26-22lenny1_sparc.deb\n Size/MD5 checksum: 302894 c9354f7c9769be34b6356e0d042a294e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64-smp_2.6.26-22lenny1_sparc.deb\n Size/MD5 checksum: 304918 228d8163856c2e8e261b0fd086475d68\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 3, "modified": "2010-05-25T06:52:00", "published": "2010-05-25T06:52:00", "id": "DEBIAN:DSA-2053-1:F2BFF", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2010/msg00096.html", "title": "[SECURITY] [DSA 2053-1] New Linux 2.6.26 packages fix several issues", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:36", "bulletinFamily": "software", "cvelist": ["CVE-2010-1451", "CVE-2009-4537", "CVE-2010-1437", "CVE-2010-0727", "CVE-2010-1187", "CVE-2010-1162", "CVE-2010-1084", "CVE-2010-1446", "CVE-2010-1083", "CVE-2010-1086", "CVE-2010-1173", "CVE-2010-1088", "CVE-2010-1087"], "description": "Information leaks, privilege escalations, DoS.", "edition": 1, "modified": "2010-05-26T00:00:00", "published": "2010-05-26T00:00:00", "id": "SECURITYVULNS:VULN:10869", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:10869", "title": "Linux kernel multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:34", "bulletinFamily": "software", "cvelist": ["CVE-2010-1451", "CVE-2009-4537", "CVE-2010-1437", "CVE-2010-0727", "CVE-2010-1187", "CVE-2010-1162", "CVE-2010-1084", "CVE-2010-1446", "CVE-2010-1083", "CVE-2010-1086", "CVE-2010-1173", "CVE-2010-1088", "CVE-2010-1087"], "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n- ----------------------------------------------------------------------\r\nDebian Security Advisory DSA-2053-1 security@debian.org\r\nhttp://www.debian.org/security/ dann frazier\r\nMay 25, 2010 http://www.debian.org/security/faq\r\n- ----------------------------------------------------------------------\r\n\r\nPackage : linux-2.6\r\nVulnerability : privilege escalation/denial of service/information leak\r\nProblem type : local\r\nDebian-specific: no\r\nCVE Id(s) : CVE-2009-4537 CVE-2010-0727 CVE-2010-1083 CVE-2010-1084\r\n CVE-2010-1086 CVE-2010-1087 CVE-2010-1088 CVE-2010-1162\r\n CVE-2010-1173 CVE-2010-1187 CVE-2010-1437 CVE-2010-1446\r\n CVE-2010-1451\r\nDebian Bug(s) : 573071\r\n \r\nSeveral vulnerabilities have been discovered in the Linux kernel that\r\nmay lead to a denial of service or privilege escalation. The Common\r\nVulnerabilities and Exposures project identifies the following problems:\r\n\r\nCVE-2009-4537\r\n\r\n Fabian Yamaguchi reported a missing check for Ethernet frames larger\r\n than the MTU in the r8169 driver. This may allow users on the local\r\n network to crash a system, resulting in a denial of service.\r\n\r\nCVE-2010-0727\r\n\r\n Sachin Prabhu reported an issue in the GFS2 filesystem. Local users\r\n can trigger a BUG() altering the permissions on a locked file,\r\n resulting in a denial of service.\r\n\r\nCVE-2010-1083\r\n\r\n Linus Torvalds reported an issue in the USB subsystem, which may allow\r\n local users to obtain portions of sensitive kernel memory.\r\n\r\nCVE-2010-1084\r\n\r\n Neil Brown reported an issue in the Bluetooth subsystem that may\r\n permit remote attackers to overwrite memory through the creation\r\n of large numbers of sockets, resulting in a denial of service.\r\n\r\nCVE-2010-1086\r\n\r\n Ang Way Chuang reported an issue in the DVB subsystem for Digital\r\n TV adapters. By creating a specially-encoded MPEG2-TS frame, a remote\r\n attacker could cause the receiver to enter an endless loop, resulting\r\n in a denial of service.\r\n\r\nCVE-2010-1087\r\n\r\n Trond Myklebust reported an issue in the NFS filesystem. A local\r\n user may cause an oops by sending a fatal signal during a file\r\n truncation operation, resulting in a denial of service.\r\n\r\nCVE-2010-1088\r\n\r\n Al Viro reported an issue where automount symlinks may not\r\n be followed when LOOKUP_FOLLOW is not set. This has an unknown\r\n security impact.\r\n\r\nCVE-2010-1162\r\n\r\n Catalin Marinas reported an issue in the tty subsystem that allows\r\n local attackers to cause a kernel memory leak, possibly resulting\r\n in a denial of service.\r\n\r\nCVE-2010-1173\r\n\r\n Chris Guo from Nokia China and Jukka Taimisto and Olli Jarva from\r\n Codenomicon Ltd reported an issue in the SCTP subsystem that allows\r\n a remote attacker to cause a denial of service using a malformed init\r\n package.\r\n\r\nCVE-2010-1187\r\n\r\n Neil Hormon reported an issue in the TIPC subsystem. Local users can\r\n cause a denial of service by way of a NULL pointer dereference by\r\n sending datagrams through AF_TIPC before entering network mode.\r\n\r\nCVE-2010-1437\r\n\r\n Toshiyuki Okajima reported a race condition in the keyring subsystem.\r\n Local users can cause memory corruption via keyctl commands that\r\n access a keyring in the process of being deleted, resulting in a\r\n denial of service.\r\n\r\nCVE-2010-1446\r\n\r\n Wufei reported an issue with kgdb on the PowerPC architecture,\r\n allowing local users to write to kernel memory. Note: this issue\r\n does not affect binary kernels provided by Debian. The fix is\r\n provided for the benefit of users who build their own kernels\r\n from Debian source.\r\n\r\nCVE-2010-1451\r\n\r\n Brad Spengler reported an issue on the SPARC architecture that allows\r\n local users to execute non-executable pages.\r\n\r\nThis update also includes fixes a regression introduced by a previous\r\nupdate. See the referenced Debian bug page for details.\r\n\r\nFor the stable distribution (lenny), these problems have been fixed in\r\nversion 2.6.26-22lenny1.\r\n\r\nWe recommend that you upgrade your linux-2.6 and user-mode-linux\r\npackages.\r\n\r\nThe following matrix lists additional source packages that were\r\nrebuilt for compatibility with or to take advantage of this update:\r\n\r\n Debian 5.0 (lenny)\r\n user-mode-linux 2.6.26-1um-2+22lenny1\r\n\r\nUpgrade instructions\r\n- --------------------\r\n\r\nwget url\r\n will fetch the file for you\r\ndpkg -i file.deb\r\n will install the referenced file.\r\n\r\nIf you are using the apt-get package manager, use the line for\r\nsources.list as given below:\r\n\r\napt-get update\r\n will update the internal database\r\napt-get upgrade\r\n will install corrected packages\r\n\r\nYou may use an automated update by adding the resources from the\r\nfooter to the proper configuration.\r\n\r\nDebian GNU/Linux 5.0 alias lenny\r\n- --------------------------------\r\n\r\nStable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips,\r\nmipsel, powerpc, s390 and sparc.\r\n\r\nSource archives:\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26.orig.tar.gz\r\n Size/MD5 checksum: 61818969 85e039c2588d5bf3cb781d1c9218bbcb\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-22lenny1.dsc\r\n Size/MD5 checksum: 5778 713b8a3f2bc10816264a81c0a9eb7860\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-22lenny1.diff.gz\r\n Size/MD5 checksum: 7894925 86ecf2ca8808aea84b0af06317616a6c\r\n\r\nArchitecture independent packages:\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.26-2_2.6.26-22lenny1_all.deb\r\n Size/MD5 checksum: 126228 be9c5c392a1ab0cf0a297063abf983f6\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.26_2.6.26-22lenny1_all.deb\r\n Size/MD5 checksum: 1764832 b0d63ac0b12a0679867b8b53bf4c3a54\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.26_2.6.26-22lenny1_all.deb\r\n Size/MD5 checksum: 2871892 c5c0e0d8ea193812566f9481e6ca8440\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.26_2.6.26-22lenny1_all.deb\r\n Size/MD5 checksum: 48764508 9a203c801fd068d282d1cbb11fbab68f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.26_2.6.26-22lenny1_all.deb\r\n Size/MD5 checksum: 4627886 fe792ad0bcf2c9f8ac4bb496e9885a20\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.26_2.6.26-22lenny1_all.deb\r\n Size/MD5 checksum: 110906 6ef2c4468e55570a3e571021299d4760\r\n\r\nalpha architecture (DEC Alpha)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-smp_2.6.26-22lenny1_alpha.deb\r\n Size/MD5 checksum: 374304 046703c72d1bf6bcc81cb462e0f4d7ec\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-generic_2.6.26-22lenny1_alpha.deb\r\n Size/MD5 checksum: 372708 a6922d1de2035d2745d5ad56a6e38eb9\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-generic_2.6.26-22lenny1_alpha.deb\r\n Size/MD5 checksum: 28676342 687312e7cdf46a79c7c4b974cbe5b542\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-22lenny1_alpha.deb\r\n Size/MD5 checksum: 3620318 4c7448f11e8a63ddec95b7ddaf6e9c02\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-smp_2.6.26-22lenny1_alpha.deb\r\n Size/MD5 checksum: 29374588 452a568c8f74d69e3b7ba6e1685d4863\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-legacy_2.6.26-22lenny1_alpha.deb\r\n Size/MD5 checksum: 373176 fbda1e3fb70a213ee26ab4e0a5af16a7\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-alpha_2.6.26-22lenny1_alpha.deb\r\n Size/MD5 checksum: 110428 82fc153ba577607964e55ce0d5eba8a8\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-22lenny1_alpha.deb\r\n Size/MD5 checksum: 110404 9e24c63932b52a18206f951f18438a90\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-22lenny1_alpha.deb\r\n Size/MD5 checksum: 760714 dbef4d63df60be4c54e5a8999b2f1203\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-legacy_2.6.26-22lenny1_alpha.deb\r\n Size/MD5 checksum: 28661322 db654cfdd26ec48b75fbf73bae54d15b\r\n\r\namd64 architecture (AMD x86_64 (AMD64))\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-22lenny1_amd64.deb\r\n Size/MD5 checksum: 391290 529d0af88248eeb9db6c720147c3c9c9\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-amd64_2.6.26-22lenny1_amd64.deb\r\n Size/MD5 checksum: 1809098 2119049dd7757d1a7aa9b0cb6d65a4e6\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-22lenny1_amd64.deb\r\n Size/MD5 checksum: 753158 c06cd160c023755232e79c187b20a98e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-amd64_2.6.26-22lenny1_amd64.deb\r\n Size/MD5 checksum: 391970 7e2145ea394dcbd739307b7cff343ffc\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-amd64_2.6.26-22lenny1_amd64.deb\r\n Size/MD5 checksum: 387348 d76eb180fa81f742ee87d9524f3bc5a3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-amd64_2.6.26-22lenny1_amd64.deb\r\n Size/MD5 checksum: 20949852 a3c0bd81f9f9cc96d2e42521fb963fb9\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-22lenny1_amd64.deb\r\n Size/MD5 checksum: 3757248 db362b7459220059221418a2b1542659\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-amd64_2.6.26-22lenny1_amd64.deb\r\n Size/MD5 checksum: 110338 19ec7c8ca6e51c0a93352a059f9d5df8\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-amd64_2.6.26-22lenny1_amd64.deb\r\n Size/MD5 checksum: 19315990 c185e17d0ca1ed640106dbb828c919f8\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-amd64_2.6.26-22lenny1_amd64.deb\r\n Size/MD5 checksum: 110374 0e703e2b4306ca1e68cc61460ef86686\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-amd64_2.6.26-22lenny1_amd64.deb\r\n Size/MD5 checksum: 21102730 604476ba9a35fdb435b4409e5323cf89\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-22lenny1_amd64.deb\r\n Size/MD5 checksum: 3724662 ae8fed857d819d7a3dd5b3085c367085\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-22lenny1_amd64.deb\r\n Size/MD5 checksum: 3780338 a2cd8cdd414be8c412bd923576ccb456\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-22lenny1_amd64.deb\r\n Size/MD5 checksum: 3856722 9621b8e802a4e482de1db03572b0f72d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-22lenny1_amd64.deb\r\n Size/MD5 checksum: 20931422 9d71c45188552af06abd5a04d62b7c84\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-22lenny1_amd64.deb\r\n Size/MD5 checksum: 110350 acdbea58008fec881f380752f9fc3ea6\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-amd64_2.6.26-22lenny1_amd64.deb\r\n Size/MD5 checksum: 397220 709b723fefd37764ab8bffb079eb312f\r\n\r\narm architecture (ARM)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-22lenny1_arm.deb\r\n Size/MD5 checksum: 12494622 96304f7aa2bddb3ea2ef404afaa4a513\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-footbridge_2.6.26-22lenny1_arm.deb\r\n Size/MD5 checksum: 352980 44e27ad26963a2c1dbed9240b28d7c5b\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-footbridge_2.6.26-22lenny1_arm.deb\r\n Size/MD5 checksum: 10294730 8066047f7d15cd2f7a6c93018cfaae37\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-22lenny1_arm.deb\r\n Size/MD5 checksum: 369410 e26f28edccaeabf04dec8e4d2d8cc88f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-22lenny1_arm.deb\r\n Size/MD5 checksum: 11443274 d9232ed2bbde0e851f72488a2eea831d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-arm_2.6.26-22lenny1_arm.deb\r\n Size/MD5 checksum: 110444 631821dedb019f48b3133246338f4521\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-22lenny1_arm.deb\r\n Size/MD5 checksum: 751260 027d7225ddd40e26f12a9c7c7cc17b55\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-22lenny1_arm.deb\r\n Size/MD5 checksum: 4140556 a36e76af416da97176639d34a6dd42a2\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-22lenny1_arm.deb\r\n Size/MD5 checksum: 368088 8388881b72ce56cef47cb61a51abfe8d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-22lenny1_arm.deb\r\n Size/MD5 checksum: 11731284 cc6e8949fe66950db619eb2996332572\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-22lenny1_arm.deb\r\n Size/MD5 checksum: 110404 611a83d9ddb07104525d3ae7eca714b8\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-22lenny1_arm.deb\r\n Size/MD5 checksum: 364180 878a5bd8fa6419dd6efe6422c7a14cbc\r\n\r\narmel architecture (ARM EABI)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-22lenny1_armel.deb\r\n Size/MD5 checksum: 365700 0327b96ec1802e56c4ffee19ce1c9dc5\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-22lenny1_armel.deb\r\n Size/MD5 checksum: 368810 05ee76d995844fc8461223846ab41802\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-22lenny1_armel.deb\r\n Size/MD5 checksum: 110358 830c76ccdf7d7c99f3ea84e1e8bc962d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-22lenny1_armel.deb\r\n Size/MD5 checksum: 11691670 0ecbec767291466b244fd83506f1e112\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-armel_2.6.26-22lenny1_armel.deb\r\n Size/MD5 checksum: 110392 c64900dc9ec3812df164d47c006ecffe\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-22lenny1_armel.deb\r\n Size/MD5 checksum: 11399558 2d16b67f176b8223bd4dd33b90217a2e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-versatile_2.6.26-22lenny1_armel.deb\r\n Size/MD5 checksum: 340088 3b6e8d8210d6e6e68eee6ddc2cab8f09\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-22lenny1_armel.deb\r\n Size/MD5 checksum: 4136736 42aebe2283d941bb7724daf03882914d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-22lenny1_armel.deb\r\n Size/MD5 checksum: 12451186 f22b998fbdfa29023573bf9b6988dba9\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-22lenny1_armel.deb\r\n Size/MD5 checksum: 751906 d1d0480ba764b4ca3bdae8a651acd066\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-versatile_2.6.26-22lenny1_armel.deb\r\n Size/MD5 checksum: 9606938 569b72a642446ac1ffe4ed2aa13f50aa\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-22lenny1_armel.deb\r\n Size/MD5 checksum: 370546 a3f2c479e65c9ae3be17641001b33afc\r\n\r\nhppa architecture (HP PA RISC)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc-smp_2.6.26-22lenny1_hppa.deb\r\n Size/MD5 checksum: 302516 dd1800b19f0df391bd05658a0a7846c0\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-22lenny1_hppa.deb\r\n Size/MD5 checksum: 110354 479a0788049f39e648e57a3c5007b993\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-22lenny1_hppa.deb\r\n Size/MD5 checksum: 3598606 4429cb37eda685553dde7198e5b47fd5\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-22lenny1_hppa.deb\r\n Size/MD5 checksum: 762928 fe2e02babc93f6bdcc16c8f7ad8a5a88\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64_2.6.26-22lenny1_hppa.deb\r\n Size/MD5 checksum: 301842 1e58cca757600c08424118ace4a50da5\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-hppa_2.6.26-22lenny1_hppa.deb\r\n Size/MD5 checksum: 110374 9198f6103932b14d766b0e4c32110806\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc_2.6.26-22lenny1_hppa.deb\r\n Size/MD5 checksum: 301034 890ed76fde4dedddcb9db60f7ba0091d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64_2.6.26-22lenny1_hppa.deb\r\n Size/MD5 checksum: 17127808 a2cffd928aa5e30ab9f1f30e41b9aed1\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64-smp_2.6.26-22lenny1_hppa.deb\r\n Size/MD5 checksum: 17678124 53aa5bddb6f2af761a8bfcb1fef54d02\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc_2.6.26-22lenny1_hppa.deb\r\n Size/MD5 checksum: 15784596 c892e98e5ab6fcf6aa84aa5e5021309f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc-smp_2.6.26-22lenny1_hppa.deb\r\n Size/MD5 checksum: 16388546 0ce6b1186e64e745a0680088d2c9fcad\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64-smp_2.6.26-22lenny1_hppa.deb\r\n Size/MD5 checksum: 303348 6991ba8c20ae638798fda57540014d30\r\n\r\ni386 architecture (Intel ia32)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 399720 ee32214acdf697edca92068f2d64f8b3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-i386_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 110450 191bb7f29ece9f8ea2f8cff03efae3cd\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-686_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 398126 32ef574340b20e8f2c7465f2290a8c0b\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 413242 a5f35b11ae06961132fd16e21d5b5337\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-486_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 409820 586c33fc476019b08a3b75816d9bf520\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-686_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 110392 3f9c02cb47bc1070b92358227e030768\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686-bigmem_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 20530142 c8e9146e82955c0dda3bcabe8b7542ef\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686-bigmem_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 20509696 98b0e600e9bca75f016f1c4878d9d8e7\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 767274 369a4858f7dfa2560ec664a08fdbac42\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 3865974 0510efa636bb1554f9a2c040c1ee6f19\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 20409094 798b4bb9a4b8d81affc30dbc2f284cc3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-686_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 20679068 6b6c2a57037f510313311d76849a9b0a\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 3807640 6b21b3346b8196f19ea59d16a2e7b8f4\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-686_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 18198474 627d51edc59f86bd8dfe2e7a74a25723\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 20381812 493e6acfd2d47e456d1471ef44dd18ba\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-686_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 1596580 5f456e26e01a793881871f4d683b13b1\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-686_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 417750 057786734b1771be73cea6c484a09cce\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686-bigmem_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 410364 4f381b525756e6cf131be68398e58fe7\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 110394 46fba74b6675f6df2057da14ba3931f9\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 409858 99ce0b8165bd71e4b90745ad5a7577d1\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 3947966 aabcdf68ca8c4d35d87ad2eecb569517\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-486_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 20350468 fb0caa5f722a968820562223577a4e74\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 21022322 befe070ada9e62a69c15f38c9f0e706a\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 3842206 b5e7820e844761d65d8dbf0a4ea639e5\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686-bigmem_2.6.26-22lenny1_i386.deb\r\n Size/MD5 checksum: 411454 771b6960fbfd4658124eac3673e01e90\r\n\r\nia64 architecture (Intel ia64)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-itanium_2.6.26-22lenny1_ia64.deb\r\n Size/MD5 checksum: 359186 d2391d9bdb5fe861abe5fbd0f9f2f989\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-22lenny1_ia64.deb\r\n Size/MD5 checksum: 3659176 8df0d712004a67cafedb9b4926970368\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-mckinley_2.6.26-22lenny1_ia64.deb\r\n Size/MD5 checksum: 359256 18a5fda7c38b900462ea120ae04a3c98\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-mckinley_2.6.26-22lenny1_ia64.deb\r\n Size/MD5 checksum: 34440420 2eddbf5140a8dc8a4a74d4e11a77ea44\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-22lenny1_ia64.deb\r\n Size/MD5 checksum: 751862 329f5ddfc14f4f6e63aa3834f7a927fe\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-22lenny1_ia64.deb\r\n Size/MD5 checksum: 3691882 19f4f11bbad0443a7ae7153823bcc0e7\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-mckinley_2.6.26-22lenny1_ia64.deb\r\n Size/MD5 checksum: 359722 f3d89cc673ff0f2e5b7ff2e718ff44f1\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-itanium_2.6.26-22lenny1_ia64.deb\r\n Size/MD5 checksum: 34252074 96729f987e7b7e02802b240da3a3293c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-mckinley_2.6.26-22lenny1_ia64.deb\r\n Size/MD5 checksum: 34376386 f97af824a762b90b102d84f5c1bf65f8\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-22lenny1_ia64.deb\r\n Size/MD5 checksum: 110350 9881f68b5f5446c4c773dc60d655a589\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-itanium_2.6.26-22lenny1_ia64.deb\r\n Size/MD5 checksum: 34191126 c5412cb1277801d2a2488be36dc1ad0e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-ia64_2.6.26-22lenny1_ia64.deb\r\n Size/MD5 checksum: 110386 c1ddbef0eeae94731617e277b32018c6\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-itanium_2.6.26-22lenny1_ia64.deb\r\n Size/MD5 checksum: 359654 cba07c82268fc13d6007ecf4be2c8508\r\n\r\nmips architecture (MIPS (Big Endian))\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r4k-ip22_2.6.26-22lenny1_mips.deb\r\n Size/MD5 checksum: 262068 31c1aadffe81551bef675f9bc91b6f1e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-5kc-malta_2.6.26-22lenny1_mips.deb\r\n Size/MD5 checksum: 29432478 38c75d466da039b9e2ac1c70898b50ae\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-5kc-malta_2.6.26-22lenny1_mips.deb\r\n Size/MD5 checksum: 358936 9ec1ce1473362c253cf4dc7d2fd791f6\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-22lenny1_mips.deb\r\n Size/MD5 checksum: 3966442 111674b840698cede9cdf3ecec2d5e3b\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1a-bcm91480b_2.6.26-22lenny1_mips.deb\r\n Size/MD5 checksum: 302384 7f9f26f809e46a4748158588402d7ace\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-4kc-malta_2.6.26-22lenny1_mips.deb\r\n Size/MD5 checksum: 359360 d07b20a27666a8cb2c43f03eeb729c57\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r5k-ip32_2.6.26-22lenny1_mips.deb\r\n Size/MD5 checksum: 285392 9d513d80efd66be3e9ba7fa929b13b5f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1-bcm91250a_2.6.26-22lenny1_mips.deb\r\n Size/MD5 checksum: 303780 3a507cccd77e01f7449a8ff73a3e5f6f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-22lenny1_mips.deb\r\n Size/MD5 checksum: 760156 80eaea319450a06fe9c2310bdff051e2\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-4kc-malta_2.6.26-22lenny1_mips.deb\r\n Size/MD5 checksum: 23504896 f928208abb4eb3ade6185409df5fa417\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1-bcm91250a_2.6.26-22lenny1_mips.deb\r\n Size/MD5 checksum: 20252984 09ee52755ae4cf03ca082e8dbc977206\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1a-bcm91480b_2.6.26-22lenny1_mips.deb\r\n Size/MD5 checksum: 20244176 3c568fce5cab57746ca1dc53c8fcc754\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-22lenny1_mips.deb\r\n Size/MD5 checksum: 110400 6676cd4c8df659937bac47ed0c08bf37\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-mips_2.6.26-22lenny1_mips.deb\r\n Size/MD5 checksum: 110464 fcbbce5e6741f1a1ec4830dba9a8ee91\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r4k-ip22_2.6.26-22lenny1_mips.deb\r\n Size/MD5 checksum: 11542616 0ead2243e1d4c2cb50760d97f9a6a2f7\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r5k-ip32_2.6.26-22lenny1_mips.deb\r\n Size/MD5 checksum: 15769388 08c7a66b4f1a5c9bc9f8cc5683d5786f\r\n\r\nmipsel architecture (MIPS (Little Endian))\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1-bcm91250a_2.6.26-22lenny1_mipsel.deb\r\n Size/MD5 checksum: 19682018 7e665290822815634b1666523270919e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-mipsel_2.6.26-22lenny1_mipsel.deb\r\n Size/MD5 checksum: 110460 445931c0ad4fa00f8875f5cbaf9d83aa\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1a-bcm91480b_2.6.26-22lenny1_mipsel.deb\r\n Size/MD5 checksum: 19667420 02ae9fef2fea1c4ccd667c73025039f9\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-22lenny1_mipsel.deb\r\n Size/MD5 checksum: 760930 064ffab1507d84791e943528662e4c86\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r5k-cobalt_2.6.26-22lenny1_mipsel.deb\r\n Size/MD5 checksum: 297650 4433daa21c6e697d8c1bb33355e14ee1\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-4kc-malta_2.6.26-22lenny1_mipsel.deb\r\n Size/MD5 checksum: 359828 870a33c1aea0535ab0b25f3016aa9623\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-4kc-malta_2.6.26-22lenny1_mipsel.deb\r\n Size/MD5 checksum: 23074870 998294807dde61335d413ecf50fdbf3b\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-22lenny1_mipsel.deb\r\n Size/MD5 checksum: 3967560 590a467f25e74daf442dfd54caaf104e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1-bcm91250a_2.6.26-22lenny1_mipsel.deb\r\n Size/MD5 checksum: 303240 9620ba551b29adb6052e13f8277347c0\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1a-bcm91480b_2.6.26-22lenny1_mipsel.deb\r\n Size/MD5 checksum: 302768 59fe05d578020afc8e1e8fe3fce3b41c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-5kc-malta_2.6.26-22lenny1_mipsel.deb\r\n Size/MD5 checksum: 28568828 86e20054979d1ffc56c24f5db73d044a\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-22lenny1_mipsel.deb\r\n Size/MD5 checksum: 110406 3a073335ba3488e55549b82e005fefda\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r5k-cobalt_2.6.26-22lenny1_mipsel.deb\r\n Size/MD5 checksum: 15056072 429c33859de62cdfaa86e809e8625bec\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-5kc-malta_2.6.26-22lenny1_mipsel.deb\r\n Size/MD5 checksum: 359706 43272f2843e3b39735812c24aad332f5\r\n\r\npowerpc architecture (PowerPC)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-22lenny1_powerpc.deb\r\n Size/MD5 checksum: 110358 eb7bc8e6a28a6801bc7be5d22bf95a2f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc_2.6.26-22lenny1_powerpc.deb\r\n Size/MD5 checksum: 23581674 48797e6c39bef5a0fd120d973b541f07\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc_2.6.26-22lenny1_powerpc.deb\r\n Size/MD5 checksum: 363808 c2c489e8798d50db73d709367e390113\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc-smp_2.6.26-22lenny1_powerpc.deb\r\n Size/MD5 checksum: 365378 a4c38de9a287a71e84d09d5474393d41\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-powerpc_2.6.26-22lenny1_powerpc.deb\r\n Size/MD5 checksum: 110392 9dd420c73a4b0c7d55fe2372a439adfb\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc64_2.6.26-22lenny1_powerpc.deb\r\n Size/MD5 checksum: 23420066 5bf69b74154de2ae05db3280f2070b74\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-22lenny1_powerpc.deb\r\n Size/MD5 checksum: 3782640 31d483da8ccb87dbd7f75200515c8b3f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc64_2.6.26-22lenny1_powerpc.deb\r\n Size/MD5 checksum: 23474914 42ba4ae5a23355aba50cb1a8c018a631\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc_2.6.26-22lenny1_powerpc.deb\r\n Size/MD5 checksum: 366524 a3970adc5168a37d49f28c5ce4ca05ff\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-22lenny1_powerpc.deb\r\n Size/MD5 checksum: 746782 d0ef1631862e4130479ce4e3da0a6050\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-22lenny1_powerpc.deb\r\n Size/MD5 checksum: 3814900 2b936155fef59a231764ca014043b806\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc64_2.6.26-22lenny1_powerpc.deb\r\n Size/MD5 checksum: 370710 35281c3da9947c322b12a014adabbcad\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc_2.6.26-22lenny1_powerpc.deb\r\n Size/MD5 checksum: 23159310 22caa95faeb5687d37e677b4e34503b6\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc64_2.6.26-22lenny1_powerpc.deb\r\n Size/MD5 checksum: 371066 9961d473b25000f7bb7a23bde2720323\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc-smp_2.6.26-22lenny1_powerpc.deb\r\n Size/MD5 checksum: 23557104 bd8ab7bd0594a795f34dac94ee24ffae\r\n\r\ns390 architecture (IBM S/390)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-22lenny1_s390.deb\r\n Size/MD5 checksum: 758022 786d9ca518b1a573caf38f5492104cc4\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-s390x_2.6.26-22lenny1_s390.deb\r\n Size/MD5 checksum: 238208 3155d20f0210f5fd9a2e27fc28165502\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390_2.6.26-22lenny1_s390.deb\r\n Size/MD5 checksum: 236574 05d74c2012431ee9bdae90e172a82de0\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390x_2.6.26-22lenny1_s390.deb\r\n Size/MD5 checksum: 237136 7950ba3ebfc31e3cf6536b34eccaf684\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390x_2.6.26-22lenny1_s390.deb\r\n Size/MD5 checksum: 7828888 56510e3515975d5ed979a55fb0bb14b7\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390-tape_2.6.26-22lenny1_s390.deb\r\n Size/MD5 checksum: 1633146 654e757be4670f764a99049c7984aa98\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-22lenny1_s390.deb\r\n Size/MD5 checksum: 3633806 0c911d5a677f4fdb22f44cf617cd8374\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390_2.6.26-22lenny1_s390.deb\r\n Size/MD5 checksum: 7534830 da50ed9bfd6846d2ab2ced362b19ab4e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-s390x_2.6.26-22lenny1_s390.deb\r\n Size/MD5 checksum: 7889984 06c9c7d89731808d7e376986cc472843\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-22lenny1_s390.deb\r\n Size/MD5 checksum: 110394 68dd1fe380aa0c9ba6caa84f934569fd\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-s390_2.6.26-22lenny1_s390.deb\r\n Size/MD5 checksum: 110416 c1d7fd64b9efab8228f305d5474de5d1\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-22lenny1_s390.deb\r\n Size/MD5 checksum: 3598560 f63cbef687984b543d1152e013bc95fe\r\n\r\nsparc architecture (Sun SPARC/UltraSPARC)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64_2.6.26-22lenny1_sparc.deb\r\n Size/MD5 checksum: 14291528 b0e802720e53cb53650b8a2d75d1588d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-sparc64_2.6.26-22lenny1_sparc.deb\r\n Size/MD5 checksum: 304718 aa3ebf9c5e7cde5fc11513c27b4396d0\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-sparc_2.6.26-22lenny1_sparc.deb\r\n Size/MD5 checksum: 110370 d746af2e449aaf644370d7b88a03cf2d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-sparc64_2.6.26-22lenny1_sparc.deb\r\n Size/MD5 checksum: 14631258 b056f4f2245e4e2da6ef8e7549224226\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64-smp_2.6.26-22lenny1_sparc.deb\r\n Size/MD5 checksum: 14611896 ad3108a56bbacf863b4f18521275887c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-22lenny1_sparc.deb\r\n Size/MD5 checksum: 800838 114ac1590a19b405fcacfb06ee36e55a\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-22lenny1_sparc.deb\r\n Size/MD5 checksum: 3820700 fff1d7baf26f32217a8100ca14875708\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-22lenny1_sparc.deb\r\n Size/MD5 checksum: 110352 02deff17df2e96a0ed208d786bdf9315\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-22lenny1_sparc.deb\r\n Size/MD5 checksum: 3785870 518b0d1f9d0d13adce8d6707726031ab\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64_2.6.26-22lenny1_sparc.deb\r\n Size/MD5 checksum: 302894 c9354f7c9769be34b6356e0d042a294e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64-smp_2.6.26-22lenny1_sparc.deb\r\n Size/MD5 checksum: 304918 228d8163856c2e8e261b0fd086475d68\r\n\r\n These files will probably be moved into the stable distribution on\r\n its next update.\r\n\r\n- ---------------------------------------------------------------------------------\r\nFor apt-get: deb http://security.debian.org/ stable/updates main\r\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\r\nMailing list: debian-security-announce@lists.debian.org\r\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.10 (GNU/Linux)\r\n\r\niD8DBQFL+3MJhuANDBmkLRkRAjDqAJwMEuGEy0K+/83MzS9JKdqpIQJPOwCeOES9\r\nuLOMccBCQ64c8seS3Oh0VEg=\r\n=X6oC\r\n-----END PGP SIGNATURE-----", "edition": 1, "modified": "2010-05-26T00:00:00", "published": "2010-05-26T00:00:00", "id": "SECURITYVULNS:DOC:23925", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:23925", "title": "[SECURITY] [DSA 2053-1] New Linux 2.6.26 packages fix several issues", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:35", "bulletinFamily": "software", "cvelist": ["CVE-2010-0307", "CVE-2009-3939", "CVE-2010-0410", "CVE-2010-0007", "CVE-2010-0291", "CVE-2010-0306", "CVE-2009-4027", "CVE-2010-0415", "CVE-2009-4538", "CVE-2010-0309", "CVE-2009-4536", "CVE-2010-1088", "CVE-2010-0003", "CVE-2010-0298"], "description": "DoS conditions, privilege escalations, kernel memory access, weak permissions.", "edition": 1, "modified": "2010-02-16T00:00:00", "published": "2010-02-16T00:00:00", "id": "SECURITYVULNS:VULN:10626", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:10626", "title": "Linux kernel multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "ubuntu": [{"lastseen": "2020-07-09T01:35:09", "bulletinFamily": "unix", "cvelist": ["CVE-2010-0419", "CVE-2009-4537", "CVE-2010-0008", "CVE-2010-0727", "CVE-2010-1187", "CVE-2010-0306", "CVE-2010-1162", "CVE-2010-1146", "CVE-2010-1084", "CVE-2010-0741", "CVE-2010-1148", "CVE-2010-1083", "CVE-2010-1085", "CVE-2010-1086", "CVE-2010-1188", "CVE-2010-0437", "CVE-2010-1088", "CVE-2010-1087", "CVE-2010-0298", "CVE-2009-4271", "CVE-2010-1488"], "description": "USN-947-1 fixed vulnerabilities in the Linux kernel. Fixes for \nCVE-2010-0419 caused failures when using KVM in certain situations. \nThis update reverts that fix until a better solution can be found.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\nIt was discovered that the Linux kernel did not correctly handle memory \nprotection of the Virtual Dynamic Shared Object page when running \na 32-bit application on a 64-bit kernel. A local attacker could \nexploit this to cause a denial of service. (Only affected Ubuntu 6.06 \nLTS.) (CVE-2009-4271)\n\nIt was discovered that the r8169 network driver did not correctly check \nthe size of Ethernet frames. A remote attacker could send specially \ncrafted traffic to crash the system, leading to a denial of service. \n(CVE-2009-4537)\n\nWei Yongjun discovered that SCTP did not correctly validate certain \nchunks. A remote attacker could send specially crafted traffic to \nmonopolize CPU resources, leading to a denial of service. (Only affected \nUbuntu 6.06 LTS.) (CVE-2010-0008)\n\nIt was discovered that KVM did not correctly limit certain privileged \nIO accesses on x86. Processes in the guest OS with access to IO regions \ncould gain further privileges within the guest OS. (Did not affect Ubuntu \n6.06 LTS.) (CVE-2010-0298, CVE-2010-0306, CVE-2010-0419)\n\nEvgeniy Polyakov discovered that IPv6 did not correctly handle \ncertain TUN packets. A remote attacker could exploit this to crash \nthe system, leading to a denial of service. (Only affected Ubuntu 8.04 \nLTS.) (CVE-2010-0437)\n\nSachin Prabhu discovered that GFS2 did not correctly handle certain locks. \nA local attacker with write access to a GFS2 filesystem could exploit \nthis to crash the system, leading to a denial of service. (CVE-2010-0727)\n\nJamie Strandboge discovered that network virtio in KVM did not correctly \nhandle certain high-traffic conditions. A remote attacker could exploit \nthis by sending specially crafted traffic to a guest OS, causing the \nguest to crash, leading to a denial of service. (Only affected Ubuntu \n8.04 LTS.) (CVE-2010-0741)\n\nMarcus Meissner discovered that the USB subsystem did not correctly handle \ncertain error conditions. A local attacker with access to a USB device \ncould exploit this to read recently used kernel memory, leading to a \nloss of privacy and potentially root privilege escalation. (CVE-2010-1083)\n\nNeil Brown discovered that the Bluetooth subsystem did not correctly \nhandle large amounts of traffic. A physically proximate remote attacker \ncould exploit this by sending specially crafted traffic that would consume \nall available system memory, leading to a denial of service. (Ubuntu \n6.06 LTS and 10.04 LTS were not affected.) (CVE-2010-1084)\n\nJody Bruchon discovered that the sound driver for the AMD780V did not \ncorrectly handle certain conditions. A local attacker with access to \nthis hardward could exploit the flaw to cause a system crash, leading \nto a denial of service. (CVE-2010-1085)\n\nAng Way Chuang discovered that the DVB driver did not correctly handle \ncertain MPEG2-TS frames. An attacker could exploit this by delivering \nspecially crafted frames to monopolize CPU resources, leading to a denial \nof service. (Ubuntu 10.04 LTS was not affected.) (CVE-2010-1086)\n\nTrond Myklebust discovered that NFS did not correctly handle truncation \nunder certain conditions. A local attacker with write access to an NFS \nshare could exploit this to crash the system, leading to a denial of \nservice. (Ubuntu 10.04 LTS was not affected.) (CVE-2010-1087)\n\nAl Viro discovered that automount of NFS did not correctly handle symlinks \nunder certain conditions. A local attacker could exploit this to crash \nthe system, leading to a denial of service. (Ubuntu 6.06 LTS and Ubuntu \n10.04 LTS were not affected.) (CVE-2010-1088)\n\nMatt McCutchen discovered that ReiserFS did not correctly protect xattr \nfiles in the .reiserfs_priv directory. A local attacker could exploit \nthis to gain root privileges or crash the system, leading to a denial \nof service. (CVE-2010-1146)\n\nEugene Teo discovered that CIFS did not correctly validate arguments when \ncreating new files. A local attacker could exploit this to crash the \nsystem, leading to a denial of service, or possibly gain root privileges \nif mmap_min_addr was not set. (CVE-2010-1148)\n\nCatalin Marinas and Tetsuo Handa discovered that the TTY layer did not \ncorrectly release process IDs. A local attacker could exploit this to \nconsume kernel resources, leading to a denial of service. (CVE-2010-1162)\n\nNeil Horman discovered that TIPC did not correctly check its internal \nstate. A local attacker could send specially crafted packets via AF_TIPC \nthat would cause the system to crash, leading to a denial of service. \n(Ubuntu 6.06 LTS was not affected.) (CVE-2010-1187)\n\nMasayuki Nakagawa discovered that IPv6 did not correctly handle \ncertain settings when listening. If a socket were listening with the \nIPV6_RECVPKTINFO flag, a remote attacker could send specially crafted \ntraffic that would cause the system to crash, leading to a denial of \nservice. (Only Ubuntu 6.06 LTS was affected.) (CVE-2010-1188)\n\nOleg Nesterov discovered that the Out-Of-Memory handler did not correctly \nhandle certain arrangements of processes. A local attacker could exploit \nthis to crash the system, leading to a denial of service. (CVE-2010-1488)", "edition": 5, "modified": "2010-06-04T00:00:00", "published": "2010-06-04T00:00:00", "id": "USN-947-2", "href": "https://ubuntu.com/security/notices/USN-947-2", "title": "Linux kernel regression", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-07-09T01:32:32", "bulletinFamily": "unix", "cvelist": ["CVE-2010-0419", "CVE-2009-4537", "CVE-2010-0008", "CVE-2010-0727", "CVE-2010-1187", "CVE-2010-0306", "CVE-2010-1162", "CVE-2010-1146", "CVE-2010-1084", "CVE-2010-0741", "CVE-2010-1148", "CVE-2010-1083", "CVE-2010-1085", "CVE-2010-1086", "CVE-2010-1188", "CVE-2010-0437", "CVE-2010-1088", "CVE-2010-1087", "CVE-2010-0298", "CVE-2009-4271", "CVE-2010-1488"], "description": "It was discovered that the Linux kernel did not correctly handle memory \nprotection of the Virtual Dynamic Shared Object page when running \na 32-bit application on a 64-bit kernel. A local attacker could \nexploit this to cause a denial of service. (Only affected Ubuntu 6.06 \nLTS.) (CVE-2009-4271)\n\nIt was discovered that the r8169 network driver did not correctly check \nthe size of Ethernet frames. A remote attacker could send specially \ncrafted traffic to crash the system, leading to a denial of service. \n(CVE-2009-4537)\n\nWei Yongjun discovered that SCTP did not correctly validate certain \nchunks. A remote attacker could send specially crafted traffic to \nmonopolize CPU resources, leading to a denial of service. (Only affected \nUbuntu 6.06 LTS.) (CVE-2010-0008)\n\nIt was discovered that KVM did not correctly limit certain privileged \nIO accesses on x86. Processes in the guest OS with access to IO regions \ncould gain further privileges within the guest OS. (Did not affect Ubuntu \n6.06 LTS.) (CVE-2010-0298, CVE-2010-0306, CVE-2010-0419)\n\nEvgeniy Polyakov discovered that IPv6 did not correctly handle \ncertain TUN packets. A remote attacker could exploit this to crash \nthe system, leading to a denial of service. (Only affected Ubuntu 8.04 \nLTS.) (CVE-2010-0437)\n\nSachin Prabhu discovered that GFS2 did not correctly handle certain locks. \nA local attacker with write access to a GFS2 filesystem could exploit \nthis to crash the system, leading to a denial of service. (CVE-2010-0727)\n\nJamie Strandboge discovered that network virtio in KVM did not correctly \nhandle certain high-traffic conditions. A remote attacker could exploit \nthis by sending specially crafted traffic to a guest OS, causing the \nguest to crash, leading to a denial of service. (Only affected Ubuntu \n8.04 LTS.) (CVE-2010-0741)\n\nMarcus Meissner discovered that the USB subsystem did not correctly handle \ncertain error conditions. A local attacker with access to a USB device \ncould exploit this to read recently used kernel memory, leading to a \nloss of privacy and potentially root privilege escalation. (CVE-2010-1083)\n\nNeil Brown discovered that the Bluetooth subsystem did not correctly \nhandle large amounts of traffic. A physically proximate remote attacker \ncould exploit this by sending specially crafted traffic that would consume \nall available system memory, leading to a denial of service. (Ubuntu \n6.06 LTS and 10.04 LTS were not affected.) (CVE-2010-1084)\n\nJody Bruchon discovered that the sound driver for the AMD780V did not \ncorrectly handle certain conditions. A local attacker with access to \nthis hardward could exploit the flaw to cause a system crash, leading \nto a denial of service. (CVE-2010-1085)\n\nAng Way Chuang discovered that the DVB driver did not correctly handle \ncertain MPEG2-TS frames. An attacker could exploit this by delivering \nspecially crafted frames to monopolize CPU resources, leading to a denial \nof service. (Ubuntu 10.04 LTS was not affected.) (CVE-2010-1086)\n\nTrond Myklebust discovered that NFS did not correctly handle truncation \nunder certain conditions. A local attacker with write access to an NFS \nshare could exploit this to crash the system, leading to a denial of \nservice. (Ubuntu 10.04 LTS was not affected.) (CVE-2010-1087)\n\nAl Viro discovered that automount of NFS did not correctly handle symlinks \nunder certain conditions. A local attacker could exploit this to crash \nthe system, leading to a denial of service. (Ubuntu 6.06 LTS and Ubuntu \n10.04 LTS were not affected.) (CVE-2010-1088)\n\nMatt McCutchen discovered that ReiserFS did not correctly protect xattr \nfiles in the .reiserfs_priv directory. A local attacker could exploit \nthis to gain root privileges or crash the system, leading to a denial \nof service. (CVE-2010-1146)\n\nEugene Teo discovered that CIFS did not correctly validate arguments when \ncreating new files. A local attacker could exploit this to crash the \nsystem, leading to a denial of service, or possibly gain root privileges \nif mmap_min_addr was not set. (CVE-2010-1148)\n\nCatalin Marinas and Tetsuo Handa discovered that the TTY layer did not \ncorrectly release process IDs. A local attacker could exploit this to \nconsume kernel resources, leading to a denial of service. (CVE-2010-1162)\n\nNeil Horman discovered that TIPC did not correctly check its internal \nstate. A local attacker could send specially crafted packets via AF_TIPC \nthat would cause the system to crash, leading to a denial of service. \n(Ubuntu 6.06 LTS was not affected.) (CVE-2010-1187)\n\nMasayuki Nakagawa discovered that IPv6 did not correctly handle \ncertain settings when listening. If a socket were listening with the \nIPV6_RECVPKTINFO flag, a remote attacker could send specially crafted \ntraffic that would cause the system to crash, leading to a denial of \nservice. (Only Ubuntu 6.06 LTS was affected.) (CVE-2010-1188)\n\nOleg Nesterov discovered that the Out-Of-Memory handler did not correctly \nhandle certain arrangements of processes. A local attacker could exploit \nthis to crash the system, leading to a denial of service. (CVE-2010-1488)", "edition": 5, "modified": "2010-06-03T00:00:00", "published": "2010-06-03T00:00:00", "id": "USN-947-1", "href": "https://ubuntu.com/security/notices/USN-947-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}]}