Linux Kernel 2.6.x - Ext4 - 'move extents' ioctl Local Privilege Escalation Vulnerability
2009-11-09T00:00:00
ID EDB-ID:33395 Type exploitdb Reporter Akira Fujita Modified 2009-11-09T00:00:00
Description
Linux Kernel 2.6.x Ext4 'move extents' ioctl Local Privilege Escalation Vulnerability. CVE-2009-4131. Local exploit for linux platform
source: http://www.securityfocus.com/bid/37277/info
Linux kernel is prone to a local privilege-escalation vulnerability because the software fails to verify access permissions.
Exploits may allow attackers to execute arbitrary code with kernel-level privileges and launch other attacks.
Successful exploits will result in the complete compromise of affected computers.
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/33395.tgz
{"id": "EDB-ID:33395", "type": "exploitdb", "bulletinFamily": "exploit", "title": "Linux Kernel 2.6.x - Ext4 - 'move extents' ioctl Local Privilege Escalation Vulnerability", "description": "Linux Kernel 2.6.x Ext4 'move extents' ioctl Local Privilege Escalation Vulnerability. CVE-2009-4131. Local exploit for linux platform", "published": "2009-11-09T00:00:00", "modified": "2009-11-09T00:00:00", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.exploit-db.com/exploits/33395/", "reporter": "Akira Fujita", "references": [], "cvelist": ["CVE-2009-4131"], "lastseen": "2016-02-03T19:06:16", "viewCount": 52, "enchantments": {"score": {"value": 6.1, "vector": "NONE", "modified": "2016-02-03T19:06:16", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2009-4131"]}, {"type": "openvas", "idList": ["OPENVAS:862161", "OPENVAS:861964", "OPENVAS:1361412562310861720", "OPENVAS:66582", "OPENVAS:136141256231066499", "OPENVAS:136141256231066582", "OPENVAS:1361412562310861964", "OPENVAS:1361412562310862161", "OPENVAS:66499", "OPENVAS:861720"]}, {"type": "nessus", "idList": ["UBUNTU_USN-869-1.NASL", "MANDRIVA_MDVSA-2009-329.NASL", "SUSE_11_2_KERNEL-091218.NASL", "FEDORA_2009-13039.NASL"]}, {"type": "seebug", "idList": ["SSV:15068"]}, {"type": "ubuntu", "idList": ["USN-869-1"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:10464", "SECURITYVULNS:DOC:22919"]}, {"type": "suse", "idList": ["SUSE-SA:2010:001"]}, {"type": "oraclelinux", "idList": ["ELSA-2010-0178"]}], "modified": "2016-02-03T19:06:16", "rev": 2}, "vulnersScore": 6.1}, "sourceHref": "https://www.exploit-db.com/download/33395/", "sourceData": "source: http://www.securityfocus.com/bid/37277/info\r\n\r\nLinux kernel is prone to a local privilege-escalation vulnerability because the software fails to verify access permissions.\r\n\r\nExploits may allow attackers to execute arbitrary code with kernel-level privileges and launch other attacks.\r\n\r\nSuccessful exploits will result in the complete compromise of affected computers.\r\n\r\nhttps://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/33395.tgz", "osvdbidlist": ["60867"]}
{"cve": [{"lastseen": "2021-02-02T05:40:07", "description": "The EXT4_IOC_MOVE_EXT (aka move extents) ioctl implementation in the ext4 filesystem in the Linux kernel before 2.6.32-git6 allows local users to overwrite arbitrary files via a crafted request, related to insufficient checks for file permissions.", "edition": 6, "cvss3": {}, "published": "2009-12-13T01:30:00", "title": "CVE-2009-4131", "type": "cve", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-4131"], "modified": "2012-03-19T04:00:00", "cpe": ["cpe:/o:linux:linux_kernel:2.6.20.9", "cpe:/o:linux:linux_kernel:2.6.18.1", "cpe:/o:linux:linux_kernel:2.6.22.3", "cpe:/o:linux:linux_kernel:2.6.30.4", "cpe:/o:linux:linux_kernel:2.6.16.49", "cpe:/o:linux:linux_kernel:2.6.19.1", "cpe:/o:linux:linux_kernel:2.6.28.6", "cpe:/o:linux:linux_kernel:2.6.31.2", "cpe:/o:linux:linux_kernel:2.6.22.19", "cpe:/o:linux:linux_kernel:2.6.16.4", "cpe:/o:linux:linux_kernel:2.6.16.15", "cpe:/o:linux:linux_kernel:2.6.15.2", "cpe:/o:linux:linux_kernel:2.6.27.30", "cpe:/o:linux:linux_kernel:2.6.22.15", "cpe:/o:linux:linux_kernel:2.6.23.17", "cpe:/o:linux:linux_kernel:2.6.23.12", "cpe:/o:linux:linux_kernel:2.6.16.3", "cpe:/o:linux:linux_kernel:2.6.23.1", "cpe:/o:linux:linux_kernel:2.6.21", "cpe:/o:linux:linux_kernel:2.6.14.4", "cpe:/o:linux:linux_kernel:2.6.16.20", "cpe:/o:linux:linux_kernel:2.6.23.8", "cpe:/o:linux:linux_kernel:2.6.29.2", "cpe:/o:linux:linux_kernel:2.6.26.2", "cpe:/o:linux:linux_kernel:2.6.4", "cpe:/o:linux:linux_kernel:2.6.22.16", "cpe:/o:linux:linux_kernel:2.6.28.9", "cpe:/o:linux:linux_kernel:2.6.16.9", "cpe:/o:linux:linux_kernel:2.6.29.6", "cpe:/o:linux:linux_kernel:2.6.16.10", "cpe:/o:linux:linux_kernel:2.6.11.7", "cpe:/o:linux:linux_kernel:2.6.11.8", "cpe:/o:linux:linux_kernel:2.6.25.3", "cpe:/o:linux:linux_kernel:2.6.12.3", "cpe:/o:linux:linux_kernel:2.6.14.1", "cpe:/o:linux:linux_kernel:2.6.14.7", "cpe:/o:linux:linux_kernel:2.6.16.50", "cpe:/o:linux:linux_kernel:2.6.16.40", "cpe:/o:linux:linux_kernel:2.6.16.22", "cpe:/o:linux:linux_kernel:2.6.16.5", "cpe:/o:linux:linux_kernel:2.6.25.14", "cpe:/o:linux:linux_kernel:2.6.27.6", "cpe:/o:linux:linux_kernel:2.6.24.1", "cpe:/o:linux:linux_kernel:2.6.23.2", "cpe:/o:linux:linux_kernel:2.6.16.55", "cpe:/o:linux:linux_kernel:2.6.24.2", "cpe:/o:linux:linux_kernel:2.6.26.8", "cpe:/o:linux:linux_kernel:2.6.12", "cpe:/o:linux:linux_kernel:2.6.23.11", "cpe:/o:linux:linux_kernel:2.6.8", "cpe:/o:linux:linux_kernel:2.6.21.1", "cpe:/o:linux:linux_kernel:2.6.1", "cpe:/o:linux:linux_kernel:2.6.23.9", "cpe:/o:linux:linux_kernel:2.6.30.9", "cpe:/o:linux:linux_kernel:2.6.16.44", "cpe:/o:linux:linux_kernel:2.6.26.5", "cpe:/o:linux:linux_kernel:2.6.21.7", "cpe:/o:linux:linux_kernel:2.6.27.12", "cpe:/o:linux:linux_kernel:2.6.29.5", "cpe:/o:linux:linux_kernel:2.6.23.14", "cpe:/o:linux:linux_kernel:2.6.24.5", "cpe:/o:linux:linux_kernel:2.6.27.8", "cpe:/o:linux:linux_kernel:2.6.27.5", "cpe:/o:linux:linux_kernel:2.6.16.18", "cpe:/o:linux:linux_kernel:2.6.22.1", "cpe:/o:linux:linux_kernel:2.6.15.7", "cpe:/o:linux:linux_kernel:2.6.17.11", "cpe:/o:linux:linux_kernel:2.6.14", "cpe:/o:linux:linux_kernel:2.6.16.29", "cpe:/o:linux:linux_kernel:2.6.16.27", "cpe:/o:linux:linux_kernel:2.6.27.16", "cpe:/o:linux:linux_kernel:2.6.30.5", "cpe:/o:linux:linux_kernel:2.6.22.11", "cpe:/o:linux:linux_kernel:2.6.11.2", "cpe:/o:linux:linux_kernel:2.6.17.2", "cpe:/o:linux:linux_kernel:2.6.27.7", "cpe:/o:linux:linux_kernel:2.6.27.2", "cpe:/o:linux:linux_kernel:2.6.27.18", "cpe:/o:linux:linux_kernel:2.6.11.11", "cpe:/o:linux:linux_kernel:2.6.27.15", "cpe:/o:linux:linux_kernel:2.6.16.21", "cpe:/o:linux:linux_kernel:2.6.27.11", "cpe:/o:linux:linux_kernel:2.6.28.10", "cpe:/o:linux:linux_kernel:2.6.23", "cpe:/o:linux:linux_kernel:2.6.19", "cpe:/o:linux:linux_kernel:2.6.12.5", "cpe:/o:linux:linux_kernel:2.6.21.6", "cpe:/o:linux:linux_kernel:2.6.19.5", "cpe:/o:linux:linux_kernel:2.6.30.7", "cpe:/o:linux:linux_kernel:2.6.16.51", "cpe:/o:linux:linux_kernel:2.6.17.1", "cpe:/o:linux:linux_kernel:2.6.31.3", "cpe:/o:linux:linux_kernel:2.6.16.30", "cpe:/o:linux:linux_kernel:2.6.20.15", "cpe:/o:linux:linux_kernel:2.6.26.7", "cpe:/o:linux:linux_kernel:2.6.16.53", "cpe:/o:linux:linux_kernel:2.6.19.6", "cpe:/o:linux:linux_kernel:2.6.23.13", "cpe:/o:linux:linux_kernel:2.6.23.10", "cpe:/o:linux:linux_kernel:2.6.16.57", "cpe:/o:linux:linux_kernel:2.6.26.4", "cpe:/o:linux:linux_kernel:2.6.13", "cpe:/o:linux:linux_kernel:2.6.11.9", "cpe:/o:linux:linux_kernel:2.6.14.5", "cpe:/o:linux:linux_kernel:2.6.27.23", "cpe:/o:linux:linux_kernel:2.6.20.11", "cpe:/o:linux:linux_kernel:2.6.27.24", "cpe:/o:linux:linux_kernel:2.6.28.8", "cpe:/o:linux:linux_kernel:2.6.31", "cpe:/o:linux:linux_kernel:2.6.23.6", "cpe:/o:linux:linux_kernel:2.6.15.6", "cpe:/o:linux:linux_kernel:2.6.27.4", "cpe:/o:linux:linux_kernel:2.6.27.29", "cpe:/o:linux:linux_kernel:2.6.19.2", "cpe:/o:linux:linux_kernel:2.6.30.2", "cpe:/o:linux:linux_kernel:2.6.17.10", "cpe:/o:linux:linux_kernel:2.6.16.19", "cpe:/o:linux:linux_kernel:2.6.15.1", "cpe:/o:linux:linux_kernel:2.6.23.7", "cpe:/o:linux:linux_kernel:2.6.20", "cpe:/o:linux:linux_kernel:2.6.16.60", "cpe:/o:linux:linux_kernel:2.6.16.34", "cpe:/o:linux:linux_kernel:2.6.22.7", "cpe:/o:linux:linux_kernel:2.6.25.1", "cpe:/o:linux:linux_kernel:2.6.16.14", "cpe:/o:linux:linux_kernel:2.6.27.26", "cpe:/o:linux:linux_kernel:2.6.25.11", "cpe:/o:linux:linux_kernel:2.6.22.4", "cpe:/o:linux:linux_kernel:2.6.18", "cpe:/o:linux:linux_kernel:2.6.27.3", "cpe:/o:linux:linux_kernel:2.6.23.16", "cpe:/o:linux:linux_kernel:2.6.25.5", "cpe:/o:linux:linux_kernel:2.6.20.8", "cpe:/o:linux:linux_kernel:2.6.16.42", "cpe:/o:linux:linux_kernel:2.6.25.13", "cpe:/o:linux:linux_kernel:2.6.24.7", "cpe:/o:linux:linux_kernel:2.6.26.6", "cpe:/o:linux:linux_kernel:2.6.25.12", "cpe:/o:linux:linux_kernel:2.6.16.56", "cpe:/o:linux:linux_kernel:2.6.3", "cpe:/o:linux:linux_kernel:2.6.14.2", "cpe:/o:linux:linux_kernel:2.6.25.17", "cpe:/o:linux:linux_kernel:2.6.16.48", "cpe:/o:linux:linux_kernel:2.6.11.10", "cpe:/o:linux:linux_kernel:2.6.29.4", "cpe:/o:linux:linux_kernel:2.6.16.12", "cpe:/o:linux:linux_kernel:2.6.28.7", "cpe:/o:linux:linux_kernel:2.6.20.21", "cpe:/o:linux:linux_kernel:2.6.23.5", "cpe:/o:linux:linux_kernel:2.6.20.14", "cpe:/o:linux:linux_kernel:2.6.20.18", "cpe:/o:linux:linux_kernel:2.6.17.13", "cpe:/o:linux:linux_kernel:2.6.26.3", "cpe:/o:linux:linux_kernel:2.6.6", "cpe:/o:linux:linux_kernel:2.6.20.12", "cpe:/o:linux:linux_kernel:2.6.12.1", "cpe:/o:linux:linux_kernel:2.6.16.39", "cpe:/o:linux:linux_kernel:2.6.27.22", "cpe:/o:linux:linux_kernel:2.6.30.1", "cpe:/o:linux:linux_kernel:2.6.20.3", "cpe:/o:linux:linux_kernel:2.6.16.8", "cpe:/o:linux:linux_kernel:2.6.27.1", "cpe:/o:linux:linux_kernel:2.6.16.25", "cpe:/o:linux:linux_kernel:2.6.22.9", "cpe:/o:linux:linux_kernel:2.6.29.1", "cpe:/o:linux:linux_kernel:2.6.18.5", "cpe:/o:linux:linux_kernel:2.6.27.19", "cpe:/o:linux:linux_kernel:2.6.16.17", "cpe:/o:linux:linux_kernel:2.6.26.1", "cpe:/o:linux:linux_kernel:2.6.5", "cpe:/o:linux:linux_kernel:2.6.16.26", "cpe:/o:linux:linux_kernel:2.6.16.32", "cpe:/o:linux:linux_kernel:2.6.27.21", "cpe:/o:linux:linux_kernel:2.6.14.3", "cpe:/o:linux:linux_kernel:2.6.24.6", "cpe:/o:linux:linux_kernel:2.6.16.1", "cpe:/o:linux:linux_kernel:2.6.17.3", "cpe:/o:linux:linux_kernel:2.6.30", "cpe:/o:linux:linux_kernel:2.6.16.33", "cpe:/o:linux:linux_kernel:2.6.22.12", "cpe:/o:linux:linux_kernel:2.6.21.4", "cpe:/o:linux:linux_kernel:2.6.19.3", "cpe:/o:linux:linux_kernel:2.6.18.3", "cpe:/o:linux:linux_kernel:2.6.18.6", "cpe:/o:linux:linux_kernel:2.6.20.16", "cpe:/o:linux:linux_kernel:2.6.0", "cpe:/o:linux:linux_kernel:2.6.27.13", "cpe:/o:linux:linux_kernel:2.6.2", "cpe:/o:linux:linux_kernel:2.6.22", "cpe:/o:linux:linux_kernel:2.6.13.2", "cpe:/o:linux:linux_kernel:2.6.21.5", "cpe:/o:linux:linux_kernel:2.6.22.5", "cpe:/o:linux:linux_kernel:2.6.16.59", "cpe:/o:linux:linux_kernel:2.6.32", "cpe:/o:linux:linux_kernel:2.6.16.36", "cpe:/o:linux:linux_kernel:2.6.16.37", "cpe:/o:linux:linux_kernel:2.6.13.5", "cpe:/o:linux:linux_kernel:2.6.17.9", "cpe:/o:linux:linux_kernel:2.6.28.3", "cpe:/o:linux:linux_kernel:2.6.18.2", "cpe:/o:linux:linux_kernel:2.6.20.6", "cpe:/o:linux:linux_kernel:2.6.9", "cpe:/o:linux:linux_kernel:2.6.19.7", "cpe:/o:linux:linux_kernel:2.6.20.2", "cpe:/o:linux:linux_kernel:2.6.27.27", "cpe:/o:linux:linux_kernel:2.6.10", "cpe:/o:linux:linux_kernel:2.6.17.8", "cpe:/o:linux:linux_kernel:2.6.11.12", "cpe:/o:linux:linux_kernel:2.6.11", "cpe:/o:linux:linux_kernel:2.6.15.5", "cpe:/o:linux:linux_kernel:2.6.15.3", "cpe:/o:linux:linux_kernel:2.6.27.14", "cpe:/o:linux:linux_kernel:2.6.17.14", "cpe:/o:linux:linux_kernel:2.6.16.7", "cpe:/o:linux:linux_kernel:2.6.20.19", "cpe:/o:linux:linux_kernel:2.6.23.4", "cpe:/o:linux:linux_kernel:2.6.18.7", "cpe:/o:linux:linux_kernel:2.6.16.47", "cpe:/o:linux:linux_kernel:2.6.27.25", "cpe:/o:linux:linux_kernel:2.6.15.4", "cpe:/o:linux:linux_kernel:2.6.25.20", "cpe:/o:linux:linux_kernel:2.6.31.4", "cpe:/o:linux:linux_kernel:2.6.27.20", "cpe:/o:linux:linux_kernel:2.6.20.5", "cpe:/o:linux:linux_kernel:2.6.11.6", "cpe:/o:linux:linux_kernel:2.6.22.10", "cpe:/o:linux:linux_kernel:2.6.16.38", "cpe:/o:linux:linux_kernel:2.6.27", "cpe:/o:linux:linux_kernel:2.6.25.18", "cpe:/o:linux:linux_kernel:2.6.17.12", "cpe:/o:linux:linux_kernel:2.6.16.16", "cpe:/o:linux:linux_kernel:2.6.28", "cpe:/o:linux:linux_kernel:2.6.16.2", "cpe:/o:linux:linux_kernel:2.6.25.19", "cpe:/o:linux:linux_kernel:2.6.20.17", "cpe:/o:linux:linux_kernel:2.6.20.7", "cpe:/o:linux:linux_kernel:2.6.28.5", "cpe:/o:linux:linux_kernel:2.6.27.28", "cpe:/o:linux:linux_kernel:2.6.20.20", "cpe:/o:linux:linux_kernel:2.6.17", "cpe:/o:linux:linux_kernel:2.6.16.31", "cpe:/o:linux:linux_kernel:2.6.27.17", "cpe:/o:linux:linux_kernel:2.6.20.4", "cpe:/o:linux:linux_kernel:2.6.25.16", "cpe:/o:linux:linux_kernel:2.6.16.52", "cpe:/o:linux:linux_kernel:2.6.24.3", "cpe:/o:linux:linux_kernel:2.6.16.61", "cpe:/o:linux:linux_kernel:2.6.29", "cpe:/o:linux:linux_kernel:2.6.25.9", "cpe:/o:linux:linux_kernel:2.6.25", "cpe:/o:linux:linux_kernel:2.6.13.4", "cpe:/o:linux:linux_kernel:2.6.23.15", "cpe:/o:linux:linux_kernel:2.6.11.4", "cpe:/o:linux:linux_kernel:2.6.12.4", "cpe:/o:linux:linux_kernel:2.6.7", "cpe:/o:linux:linux_kernel:2.6.16", "cpe:/o:linux:linux_kernel:2.6.22.8", "cpe:/o:linux:linux_kernel:2.6.25.7", "cpe:/o:linux:linux_kernel:2.6.16.46", "cpe:/o:linux:linux_kernel:2.6.16.41", "cpe:/o:linux:linux_kernel:2.6.29.3", "cpe:/o:linux:linux_kernel:2.6.25.4", "cpe:/o:linux:linux_kernel:2.6.24", "cpe:/o:linux:linux_kernel:2.6.27.31", "cpe:/o:linux:linux_kernel:2.6.16.45", "cpe:/o:linux:linux_kernel:2.6.26", "cpe:/o:linux:linux_kernel:2.6.15", "cpe:/o:linux:linux_kernel:2.6.17.7", "cpe:/o:linux:linux_kernel:2.6.11.1", "cpe:/o:linux:linux_kernel:2.6.22.18", "cpe:/o:linux:linux_kernel:2.6.16.28", "cpe:/o:linux:linux_kernel:2.6.18.4", "cpe:/o:linux:linux_kernel:2.6.21.3", "cpe:/o:linux:linux_kernel:2.6.25.6", "cpe:/o:linux:linux_kernel:2.6.8.1", "cpe:/o:linux:linux_kernel:2.6.11.5", "cpe:/o:linux:linux_kernel:2.6.12.6", "cpe:/o:linux:linux_kernel:2.6.31.6", "cpe:/o:linux:linux_kernel:2.6.16.24", "cpe:/o:linux:linux_kernel:2.6.16.58", "cpe:/o:linux:linux_kernel:2.6.19.4", "cpe:/o:linux:linux_kernel:2.6.25.2", "cpe:/o:linux:linux_kernel:2.6.30.3", "cpe:/o:linux:linux_kernel:2.6.28.2", "cpe:/o:linux:linux_kernel:2.6.17.6", "cpe:/o:linux:linux_kernel:2.6.22.14", "cpe:/o:linux:linux_kernel:2.6.22.13", "cpe:/o:linux:linux_kernel:2.6.22.17", "cpe:/o:linux:linux_kernel:2.6.20.1", "cpe:/o:linux:linux_kernel:2.6.16.54", "cpe:/o:linux:linux_kernel:2.6.31.1", "cpe:/o:linux:linux_kernel:2.6.17.4", "cpe:/o:linux:linux_kernel:2.6.13.1", "cpe:/o:linux:linux_kernel:2.6.30.6", "cpe:/o:linux:linux_kernel:2.6.16.6", "cpe:/o:linux:linux_kernel:2.6.24.4", "cpe:/o:linux:linux_kernel:2.6.25.15", "cpe:/o:linux:linux_kernel:2.6.27.9", "cpe:/o:linux:linux_kernel:2.6.28.4", "cpe:/o:linux:linux_kernel:2.6.11.3", "cpe:/o:linux:linux_kernel:2.6.14.6", "cpe:/o:linux:linux_kernel:2.6.18.8", "cpe:/o:linux:linux_kernel:2.6.16.35", "cpe:/o:linux:linux_kernel:2.6.12.2", "cpe:/o:linux:linux_kernel:2.6.20.13", "cpe:/o:linux:linux_kernel:2.6.27.10", "cpe:/o:linux:linux_kernel:2.6.16.11", "cpe:/o:linux:linux_kernel:2.6.28.1", "cpe:/o:linux:linux_kernel:2.6.31.5", "cpe:/o:linux:linux_kernel:2.6.20.10", "cpe:/o:linux:linux_kernel:2.6.17.5", "cpe:/o:linux:linux_kernel:2.6.30.8", "cpe:/o:linux:linux_kernel:2.6.16.23", "cpe:/o:linux:linux_kernel:2.6.23.3", "cpe:/o:linux:linux_kernel:2.6.25.10", "cpe:/o:linux:linux_kernel:2.6.13.3", "cpe:/o:linux:linux_kernel:2.6.22.2", "cpe:/o:linux:linux_kernel:2.6.21.2", "cpe:/o:linux:linux_kernel:2.6.16.13", "cpe:/o:linux:linux_kernel:2.6.25.8", "cpe:/o:linux:linux_kernel:2.6.22.6", "cpe:/o:linux:linux_kernel:2.6.16.43", "cpe:/o:linux:linux_kernel:2.6.16.62"], "id": "CVE-2009-4131", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-4131", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.32:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.30.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.30.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.29:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.29.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.30:rc7-git6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.30.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.29.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31:rc8:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.30.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.30.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.30.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.32:git-6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.31:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.30:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.32:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.28.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.30.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.32:rc8:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.32:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.30.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.32:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.26.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.29.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.26.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.32:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.26.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.30.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.30:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.29.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.32:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.29.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.31:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2017-07-25T10:57:05", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4131"], "description": "The remote host is missing an update to the kernel\nannounced via advisory FEDORA-2009-13039.", "modified": "2017-07-10T00:00:00", "published": "2009-12-14T00:00:00", "id": "OPENVAS:66499", "href": "http://plugins.openvas.org/nasl.php?oid=66499", "type": "openvas", "title": "Fedora Core 12 FEDORA-2009-13039 (kernel)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_13039.nasl 6624 2017-07-10 06:11:55Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-13039 (kernel)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Update Information:\n\nCVE-2009-4131: EXT4 - fix insufficient permission checking which could result\nin arbitrary data corruption by a local unprivileged user.\n\nChangeLog:\n\n* Wed Dec 9 2009 Kyle McMartin 2.6.31.6-166\n- ext4-fix-insufficient-checks-in-EXT4_IOC_MOVE_EXT.patch: CVE-2009-4131\nfix insufficient permission checking which could result in arbitrary\ndata corruption by a local unprivileged user.\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update kernel' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13039\";\ntag_summary = \"The remote host is missing an update to the kernel\nannounced via advisory FEDORA-2009-13039.\";\n\n\n\nif(description)\n{\n script_id(66499);\n script_version(\"$Revision: 6624 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:11:55 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-12-14 23:06:43 +0100 (Mon, 14 Dec 2009)\");\n script_cve_id(\"CVE-2009-4131\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Core 12 FEDORA-2009-13039 (kernel)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=544471\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAEdebug\", rpm:\"kernel-PAEdebug~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAEdebug-devel\", rpm:\"kernel-PAEdebug-devel~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~i686~2.6.31.6\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAE-debuginfo\", rpm:\"kernel-PAE-debuginfo~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAEdebug-debuginfo\", rpm:\"kernel-PAEdebug-debuginfo~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-firmware\", rpm:\"kernel-firmware~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-bootwrapper\", rpm:\"kernel-bootwrapper~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~ppc~2.6.31.6\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp-devel\", rpm:\"kernel-smp-devel~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp-debuginfo\", rpm:\"kernel-smp-debuginfo~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~ppc64~2.6.31.6\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~x86_64~2.6.31.6\", rls:\"FC12\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:40:13", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4131"], "description": "The remote host is missing an update to the kernel\nannounced via advisory FEDORA-2009-13039.", "modified": "2018-04-06T00:00:00", "published": "2009-12-14T00:00:00", "id": "OPENVAS:136141256231066499", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231066499", "type": "openvas", "title": "Fedora Core 12 FEDORA-2009-13039 (kernel)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_13039.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-13039 (kernel)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Update Information:\n\nCVE-2009-4131: EXT4 - fix insufficient permission checking which could result\nin arbitrary data corruption by a local unprivileged user.\n\nChangeLog:\n\n* Wed Dec 9 2009 Kyle McMartin 2.6.31.6-166\n- ext4-fix-insufficient-checks-in-EXT4_IOC_MOVE_EXT.patch: CVE-2009-4131\nfix insufficient permission checking which could result in arbitrary\ndata corruption by a local unprivileged user.\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update kernel' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13039\";\ntag_summary = \"The remote host is missing an update to the kernel\nannounced via advisory FEDORA-2009-13039.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.66499\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-12-14 23:06:43 +0100 (Mon, 14 Dec 2009)\");\n script_cve_id(\"CVE-2009-4131\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Core 12 FEDORA-2009-13039 (kernel)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=544471\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAEdebug\", rpm:\"kernel-PAEdebug~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAEdebug-devel\", rpm:\"kernel-PAEdebug-devel~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~i686~2.6.31.6\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAE-debuginfo\", rpm:\"kernel-PAE-debuginfo~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAEdebug-debuginfo\", rpm:\"kernel-PAEdebug-debuginfo~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-firmware\", rpm:\"kernel-firmware~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-bootwrapper\", rpm:\"kernel-bootwrapper~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~ppc~2.6.31.6\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp-devel\", rpm:\"kernel-smp-devel~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp-debuginfo\", rpm:\"kernel-smp-debuginfo~2.6.31.6~166.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~ppc64~2.6.31.6\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~x86_64~2.6.31.6\", rls:\"FC12\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:37:19", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4131"], "description": "The remote host is missing an update to the linux kernel\nannounced via advisory FEDORA-2009-13700.", "modified": "2018-04-06T00:00:00", "published": "2009-12-30T00:00:00", "id": "OPENVAS:136141256231066582", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231066582", "type": "openvas", "title": "Fedora Core 12 FEDORA-2009-13700 (kernel)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_13700.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-13700 (kernel)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Update Information:\n\nLinux 2.6.31.9 for stable.\n\nChangeLog:\n\n* Mon Dec 21 2009 Dave Airlie 2.6.31.9-174\n- revert rv410 fix broke some things\n* Mon Dec 21 2009 Ben Skeggs 2.6.31.9-173\n- nouveau: fix dim panel issues on certain laptops (rh#547554)\n- nouveau: fix some issues when running without ctxprogs\n- nouveau: fix error handling in init paths\n- nouveau: add vga arbitration hooks\n- nouveau: fix nv04 sw methods\n* Fri Dec 18 2009 Kyle McMartin 2.6.31.9-172\n- stable update 2.6.31.9\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update kernel' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13700\";\ntag_summary = \"The remote host is missing an update to the linux kernel\nannounced via advisory FEDORA-2009-13700.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.66582\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-12-30 21:58:43 +0100 (Wed, 30 Dec 2009)\");\n script_cve_id(\"CVE-2009-4131\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Core 12 FEDORA-2009-13700 (kernel)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAEdebug\", rpm:\"kernel-PAEdebug~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAEdebug-devel\", rpm:\"kernel-PAEdebug-devel~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~i686~2.6.31.9\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAE-debuginfo\", rpm:\"kernel-PAE-debuginfo~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAEdebug-debuginfo\", rpm:\"kernel-PAEdebug-debuginfo~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-firmware\", rpm:\"kernel-firmware~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-bootwrapper\", rpm:\"kernel-bootwrapper~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~ppc~2.6.31.9\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp-devel\", rpm:\"kernel-smp-devel~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp-debuginfo\", rpm:\"kernel-smp-debuginfo~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~ppc64~2.6.31.9\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~x86_64~2.6.31.9\", rls:\"FC12\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:56:03", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4131"], "description": "The remote host is missing an update to the linux kernel\nannounced via advisory FEDORA-2009-13700.", "modified": "2017-07-10T00:00:00", "published": "2009-12-30T00:00:00", "id": "OPENVAS:66582", "href": "http://plugins.openvas.org/nasl.php?oid=66582", "type": "openvas", "title": "Fedora Core 12 FEDORA-2009-13700 (kernel)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_13700.nasl 6624 2017-07-10 06:11:55Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-13700 (kernel)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Update Information:\n\nLinux 2.6.31.9 for stable.\n\nChangeLog:\n\n* Mon Dec 21 2009 Dave Airlie 2.6.31.9-174\n- revert rv410 fix broke some things\n* Mon Dec 21 2009 Ben Skeggs 2.6.31.9-173\n- nouveau: fix dim panel issues on certain laptops (rh#547554)\n- nouveau: fix some issues when running without ctxprogs\n- nouveau: fix error handling in init paths\n- nouveau: add vga arbitration hooks\n- nouveau: fix nv04 sw methods\n* Fri Dec 18 2009 Kyle McMartin 2.6.31.9-172\n- stable update 2.6.31.9\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update kernel' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13700\";\ntag_summary = \"The remote host is missing an update to the linux kernel\nannounced via advisory FEDORA-2009-13700.\";\n\n\n\nif(description)\n{\n script_id(66582);\n script_version(\"$Revision: 6624 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:11:55 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-12-30 21:58:43 +0100 (Wed, 30 Dec 2009)\");\n script_cve_id(\"CVE-2009-4131\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Core 12 FEDORA-2009-13700 (kernel)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAEdebug\", rpm:\"kernel-PAEdebug~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAEdebug-devel\", rpm:\"kernel-PAEdebug-devel~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~i686~2.6.31.9\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAE-debuginfo\", rpm:\"kernel-PAE-debuginfo~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-PAEdebug-debuginfo\", rpm:\"kernel-PAEdebug-debuginfo~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-firmware\", rpm:\"kernel-firmware~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-bootwrapper\", rpm:\"kernel-bootwrapper~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~ppc~2.6.31.9\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp-devel\", rpm:\"kernel-smp-devel~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp-debuginfo\", rpm:\"kernel-smp-debuginfo~2.6.31.9~174.fc12\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~ppc64~2.6.31.9\", rls:\"FC12\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~x86_64~2.6.31.9\", rls:\"FC12\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-12-15T11:58:13", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4131", "CVE-2010-0006"], "description": "Check for the Version of kernel", "modified": "2017-12-15T00:00:00", "published": "2010-03-02T00:00:00", "id": "OPENVAS:861720", "href": "http://plugins.openvas.org/nasl.php?oid=861720", "type": "openvas", "title": "Fedora Update for kernel FEDORA-2010-0823", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kernel FEDORA-2010-0823\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"kernel on Fedora 12\";\ntag_insight = \"The kernel package contains the Linux kernel (vmlinuz), the core of any\n Linux operating system. The kernel handles the basic functions\n of the operating system: memory allocation, process allocation, device\n input and output, etc.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034166.html\");\n script_id(861720);\n script_version(\"$Revision: 8130 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-15 07:31:09 +0100 (Fri, 15 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-03-02 08:38:02 +0100 (Tue, 02 Mar 2010)\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"FEDORA\", value: \"2010-0823\");\n script_cve_id(\"CVE-2010-0006\", \"CVE-2009-4131\");\n script_name(\"Fedora Update for kernel FEDORA-2010-0823\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC12\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.31.12~174.2.3.fc12\", rls:\"FC12\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-01-06T13:05:13", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4131", "CVE-2010-0006"], "description": "Check for the Version of kernel", "modified": "2018-01-04T00:00:00", "published": "2010-03-02T00:00:00", "id": "OPENVAS:1361412562310861720", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310861720", "type": "openvas", "title": "Fedora Update for kernel FEDORA-2010-0823", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kernel FEDORA-2010-0823\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"kernel on Fedora 12\";\ntag_insight = \"The kernel package contains the Linux kernel (vmlinuz), the core of any\n Linux operating system. The kernel handles the basic functions\n of the operating system: memory allocation, process allocation, device\n input and output, etc.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034166.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.861720\");\n script_version(\"$Revision: 8287 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-04 08:28:11 +0100 (Thu, 04 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-03-02 08:38:02 +0100 (Tue, 02 Mar 2010)\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"FEDORA\", value: \"2010-0823\");\n script_cve_id(\"CVE-2010-0006\", \"CVE-2009-4131\");\n script_name(\"Fedora Update for kernel FEDORA-2010-0823\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC12\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.31.12~174.2.3.fc12\", rls:\"FC12\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-12-14T11:48:46", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4537", "CVE-2010-1146", "CVE-2010-0623", "CVE-2009-4131"], "description": "Check for the Version of kernel", "modified": "2017-12-13T00:00:00", "published": "2010-05-28T00:00:00", "id": "OPENVAS:861964", "href": "http://plugins.openvas.org/nasl.php?oid=861964", "type": "openvas", "title": "Fedora Update for kernel FEDORA-2010-7779", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kernel FEDORA-2010-7779\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"kernel on Fedora 12\";\ntag_insight = \"The kernel package contains the Linux kernel (vmlinuz), the core of any\n Linux operating system. The kernel handles the basic functions\n of the operating system: memory allocation, process allocation, device\n input and output, etc.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041594.html\");\n script_id(861964);\n script_version(\"$Revision: 8092 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-13 07:31:16 +0100 (Wed, 13 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-05-28 10:00:59 +0200 (Fri, 28 May 2010)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"FEDORA\", value: \"2010-7779\");\n script_cve_id(\"CVE-2010-1146\", \"CVE-2010-0623\", \"CVE-2009-4537\", \"CVE-2009-4131\");\n script_name(\"Fedora Update for kernel FEDORA-2010-7779\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC12\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.32.12~115.fc12\", rls:\"FC12\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-01-02T10:54:34", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4537", "CVE-2010-1146", "CVE-2010-0623", "CVE-2009-4131"], "description": "Check for the Version of kernel", "modified": "2017-12-26T00:00:00", "published": "2010-05-28T00:00:00", "id": "OPENVAS:1361412562310861964", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310861964", "type": "openvas", "title": "Fedora Update for kernel FEDORA-2010-7779", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kernel FEDORA-2010-7779\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"kernel on Fedora 12\";\ntag_insight = \"The kernel package contains the Linux kernel (vmlinuz), the core of any\n Linux operating system. The kernel handles the basic functions\n of the operating system: memory allocation, process allocation, device\n input and output, etc.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041594.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.861964\");\n script_version(\"$Revision: 8246 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-26 08:29:20 +0100 (Tue, 26 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-05-28 10:00:59 +0200 (Fri, 28 May 2010)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"FEDORA\", value: \"2010-7779\");\n script_cve_id(\"CVE-2010-1146\", \"CVE-2010-0623\", \"CVE-2009-4537\", \"CVE-2009-4131\");\n script_name(\"Fedora Update for kernel FEDORA-2010-7779\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC12\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.32.12~115.fc12\", rls:\"FC12\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-12-15T11:58:05", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4537", "CVE-2010-1437", "CVE-2010-1146", "CVE-2010-0623", "CVE-2010-1636", "CVE-2009-4131"], "description": "Check for the Version of kernel", "modified": "2017-12-15T00:00:00", "published": "2010-06-18T00:00:00", "id": "OPENVAS:862161", "href": "http://plugins.openvas.org/nasl.php?oid=862161", "type": "openvas", "title": "Fedora Update for kernel FEDORA-2010-9209", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kernel FEDORA-2010-9209\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"kernel on Fedora 12\";\ntag_insight = \"The kernel package contains the Linux kernel (vmlinuz), the core of any\n Linux operating system. The kernel handles the basic functions\n of the operating system: memory allocation, process allocation, device\n input and output, etc.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042766.html\");\n script_id(862161);\n script_version(\"$Revision: 8130 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-15 07:31:09 +0100 (Fri, 15 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-06-18 17:26:33 +0200 (Fri, 18 Jun 2010)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"FEDORA\", value: \"2010-9209\");\n script_cve_id(\"CVE-2010-1437\", \"CVE-2010-1146\", \"CVE-2010-0623\", \"CVE-2009-4537\", \"CVE-2009-4131\", \"CVE-2010-1636\");\n script_name(\"Fedora Update for kernel FEDORA-2010-9209\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC12\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.32.14~127.fc12\", rls:\"FC12\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-01-03T10:54:45", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4537", "CVE-2010-1437", "CVE-2010-1146", "CVE-2010-0623", "CVE-2010-1636", "CVE-2009-4131"], "description": "Check for the Version of kernel", "modified": "2018-01-02T00:00:00", "published": "2010-06-18T00:00:00", "id": "OPENVAS:1361412562310862161", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310862161", "type": "openvas", "title": "Fedora Update for kernel FEDORA-2010-9209", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kernel FEDORA-2010-9209\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"kernel on Fedora 12\";\ntag_insight = \"The kernel package contains the Linux kernel (vmlinuz), the core of any\n Linux operating system. The kernel handles the basic functions\n of the operating system: memory allocation, process allocation, device\n input and output, etc.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042766.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.862161\");\n script_version(\"$Revision: 8269 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-02 08:28:22 +0100 (Tue, 02 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-06-18 17:26:33 +0200 (Fri, 18 Jun 2010)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"FEDORA\", value: \"2010-9209\");\n script_cve_id(\"CVE-2010-1437\", \"CVE-2010-1146\", \"CVE-2010-0623\", \"CVE-2009-4537\", \"CVE-2009-4131\", \"CVE-2010-1636\");\n script_name(\"Fedora Update for kernel FEDORA-2010-9209\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC12\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.32.14~127.fc12\", rls:\"FC12\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "seebug": [{"lastseen": "2017-11-19T18:27:43", "description": "Bugraq ID: 37277\r\nCVE ID\uff1aCVE-2009-4131\r\n\r\nLinux\u662f\u4e00\u6b3e\u5f00\u653e\u6e90\u4ee3\u7801\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\u5904\u7406"EXT4_IOC_MOVE_EXT" IOCTL\u65f6\u7f3a\u5c11\u5145\u5206\u7684\u8bbf\u95ee\u68c0\u67e5\uff0c\u672c\u5730\u653b\u51fb\u8005\u53d1\u9001\u7279\u6b8a\u6784\u5efa\u7684IOCTL\u53ef\u4ee5ROOT\u6743\u9650\u8986\u76d6\u7cfb\u7edf\u4efb\u610f\u6587\u4ef6\uff0c\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u6216\u7279\u6743\u63d0\u5347\u3002\n\nLinux kernel 2.6.31 5\r\nLinux kernel 2.6.31 .2\r\nLinux kernel 2.6.31 -rc7\r\nLinux kernel 2.6.31 -rc6\r\nLinux kernel 2.6.31 -rc3\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.31 -rc1\r\nLinux kernel 2.6.31\r\nLinux kernel 2.6.30 rc6\r\nLinux kernel 2.6.30 1\r\nLinux kernel 2.6.30 -rc5\r\nLinux kernel 2.6.30 -rc3\r\nLinux kernel 2.6.30 -rc2\r\nLinux kernel 2.6.30 -rc1\r\nLinux kernel 2.6.30\r\nLinux kernel 2.6.29 4\r\nLinux kernel 2.6.29 1\r\nLinux kernel 2.6.29 -git8\r\nLinux kernel 2.6.29 -git14\r\nLinux kernel 2.6.29 -git1\r\nLinux kernel 2.6.29\r\nLinux kernel 2.6.28 9\r\nLinux kernel 2.6.28 8\r\nLinux kernel 2.6.28 6\r\nLinux kernel 2.6.28 5\r\nLinux kernel 2.6.28 3\r\nLinux kernel 2.6.28 2\r\nLinux kernel 2.6.28 1\r\nLinux kernel 2.6.28 -rc7\r\nLinux kernel 2.6.28 -rc5\r\nLinux kernel 2.6.28 -rc1\r\nLinux kernel 2.6.28 -git7\r\nLinux kernel 2.6.28\r\nLinux kernel 2.6.27 6\r\nLinux kernel 2.6.27 3\r\nLinux kernel 2.6.27 24\r\nLinux kernel 2.6.27 14\r\nLinux kernel 2.6.27 13\r\nLinux kernel 2.6.27 12\r\nLinux kernel 2.6.27 12\r\nLinux kernel 2.6.27 .8\r\nLinux kernel 2.6.27 .5\r\nLinux kernel 2.6.27 .5\r\nLinux kernel 2.6.27 -rc8-git5\r\nLinux kernel 2.6.27 -rc8\r\nLinux kernel 2.6.27 -rc6-git6\r\nLinux kernel 2.6.27 -rc6\r\nLinux kernel 2.6.27 -rc5\r\nLinux kernel 2.6.27 -rc4\r\nLinux kernel 2.6.27 -rc2\r\nLinux kernel 2.6.27 -rc1\r\nLinux kernel 2.6.27\r\nLinux kernel 2.6.26 7\r\nLinux kernel 2.6.26 4\r\nLinux kernel 2.6.26 3\r\nLinux kernel 2.6.26 .6\r\nLinux kernel 2.6.26 -rc6\r\nLinux kernel 2.6.26\r\nLinux kernel 2.6.25 19\r\nLinux kernel 2.6.25 .9\r\nLinux kernel 2.6.25 .8\r\nLinux kernel 2.6.25 .7\r\nLinux kernel 2.6.25 .6\r\nLinux kernel 2.6.25 .5\r\nLinux kernel 2.6.25 .15\r\nLinux kernel 2.6.25 .13\r\nLinux kernel 2.6.25 .12\r\nLinux kernel 2.6.25 .11\r\nLinux kernel 2.6.25 .10\r\nLinux kernel 2.6.25\r\nLinux kernel 2.6.25\r\nLinux kernel 2.6.24 .2\r\nLinux kernel 2.6.24 .1\r\nLinux kernel 2.6.24 -rc5\r\nLinux kernel 2.6.24 -rc4\r\nLinux kernel 2.6.24 -rc3\r\nLinux kernel 2.6.24 -git13\r\nLinux kernel 2.6.24\r\nLinux kernel 2.6.23 .7\r\nLinux kernel 2.6.23 .6\r\nLinux kernel 2.6.23 .5\r\nLinux kernel 2.6.23 .4\r\nLinux kernel 2.6.23 .3\r\nLinux kernel 2.6.23 .2\r\nLinux kernel 2.6.23 -rc2\r\nLinux kernel 2.6.23 -rc1\r\nLinux kernel 2.6.23\r\nLinux kernel 2.6.22 7\r\nLinux kernel 2.6.22 1\r\nLinux kernel 2.6.22 .8\r\nLinux kernel 2.6.22 .6\r\nLinux kernel 2.6.22 .5\r\nLinux kernel 2.6.22 .4\r\nLinux kernel 2.6.22 .3\r\nLinux kernel 2.6.22 .17\r\nLinux kernel 2.6.22 .16\r\nLinux kernel 2.6.22 .15\r\nLinux kernel 2.6.22 .14\r\nLinux kernel 2.6.22 .13\r\nLinux kernel 2.6.22 .12\r\nLinux kernel 2.6.22 .11\r\nLinux kernel 2.6.22\r\nLinux kernel 2.6.22\r\nLinux kernel 2.6.21 4\r\nLinux kernel 2.6.21 .7\r\nLinux kernel 2.6.21 .6\r\nLinux kernel 2.6.21 .2\r\nLinux kernel 2.6.21 .1\r\nLinux kernel 2.6.21\r\nLinux kernel 2.6.21\r\nLinux kernel 2.6.21\r\nLinux kernel 2.6.20 .9\r\nLinux kernel 2.6.20 .8\r\nLinux kernel 2.6.20 .5\r\nLinux kernel 2.6.20 .4\r\nLinux kernel 2.6.20 .15\r\nLinux kernel 2.6.20 -git5\r\nLinux kernel 2.6.20\r\nLinux kernel 2.6.20\r\nLinux kernel 2.6.19 1\r\nLinux kernel 2.6.19 .2\r\nLinux kernel 2.6.19 .1\r\nLinux kernel 2.6.19 -rc4\r\nLinux kernel 2.6.19 -rc3\r\nLinux kernel 2.6.19 -rc2\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.19 -rc1\r\nLinux kernel 2.6.19\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.18 .4\r\nLinux kernel 2.6.18 .3\r\nLinux kernel 2.6.18 .1\r\nLinux kernel 2.6.18\r\nLinux kernel 2.6.17 .8\r\nLinux kernel 2.6.17 .7\r\nLinux kernel 2.6.17 .6\r\nLinux kernel 2.6.17 .5\r\nLinux kernel 2.6.17 .3\r\nLinux kernel 2.6.17 .2\r\nLinux kernel 2.6.17 .14\r\nLinux kernel 2.6.17 .13\r\nLinux kernel 2.6.17 .12\r\nLinux kernel 2.6.17 .11\r\nLinux kernel 2.6.17 .10\r\nLinux kernel 2.6.17 .1\r\nLinux kernel 2.6.17 -rc5\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.16 27\r\nLinux kernel 2.6.16 13\r\nLinux kernel 2.6.16 .9\r\nLinux kernel 2.6.16 .7\r\nLinux kernel 2.6.16 .23\r\nLinux kernel 2.6.16 .19\r\nLinux kernel 2.6.16 .12\r\nLinux kernel 2.6.16 .11\r\nLinux kernel 2.6.16 .1\r\nLinux kernel 2.6.16 -rc1\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.15 .4\r\nLinux kernel 2.6.15 .3\r\nLinux kernel 2.6.15 .2\r\nLinux kernel 2.6.15 .1\r\nLinux kernel 2.6.15 -rc3\r\nLinux kernel 2.6.15 -rc2\r\nLinux kernel 2.6.15 -rc1\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.15\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.14 .5\r\nLinux kernel 2.6.14 .4\r\nLinux kernel 2.6.14 .3\r\nLinux kernel 2.6.14 .2\r\nLinux kernel 2.6.14 .1\r\nLinux kernel 2.6.14 -rc4\r\nLinux kernel 2.6.14 -rc3\r\nLinux kernel 2.6.14 -rc2\r\nLinux kernel 2.6.14 -rc1\r\nLinux kernel 2.6.14\r\nLinux kernel 2.6.14\r\nLinux kernel 2.6.13 .4\r\nLinux kernel 2.6.13 .3\r\nLinux kernel 2.6.13 .2\r\nLinux kernel 2.6.13 .1\r\nLinux kernel 2.6.13 -rc7\r\nLinux kernel 2.6.13 -rc6\r\nLinux kernel 2.6.13 -rc4\r\nLinux kernel 2.6.13 -rc1\r\nLinux kernel 2.6.13\r\nLinux kernel 2.6.13\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.12 .6\r\nLinux kernel 2.6.12 .5\r\nLinux kernel 2.6.12 .4\r\nLinux kernel 2.6.12 .3\r\nLinux kernel 2.6.12 .22\r\nLinux kernel 2.6.12 .2\r\nLinux kernel 2.6.12 .12\r\nLinux kernel 2.6.12 .1\r\nLinux kernel 2.6.12 -rc5\r\nLinux kernel 2.6.12 -rc4\r\nLinux kernel 2.6.12 -rc1\r\nLinux kernel 2.6.12\r\nLinux kernel 2.6.12\r\nLinux kernel 2.6.11 .8\r\nLinux kernel 2.6.11 .7\r\nLinux kernel 2.6.11 .6\r\nLinux kernel 2.6.11 .5\r\nLinux kernel 2.6.11 .4\r\nLinux kernel 2.6.11 .12\r\nLinux kernel 2.6.11 .11\r\nLinux kernel 2.6.11 -rc4\r\nLinux kernel 2.6.11 -rc3\r\nLinux kernel 2.6.11 -rc2\r\nLinux kernel 2.6.11\r\nLinux kernel 2.6.11\r\nLinux kernel 2.6.10 rc2\r\nLinux kernel 2.6.10\r\nLinux kernel 2.6.10\r\nLinux kernel 2.6.9\r\nLinux kernel 2.6.8 rc3\r\nLinux kernel 2.6.8 rc2\r\nLinux kernel 2.6.8 rc1\r\n+ Ubuntu Ubuntu Linux 4.1 ppc\r\n+ Ubuntu Ubuntu Linux 4.1 ia64\r\n+ Ubuntu Ubuntu Linux 4.1 ia32\r\nLinux kernel 2.6.8\r\nLinux kernel 2.6.7 rc1\r\nLinux kernel 2.6.7\r\nLinux kernel 2.6.6 rc1\r\nLinux kernel 2.6.6\r\nLinux kernel 2.6.5\r\nLinux kernel 2.6.4\r\nLinux kernel 2.6.3\r\nLinux kernel 2.6.2\r\nLinux kernel 2.6.1 -rc2\r\nLinux kernel 2.6.1 -rc1\r\nLinux kernel 2.6.1\r\nLinux kernel 2.6 .10\r\nLinux kernel 2.6 -test9-CVS\r\nLinux kernel 2.6 -test9\r\nLinux kernel 2.6 -test8\r\nLinux kernel 2.6 -test7\r\nLinux kernel 2.6 -test6\r\nLinux kernel 2.6 -test5\r\nLinux kernel 2.6 -test4\r\nLinux kernel 2.6 -test3\r\nLinux kernel 2.6 -test2\r\nLinux kernel 2.6 -test11\r\nLinux kernel 2.6 -test10\r\nLinux kernel 2.6 -test1\r\nLinux kernel 2.6\r\nLinux kernel 2.6.8.1\r\n+ S.u.S.E. Linux Personal 9.2 x86_64\r\n+ S.u.S.E. Linux Personal 9.2\r\n+ Ubuntu Ubuntu Linux 4.1 ppc\r\n+ Ubuntu Ubuntu Linux 4.1 ia64\r\n+ Ubuntu Ubuntu Linux 4.1 ia32\r\nLinux kernel 2.6.31.6\r\nLinux kernel 2.6.31.4\r\nLinux kernel 2.6.31.2\r\nLinux kernel 2.6.31.1\r\nLinux kernel 2.6.31-rc9\r\nLinux kernel 2.6.31-rc8\r\nLinux kernel 2.6.31-rc7\r\nLinux kernel 2.6.31-rc5-git3\r\nLinux kernel 2.6.31-rc4\r\nLinux kernel 2.6.31-rc2\r\nLinux kernel 2.6.31-git11\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.30.5\r\nLinux kernel 2.6.30.4\r\nLinux kernel 2.6.30.3\r\nLinux kernel 2.6.29-rc2-git1\r\nLinux kernel 2.6.29-rc2\r\nLinux kernel 2.6.29-rc1\r\nLinux kernel 2.6.28.4\r\nLinux kernel 2.6.28.10\r\nLinux kernel 2.6.26.1\r\nLinux kernel 2.6.26-rc5-git1\r\nLinux kernel 2.6.25.4\r\nLinux kernel 2.6.25.3\r\nLinux kernel 2.6.25.2\r\nLinux kernel 2.6.25.1\r\nLinux kernel 2.6.25-rc1\r\nLinux kernel 2.6.24.6\r\nLinux kernel 2.6.24-rc2\r\nLinux kernel 2.6.24-rc1\r\nLinux kernel 2.6.23.14\r\nLinux kernel 2.6.23.10\r\nLinux kernel 2.6.23.1\r\nLinux kernel 2.6.23.09\r\nLinux kernel 2.6.22-rc7\r\nLinux kernel 2.6.22-rc1\r\nLinux kernel 2.6.21-RC6\r\nLinux kernel 2.6.21-RC5\r\nLinux kernel 2.6.21-RC4\r\nLinux kernel 2.6.21-RC3\r\nLinux kernel 2.6.21-RC3\r\nLinux kernel 2.6.20.3\r\nLinux kernel 2.6.20.2\r\nLinux kernel 2.6.20.13\r\nLinux kernel 2.6.20.11\r\nLinux kernel 2.6.20.1\r\nLinux kernel 2.6.20-rc2\r\nLinux kernel 2.6.20-2\r\nLinux kernel 2.6.19 -rc6\r\nLinux kernel 2.6.18-8.1.8.el5\r\nLinux kernel 2.6.18-53\r\nLinux kernel 2.6.18\r\nLinux kernel 2.6.15.5\r\nLinux kernel 2.6.15.11\r\nLinux kernel 2.6.15-27.48\r\nLinux kernel 2.6.11.4\nExt4 GIT\u5df2\u7ecf\u4fee\u590d\u6b64\u6f0f\u6d1e\uff0c\u5efa\u8bae\u7528\u6237\u4e0b\u8f7d\u4f7f\u7528\uff1a\r\nhttp://git.kernel.org/?p=linux/kernel/git/tytso/ext4.git;a=commit;h=4a58579b9e4e2a35d57e6c9c8483e52f6f1b7fd6", "published": "2009-12-15T00:00:00", "type": "seebug", "title": "Linux Kernel Ext4 'move extents' ioctl\u672c\u5730\u7279\u6743\u63d0\u5347\u6f0f\u6d1e", "bulletinFamily": "exploit", "cvelist": ["CVE-2009-4131"], "modified": "2009-12-15T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-15068", "id": "SSV:15068", "sourceData": "", "sourceHref": "", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2021-01-12T10:07:02", "description": "CVE-2009-4131: EXT4 - fix insufficient permission checking which could\nresult in arbitrary data corruption by a local unprivileged user.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 23, "published": "2009-12-11T00:00:00", "title": "Fedora 12 : kernel-2.6.31.6-166.fc12 (2009-13039)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4131"], "modified": "2009-12-11T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:kernel", "cpe:/o:fedoraproject:fedora:12"], "id": "FEDORA_2009-13039.NASL", "href": "https://www.tenable.com/plugins/nessus/43103", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2009-13039.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(43103);\n script_version(\"1.27\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2009-4131\");\n script_bugtraq_id(37277);\n script_xref(name:\"FEDORA\", value:\"2009-13039\");\n\n script_name(english:\"Fedora 12 : kernel-2.6.31.6-166.fc12 (2009-13039)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"CVE-2009-4131: EXT4 - fix insufficient permission checking which could\nresult in arbitrary data corruption by a local unprivileged user.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=544471\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-December/032511.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?bb6d4edf\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:12\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/12/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/12/11\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^12([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 12.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC12\", reference:\"kernel-2.6.31.6-166.fc12\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-20T15:44:50", "description": "David Ford discovered that the IPv4 defragmentation routine did not\ncorrectly handle oversized packets. A remote attacker could send\nspecially crafted traffic that would cause a system to crash, leading\nto a denial of service. (The fix was included in the earlier kernels\nfrom USN-864-1.) (CVE-2009-1298)\n\nAkira Fujita discovered that the Ext4 'move extents' ioctl did not\ncorrectly check permissions. A local attacker could exploit this to\noverwrite arbitrary files on the system, leading to root privilege\nescalation. (CVE-2009-4131).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 28, "published": "2009-12-10T00:00:00", "title": "Ubuntu 9.10 : linux vulnerability (USN-869-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-1298", "CVE-2009-4131"], "modified": "2009-12-10T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-libc-dev", "p-cpe:/a:canonical:ubuntu_linux:linux-doc", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-server", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-generic-pae", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-generic", "cpe:/o:canonical:ubuntu_linux:9.10", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-generic-pae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-386", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-virtual", "p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.31", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-server", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-lpia", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-386"], "id": "UBUNTU_USN-869-1.NASL", "href": "https://www.tenable.com/plugins/nessus/43097", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-869-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(43097);\n script_version(\"1.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2009-1298\", \"CVE-2009-4131\");\n script_xref(name:\"USN\", value:\"869-1\");\n\n script_name(english:\"Ubuntu 9.10 : linux vulnerability (USN-869-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"David Ford discovered that the IPv4 defragmentation routine did not\ncorrectly handle oversized packets. A remote attacker could send\nspecially crafted traffic that would cause a system to crash, leading\nto a denial of service. (The fix was included in the earlier kernels\nfrom USN-864-1.) (CVE-2009-1298)\n\nAkira Fujita discovered that the Ext4 'move extents' ioctl did not\ncorrectly check permissions. A local attacker could exploit this to\noverwrite arbitrary files on the system, leading to root privilege\nescalation. (CVE-2009-4131).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/869-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(119, 264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-generic-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-generic-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-lpia\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-libc-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.31\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:9.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2009/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/12/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/12/10\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2009-2021 Canonical, Inc. / NASL script (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(9\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 9.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2009-1298\", \"CVE-2009-4131\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-869-1\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-doc\", pkgver:\"2.6.31-16.53\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-headers-2.6.31-16\", pkgver:\"2.6.31-16.53\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-headers-2.6.31-16-386\", pkgver:\"2.6.31-16.53\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-headers-2.6.31-16-generic\", pkgver:\"2.6.31-16.53\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-headers-2.6.31-16-generic-pae\", pkgver:\"2.6.31-16.53\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-headers-2.6.31-16-server\", pkgver:\"2.6.31-16.53\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-image-2.6.31-16-386\", pkgver:\"2.6.31-16.53\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-image-2.6.31-16-generic\", pkgver:\"2.6.31-16.53\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-image-2.6.31-16-generic-pae\", pkgver:\"2.6.31-16.53\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-image-2.6.31-16-lpia\", pkgver:\"2.6.31-16.53\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-image-2.6.31-16-server\", pkgver:\"2.6.31-16.53\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-image-2.6.31-16-virtual\", pkgver:\"2.6.31-16.53\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-libc-dev\", pkgver:\"2.6.31-16.53\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-source-2.6.31\", pkgver:\"2.6.31-16.53\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-doc / linux-headers-2.6 / linux-headers-2.6-386 / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-07T11:52:28", "description": "Some vulnerabilities were discovered and corrected in the Linux 2.6\nkernel :\n\nMemory leak in the appletalk subsystem in the Linux kernel 2.4.x\nthrough 2.4.37.6 and 2.6.x through 2.6.31, when the appletalk and\nipddp modules are loaded but the ipddpN device is not found, allows\nremote attackers to cause a denial of service (memory consumption) via\nIP-DDP datagrams. (CVE-2009-2903)\n\nMultiple race conditions in fs/pipe.c in the Linux kernel before\n2.6.32-rc6 allow local users to cause a denial of service (NULL\npointer dereference and system crash) or gain privileges by attempting\nto open an anonymous pipe via a /proc/*/fd/ pathname. (CVE-2009-3547)\n\nThe tcf_fill_node function in net/sched/cls_api.c in the netlink\nsubsystem in the Linux kernel 2.6.x before 2.6.32-rc5, and 2.4.37.6\nand earlier, does not initialize a certain tcm__pad2 structure member,\nwhich might allow local users to obtain sensitive information from\nkernel memory via unspecified vectors. NOTE: this issue exists because\nof an incomplete fix for CVE-2005-4881. (CVE-2009-3612)\n\nnet/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows\nlocal users to cause a denial of service (system hang) by creating an\nabstract-namespace AF_UNIX listening socket, performing a shutdown\noperation on this socket, and then performing a series of connect\noperations to this socket. (CVE-2009-3621)\n\nInteger overflow in the kvm_dev_ioctl_get_supported_cpuid function in\narch/x86/kvm/x86.c in the KVM subsystem in the Linux kernel before\n2.6.31.4 allows local users to have an unspecified impact via a\nKVM_GET_SUPPORTED_CPUID request to the kvm_arch_dev_ioctl function.\n(CVE-2009-3638)\n\nThe nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client\nin the Linux kernel before 2.6.31-rc4 allows remote NFS servers to\ncause a denial of service (NULL pointer dereference and panic) by\nsending a certain response containing incorrect file attributes, which\ntrigger attempted use of an open file that lacks NFSv4 state.\n(CVE-2009-3726)\n\nThe ip_frag_reasm function in ipv4/ip_fragment.c in Linux kernel\n2.6.32-rc8, and possibly earlier versions, calls IP_INC_STATS_BH with\nan incorrect argument, which allows remote attackers to cause a denial\nof service (NULL pointer dereference and hang) via long IP packets,\npossibly related to the ip_defrag function. (CVE-2009-1298)\n\nTo update your kernel, please follow the directions located at :\n\nhttp://www.mandriva.com/en/security/kernelupdate", "edition": 25, "published": "2010-07-30T00:00:00", "title": "Mandriva Linux Security Advisory : kernel (MDVSA-2009:329)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-3621", "CVE-2009-3726", "CVE-2009-3638", "CVE-2009-1298", "CVE-2009-3547", "CVE-2009-4131", "CVE-2009-2903", "CVE-2005-4881", "CVE-2009-3612"], "modified": "2010-07-30T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:slmodem-kernel-2.6.31.6-server-1mnb", "p-cpe:/a:mandriva:linux:nvidia173-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:kernel-server-latest", "p-cpe:/a:mandriva:linux:kernel-desktop586-2.6.29.6-3mnb", "p-cpe:/a:mandriva:linux:lirc-kernel-2.6.31.6-server-1mnb", "p-cpe:/a:mandriva:linux:vpnclient-kernel-2.6.29.6-desktop586-3mnb", "p-cpe:/a:mandriva:linux:lzma-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:hsfmodem-kernel-server-latest", "p-cpe:/a:mandriva:linux:fglrx-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:broadcom-wl-kernel-2.6.29.6-desktop-3mnb", "p-cpe:/a:mandriva:linux:lirc-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:madwifi-kernel-2.6.31.6-desktop-1mnb", "p-cpe:/a:mandriva:linux:em8300-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:virtualbox-kernel-server-latest", "p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-2.6.31.6-server-1mnb", "p-cpe:/a:mandriva:linux:madwifi-kernel-server-latest", "p-cpe:/a:mandriva:linux:nvidia173-kernel-server-latest", "p-cpe:/a:mandriva:linux:slmodem-kernel-2.6.31.6-desktop586-1mnb", "p-cpe:/a:mandriva:linux:squashfs-lzma-kernel-2.6.31.6-server-1mnb", "p-cpe:/a:mandriva:linux:nvidia96xx-kernel-2.6.29.6-desktop-3mnb", "p-cpe:/a:mandriva:linux:kernel-source-2.6.29.6-3mnb", "p-cpe:/a:mandriva:linux:hsfmodem-kernel-2.6.31.6-server-1mnb", "p-cpe:/a:mandriva:linux:lzma-kernel-2.6.29.6-desktop586-3mnb", "p-cpe:/a:mandriva:linux:kernel-source-2.6.31.6-1mnb", "p-cpe:/a:mandriva:linux:hsfmodem-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:vpnclient-kernel-2.6.31.6-server-1mnb", "p-cpe:/a:mandriva:linux:em8300-kernel-2.6.29.6-desktop586-3mnb", "p-cpe:/a:mandriva:linux:lzma-kernel-2.6.31.6-desktop-1mnb", "p-cpe:/a:mandriva:linux:madwifi-kernel-2.6.29.6-desktop586-3mnb", "p-cpe:/a:mandriva:linux:virtualbox-kernel-2.6.31.6-desktop-1mnb", "p-cpe:/a:mandriva:linux:nvidia96xx-kernel-2.6.31.6-desktop586-1mnb", "p-cpe:/a:mandriva:linux:slmodem-kernel-2.6.29.6-desktop586-3mnb", "p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-2.6.29.6-server-3mnb", "p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:vpnclient-kernel-2.6.29.6-server-3mnb", "p-cpe:/a:mandriva:linux:broadcom-wl-kernel-2.6.29.6-server-3mnb", "p-cpe:/a:mandriva:linux:em8300-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:slmodem-kernel-2.6.29.6-server-3mnb", "p-cpe:/a:mandriva:linux:nvidia96xx-kernel-server-latest", "p-cpe:/a:mandriva:linux:libafs-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:nvidia-current-kernel-2.6.31.6-desktop586-1mnb", "p-cpe:/a:mandriva:linux:nvidia173-kernel-2.6.29.6-desktop-3mnb", "p-cpe:/a:mandriva:linux:fcpci-kernel-2.6.29.6-desktop-3mnb", "p-cpe:/a:mandriva:linux:nvidia96xx-kernel-2.6.29.6-server-3mnb", "p-cpe:/a:mandriva:linux:lirc-kernel-2.6.29.6-server-3mnb", "p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:slmodem-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:lzma-kernel-2.6.29.6-desktop-3mnb", "p-cpe:/a:mandriva:linux:nvidia96xx-kernel-2.6.29.6-desktop586-3mnb", "p-cpe:/a:mandriva:linux:kernel-desktop-2.6.31.6-1mnb", "p-cpe:/a:mandriva:linux:hsfmodem-kernel-2.6.31.6-desktop586-1mnb", "p-cpe:/a:mandriva:linux:hsfmodem-kernel-2.6.29.6-desktop-3mnb", "p-cpe:/a:mandriva:linux:lirc-kernel-2.6.29.6-desktop586-3mnb", "p-cpe:/a:mandriva:linux:squashfs-lzma-kernel-2.6.31.6-desktop586-1mnb", "p-cpe:/a:mandriva:linux:libafs-kernel-2.6.29.6-server-3mnb", "p-cpe:/a:mandriva:linux:em8300-kernel-2.6.31.6-desktop-1mnb", "p-cpe:/a:mandriva:linux:vpnclient-kernel-2.6.31.6-desktop-1mnb", "p-cpe:/a:mandriva:linux:kernel-desktop-devel-latest", "p-cpe:/a:mandriva:linux:nvidia96xx-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:em8300-kernel-2.6.31.6-desktop586-1mnb", "p-cpe:/a:mandriva:linux:nvidia-current-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:nvidia173-kernel-2.6.29.6-desktop586-3mnb", "p-cpe:/a:mandriva:linux:broadcom-wl-kernel-server-latest", "p-cpe:/a:mandriva:linux:fcpci-kernel-2.6.29.6-desktop586-3mnb", "p-cpe:/a:mandriva:linux:vpnclient-kernel-2.6.31.6-desktop586-1mnb", "p-cpe:/a:mandriva:linux:broadcom-wl-kernel-2.6.31.6-desktop586-1mnb", "p-cpe:/a:mandriva:linux:broadcom-wl-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:virtualbox-kernel-2.6.29.6-desktop-3mnb", "p-cpe:/a:mandriva:linux:slmodem-kernel-2.6.29.6-desktop-3mnb", "p-cpe:/a:mandriva:linux:libafs-kernel-server-latest", "p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-2.6.31.6-desktop-1mnb", "p-cpe:/a:mandriva:linux:nvidia96xx-kernel-2.6.31.6-server-1mnb", "p-cpe:/a:mandriva:linux:nvidia173-kernel-2.6.31.6-server-1mnb", "p-cpe:/a:mandriva:linux:virtualbox-kernel-2.6.29.6-server-3mnb", "p-cpe:/a:mandriva:linux:madwifi-kernel-2.6.31.6-desktop586-1mnb", "p-cpe:/a:mandriva:linux:kernel-server-devel-2.6.29.6-3mnb", "p-cpe:/a:mandriva:linux:lzma-kernel-2.6.31.6-server-1mnb", "p-cpe:/a:mandriva:linux:squashfs-lzma-kernel-2.6.31.6-desktop-1mnb", "p-cpe:/a:mandriva:linux:fglrx-kernel-server-latest", "p-cpe:/a:mandriva:linux:vpnclient-kernel-server-latest", "p-cpe:/a:mandriva:linux:nvidia-current-kernel-2.6.29.6-server-3mnb", "p-cpe:/a:mandriva:linux:kernel-desktop-devel-2.6.31.6-1mnb", "p-cpe:/a:mandriva:linux:kernel-desktop-devel-2.6.29.6-3mnb", "p-cpe:/a:mandriva:linux:lirc-kernel-2.6.31.6-desktop-1mnb", "p-cpe:/a:mandriva:linux:lirc-kernel-2.6.31.6-desktop586-1mnb", "p-cpe:/a:mandriva:linux:virtualbox-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:fglrx-kernel-2.6.31.6-desktop586-1mnb", "p-cpe:/a:mandriva:linux:vboxadditions-kernel-2.6.29.6-desktop-3mnb", "p-cpe:/a:mandriva:linux:kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:nvidia-current-kernel-2.6.29.6-desktop-3mnb", "p-cpe:/a:mandriva:linux:kernel-desktop-2.6.29.6-3mnb", "p-cpe:/a:mandriva:linux:nvidia-current-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:kernel-2.6.31.6-1mnb", "p-cpe:/a:mandriva:linux:libafs-kernel-2.6.31.6-desktop-1mnb", "p-cpe:/a:mandriva:linux:lirc-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:hsfmodem-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:lzma-kernel-server-latest", "cpe:/o:mandriva:linux:2009.1", "p-cpe:/a:mandriva:linux:nvidia-current-kernel-2.6.31.6-desktop-1mnb", "p-cpe:/a:mandriva:linux:nvidia96xx-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:vboxadditions-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:lzma-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:libafs-kernel-2.6.29.6-desktop586-3mnb", "p-cpe:/a:mandriva:linux:vboxadditions-kernel-server-latest", "p-cpe:/a:mandriva:linux:vboxadditions-kernel-2.6.31.6-desktop-1mnb", "cpe:/o:mandriva:linux:2010.0", "p-cpe:/a:mandriva:linux:fcpci-kernel-2.6.29.6-server-3mnb", "p-cpe:/a:mandriva:linux:slmodem-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:hsfmodem-kernel-2.6.29.6-server-3mnb", "p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-server-latest", "p-cpe:/a:mandriva:linux:kernel-desktop586-2.6.31.6-1mnb", "p-cpe:/a:mandriva:linux:lirc-kernel-server-latest", "p-cpe:/a:mandriva:linux:vboxadditions-kernel-2.6.31.6-desktop586-1mnb", "p-cpe:/a:mandriva:linux:kernel-server-devel-latest", "p-cpe:/a:mandriva:linux:broadcom-wl-kernel-2.6.29.6-desktop586-3mnb", "p-cpe:/a:mandriva:linux:fglrx-kernel-2.6.31.6-desktop-1mnb", "p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-2.6.29.6-desktop586-3mnb", "p-cpe:/a:mandriva:linux:madwifi-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:slmodem-kernel-server-latest", "p-cpe:/a:mandriva:linux:fglrx-kernel-2.6.31.6-server-1mnb", "p-cpe:/a:mandriva:linux:broadcom-wl-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:kernel-server-devel-2.6.31.6-1mnb", "p-cpe:/a:mandriva:linux:hsfmodem-kernel-2.6.29.6-desktop586-3mnb", "p-cpe:/a:mandriva:linux:kernel-server-2.6.31.6-1mnb", "p-cpe:/a:mandriva:linux:kernel-desktop586-devel-2.6.29.6-3mnb", "p-cpe:/a:mandriva:linux:virtualbox-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:nvidia-current-kernel-2.6.31.6-server-1mnb", "p-cpe:/a:mandriva:linux:em8300-kernel-2.6.29.6-server-3mnb", "p-cpe:/a:mandriva:linux:vboxadditions-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:kernel-server-2.6.29.6-3mnb", "p-cpe:/a:mandriva:linux:kernel-desktop586-devel-latest", "p-cpe:/a:mandriva:linux:madwifi-kernel-2.6.31.6-server-1mnb", "p-cpe:/a:mandriva:linux:kernel-source-latest", "p-cpe:/a:mandriva:linux:nvidia173-kernel-2.6.31.6-desktop-1mnb", "p-cpe:/a:mandriva:linux:squashfs-lzma-kernel-server-latest", "p-cpe:/a:mandriva:linux:broadcom-wl-kernel-2.6.31.6-server-1mnb", "p-cpe:/a:mandriva:linux:libafs-kernel-2.6.31.6-server-1mnb", "p-cpe:/a:mandriva:linux:fcpci-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:fcpci-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:nvidia-current-kernel-server-latest", "p-cpe:/a:mandriva:linux:lzma-kernel-2.6.29.6-server-3mnb", "p-cpe:/a:mandriva:linux:kernel-desktop586-devel-2.6.31.6-1mnb", "p-cpe:/a:mandriva:linux:lzma-kernel-2.6.31.6-desktop586-1mnb", "p-cpe:/a:mandriva:linux:virtualbox-kernel-2.6.31.6-server-1mnb", "p-cpe:/a:mandriva:linux:vpnclient-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:fglrx-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:libafs-kernel-2.6.29.6-desktop-3mnb", "p-cpe:/a:mandriva:linux:nvidia96xx-kernel-2.6.31.6-desktop-1mnb", "p-cpe:/a:mandriva:linux:vboxadditions-kernel-2.6.31.6-server-1mnb", "p-cpe:/a:mandriva:linux:vboxadditions-kernel-2.6.29.6-server-3mnb", "p-cpe:/a:mandriva:linux:libafs-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:madwifi-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:lirc-kernel-2.6.29.6-desktop-3mnb", "p-cpe:/a:mandriva:linux:em8300-kernel-2.6.31.6-server-1mnb", "p-cpe:/a:mandriva:linux:broadcom-wl-kernel-2.6.31.6-desktop-1mnb", "p-cpe:/a:mandriva:linux:fcpci-kernel-server-latest", "p-cpe:/a:mandriva:linux:virtualbox-kernel-2.6.29.6-desktop586-3mnb", "p-cpe:/a:mandriva:linux:madwifi-kernel-2.6.29.6-server-3mnb", "p-cpe:/a:mandriva:linux:squashfs-lzma-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:nvidia-current-kernel-2.6.29.6-desktop586-3mnb", "p-cpe:/a:mandriva:linux:nvidia173-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:madwifi-kernel-2.6.29.6-desktop-3mnb", "p-cpe:/a:mandriva:linux:slmodem-kernel-2.6.31.6-desktop-1mnb", "p-cpe:/a:mandriva:linux:em8300-kernel-2.6.29.6-desktop-3mnb", "p-cpe:/a:mandriva:linux:virtualbox-kernel-2.6.31.6-desktop586-1mnb", "p-cpe:/a:mandriva:linux:kernel-2.6.29.6-3mnb", "p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-2.6.29.6-desktop-3mnb", "p-cpe:/a:mandriva:linux:kernel-doc", "p-cpe:/a:mandriva:linux:vpnclient-kernel-2.6.29.6-desktop-3mnb", "p-cpe:/a:mandriva:linux:em8300-kernel-server-latest", "p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-2.6.31.6-desktop586-1mnb", "p-cpe:/a:mandriva:linux:nvidia173-kernel-2.6.31.6-desktop586-1mnb", "p-cpe:/a:mandriva:linux:squashfs-lzma-kernel-desktop586-latest", "p-cpe:/a:mandriva:linux:nvidia173-kernel-2.6.29.6-server-3mnb", "p-cpe:/a:mandriva:linux:vpnclient-kernel-desktop-latest", "p-cpe:/a:mandriva:linux:vboxadditions-kernel-2.6.29.6-desktop586-3mnb", "p-cpe:/a:mandriva:linux:libafs-kernel-2.6.31.6-desktop586-1mnb", "p-cpe:/a:mandriva:linux:kernel-desktop-latest", "p-cpe:/a:mandriva:linux:hsfmodem-kernel-2.6.31.6-desktop-1mnb"], "id": "MANDRIVA_MDVSA-2009-329.NASL", "href": "https://www.tenable.com/plugins/nessus/48161", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2009:329. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(48161);\n script_version(\"1.31\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2009-1298\", \"CVE-2009-2903\", \"CVE-2009-3547\", \"CVE-2009-3612\", \"CVE-2009-3621\", \"CVE-2009-3638\", \"CVE-2009-3726\", \"CVE-2009-4131\");\n script_bugtraq_id(36379, 36723, 36803, 36827, 36901, 36936);\n script_xref(name:\"MDVSA\", value:\"2009:329\");\n\n script_name(english:\"Mandriva Linux Security Advisory : kernel (MDVSA-2009:329)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Some vulnerabilities were discovered and corrected in the Linux 2.6\nkernel :\n\nMemory leak in the appletalk subsystem in the Linux kernel 2.4.x\nthrough 2.4.37.6 and 2.6.x through 2.6.31, when the appletalk and\nipddp modules are loaded but the ipddpN device is not found, allows\nremote attackers to cause a denial of service (memory consumption) via\nIP-DDP datagrams. (CVE-2009-2903)\n\nMultiple race conditions in fs/pipe.c in the Linux kernel before\n2.6.32-rc6 allow local users to cause a denial of service (NULL\npointer dereference and system crash) or gain privileges by attempting\nto open an anonymous pipe via a /proc/*/fd/ pathname. (CVE-2009-3547)\n\nThe tcf_fill_node function in net/sched/cls_api.c in the netlink\nsubsystem in the Linux kernel 2.6.x before 2.6.32-rc5, and 2.4.37.6\nand earlier, does not initialize a certain tcm__pad2 structure member,\nwhich might allow local users to obtain sensitive information from\nkernel memory via unspecified vectors. NOTE: this issue exists because\nof an incomplete fix for CVE-2005-4881. (CVE-2009-3612)\n\nnet/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows\nlocal users to cause a denial of service (system hang) by creating an\nabstract-namespace AF_UNIX listening socket, performing a shutdown\noperation on this socket, and then performing a series of connect\noperations to this socket. (CVE-2009-3621)\n\nInteger overflow in the kvm_dev_ioctl_get_supported_cpuid function in\narch/x86/kvm/x86.c in the KVM subsystem in the Linux kernel before\n2.6.31.4 allows local users to have an unspecified impact via a\nKVM_GET_SUPPORTED_CPUID request to the kvm_arch_dev_ioctl function.\n(CVE-2009-3638)\n\nThe nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client\nin the Linux kernel before 2.6.31-rc4 allows remote NFS servers to\ncause a denial of service (NULL pointer dereference and panic) by\nsending a certain response containing incorrect file attributes, which\ntrigger attempted use of an open file that lacks NFSv4 state.\n(CVE-2009-3726)\n\nThe ip_frag_reasm function in ipv4/ip_fragment.c in Linux kernel\n2.6.32-rc8, and possibly earlier versions, calls IP_INC_STATS_BH with\nan incorrect argument, which allows remote attackers to cause a denial\nof service (NULL pointer dereference and hang) via long IP packets,\npossibly related to the ip_defrag function. (CVE-2009-1298)\n\nTo update your kernel, please follow the directions located at :\n\nhttp://www.mandriva.com/en/security/kernelupdate\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n script_cwe_id(119, 189, 200, 264, 362, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:broadcom-wl-kernel-2.6.29.6-desktop-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:broadcom-wl-kernel-2.6.29.6-desktop586-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:broadcom-wl-kernel-2.6.29.6-server-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:broadcom-wl-kernel-2.6.31.6-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:broadcom-wl-kernel-2.6.31.6-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:broadcom-wl-kernel-2.6.31.6-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:broadcom-wl-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:broadcom-wl-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:broadcom-wl-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:em8300-kernel-2.6.29.6-desktop-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:em8300-kernel-2.6.29.6-desktop586-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:em8300-kernel-2.6.29.6-server-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:em8300-kernel-2.6.31.6-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:em8300-kernel-2.6.31.6-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:em8300-kernel-2.6.31.6-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:em8300-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:em8300-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:em8300-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:fcpci-kernel-2.6.29.6-desktop-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:fcpci-kernel-2.6.29.6-desktop586-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:fcpci-kernel-2.6.29.6-server-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:fcpci-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:fcpci-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:fcpci-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:fglrx-kernel-2.6.31.6-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:fglrx-kernel-2.6.31.6-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:fglrx-kernel-2.6.31.6-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:fglrx-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:fglrx-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:fglrx-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-2.6.29.6-desktop-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-2.6.29.6-desktop586-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-2.6.29.6-server-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-2.6.31.6-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-2.6.31.6-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-2.6.31.6-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hcfpcimodem-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hsfmodem-kernel-2.6.29.6-desktop-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hsfmodem-kernel-2.6.29.6-desktop586-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hsfmodem-kernel-2.6.29.6-server-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hsfmodem-kernel-2.6.31.6-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hsfmodem-kernel-2.6.31.6-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hsfmodem-kernel-2.6.31.6-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hsfmodem-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hsfmodem-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:hsfmodem-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-2.6.29.6-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-2.6.31.6-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-desktop-2.6.29.6-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-desktop-2.6.31.6-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-desktop-devel-2.6.29.6-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-desktop-devel-2.6.31.6-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-desktop-devel-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-desktop586-2.6.29.6-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-desktop586-2.6.31.6-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-desktop586-devel-2.6.29.6-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-desktop586-devel-2.6.31.6-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-desktop586-devel-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-server-2.6.29.6-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-server-2.6.31.6-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-server-devel-2.6.29.6-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-server-devel-2.6.31.6-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-server-devel-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-source-2.6.29.6-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-source-2.6.31.6-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-source-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libafs-kernel-2.6.29.6-desktop-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libafs-kernel-2.6.29.6-desktop586-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libafs-kernel-2.6.29.6-server-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libafs-kernel-2.6.31.6-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libafs-kernel-2.6.31.6-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libafs-kernel-2.6.31.6-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libafs-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libafs-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libafs-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lirc-kernel-2.6.29.6-desktop-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lirc-kernel-2.6.29.6-desktop586-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lirc-kernel-2.6.29.6-server-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lirc-kernel-2.6.31.6-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lirc-kernel-2.6.31.6-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lirc-kernel-2.6.31.6-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lirc-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lirc-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lirc-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lzma-kernel-2.6.29.6-desktop-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lzma-kernel-2.6.29.6-desktop586-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lzma-kernel-2.6.29.6-server-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lzma-kernel-2.6.31.6-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lzma-kernel-2.6.31.6-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lzma-kernel-2.6.31.6-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lzma-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lzma-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lzma-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:madwifi-kernel-2.6.29.6-desktop-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:madwifi-kernel-2.6.29.6-desktop586-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:madwifi-kernel-2.6.29.6-server-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:madwifi-kernel-2.6.31.6-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:madwifi-kernel-2.6.31.6-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:madwifi-kernel-2.6.31.6-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:madwifi-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:madwifi-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:madwifi-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia-current-kernel-2.6.29.6-desktop-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia-current-kernel-2.6.29.6-desktop586-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia-current-kernel-2.6.29.6-server-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia-current-kernel-2.6.31.6-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia-current-kernel-2.6.31.6-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia-current-kernel-2.6.31.6-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia-current-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia-current-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia-current-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia173-kernel-2.6.29.6-desktop-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia173-kernel-2.6.29.6-desktop586-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia173-kernel-2.6.29.6-server-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia173-kernel-2.6.31.6-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia173-kernel-2.6.31.6-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia173-kernel-2.6.31.6-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia173-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia173-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia173-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia96xx-kernel-2.6.29.6-desktop-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia96xx-kernel-2.6.29.6-desktop586-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia96xx-kernel-2.6.29.6-server-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia96xx-kernel-2.6.31.6-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia96xx-kernel-2.6.31.6-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia96xx-kernel-2.6.31.6-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia96xx-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia96xx-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nvidia96xx-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:slmodem-kernel-2.6.29.6-desktop-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:slmodem-kernel-2.6.29.6-desktop586-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:slmodem-kernel-2.6.29.6-server-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:slmodem-kernel-2.6.31.6-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:slmodem-kernel-2.6.31.6-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:slmodem-kernel-2.6.31.6-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:slmodem-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:slmodem-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:slmodem-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:squashfs-lzma-kernel-2.6.31.6-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:squashfs-lzma-kernel-2.6.31.6-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:squashfs-lzma-kernel-2.6.31.6-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:squashfs-lzma-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:squashfs-lzma-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:squashfs-lzma-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vboxadditions-kernel-2.6.29.6-desktop-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vboxadditions-kernel-2.6.29.6-desktop586-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vboxadditions-kernel-2.6.29.6-server-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vboxadditions-kernel-2.6.31.6-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vboxadditions-kernel-2.6.31.6-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vboxadditions-kernel-2.6.31.6-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vboxadditions-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vboxadditions-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vboxadditions-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:virtualbox-kernel-2.6.29.6-desktop-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:virtualbox-kernel-2.6.29.6-desktop586-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:virtualbox-kernel-2.6.29.6-server-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:virtualbox-kernel-2.6.31.6-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:virtualbox-kernel-2.6.31.6-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:virtualbox-kernel-2.6.31.6-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:virtualbox-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:virtualbox-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:virtualbox-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vpnclient-kernel-2.6.29.6-desktop-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vpnclient-kernel-2.6.29.6-desktop586-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vpnclient-kernel-2.6.29.6-server-3mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vpnclient-kernel-2.6.31.6-desktop-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vpnclient-kernel-2.6.31.6-desktop586-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vpnclient-kernel-2.6.31.6-server-1mnb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vpnclient-kernel-desktop-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vpnclient-kernel-desktop586-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:vpnclient-kernel-server-latest\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2009.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2010.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/12/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/07/30\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2009.1\", reference:\"broadcom-wl-kernel-2.6.29.6-desktop-3mnb-5.10.79.10-1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"broadcom-wl-kernel-2.6.29.6-desktop586-3mnb-5.10.79.10-1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"broadcom-wl-kernel-2.6.29.6-server-3mnb-5.10.79.10-1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"broadcom-wl-kernel-desktop-latest-5.10.79.10-1.20091209.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"broadcom-wl-kernel-desktop586-latest-5.10.79.10-1.20091209.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"broadcom-wl-kernel-server-latest-5.10.79.10-1.20091209.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"em8300-kernel-2.6.29.6-desktop-3mnb-0.17.2-1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"em8300-kernel-2.6.29.6-desktop586-3mnb-0.17.2-1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"em8300-kernel-2.6.29.6-server-3mnb-0.17.2-1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"em8300-kernel-desktop-latest-0.17.2-1.20091209.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"em8300-kernel-desktop586-latest-0.17.2-1.20091209.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"em8300-kernel-server-latest-0.17.2-1.20091209.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"fcpci-kernel-2.6.29.6-desktop-3mnb-3.11.07-7mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"fcpci-kernel-2.6.29.6-desktop586-3mnb-3.11.07-7mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"fcpci-kernel-2.6.29.6-server-3mnb-3.11.07-7mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"fcpci-kernel-desktop-latest-3.11.07-1.20091209.7mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"fcpci-kernel-desktop586-latest-3.11.07-1.20091209.7mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"fcpci-kernel-server-latest-3.11.07-1.20091209.7mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"hcfpcimodem-kernel-2.6.29.6-desktop-3mnb-1.18-1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"hcfpcimodem-kernel-2.6.29.6-desktop586-3mnb-1.18-1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"hcfpcimodem-kernel-2.6.29.6-server-3mnb-1.18-1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"hcfpcimodem-kernel-desktop-latest-1.18-1.20091209.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"hcfpcimodem-kernel-desktop586-latest-1.18-1.20091209.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"hcfpcimodem-kernel-server-latest-1.18-1.20091209.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"hsfmodem-kernel-2.6.29.6-desktop-3mnb-7.80.02.03-1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"hsfmodem-kernel-2.6.29.6-desktop586-3mnb-7.80.02.03-1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"hsfmodem-kernel-2.6.29.6-server-3mnb-7.80.02.03-1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"hsfmodem-kernel-desktop-latest-7.80.02.03-1.20091209.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"hsfmodem-kernel-desktop586-latest-7.80.02.03-1.20091209.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"hsfmodem-kernel-server-latest-7.80.02.03-1.20091209.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"kernel-2.6.29.6-3mnb-1-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"kernel-desktop-2.6.29.6-3mnb-1-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"kernel-desktop-devel-2.6.29.6-3mnb-1-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"kernel-desktop-devel-latest-2.6.29.6-3mnb2\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"kernel-desktop-latest-2.6.29.6-3mnb2\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"kernel-desktop586-2.6.29.6-3mnb-1-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"kernel-desktop586-devel-2.6.29.6-3mnb-1-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"kernel-desktop586-devel-latest-2.6.29.6-3mnb2\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"kernel-desktop586-latest-2.6.29.6-3mnb2\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"kernel-doc-2.6.29.6-3mnb2\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"kernel-server-2.6.29.6-3mnb-1-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"kernel-server-devel-2.6.29.6-3mnb-1-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"kernel-server-devel-latest-2.6.29.6-3mnb2\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"kernel-server-latest-2.6.29.6-3mnb2\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"kernel-source-2.6.29.6-3mnb-1-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"kernel-source-latest-2.6.29.6-3mnb2\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"libafs-kernel-2.6.29.6-desktop-3mnb-1.4.10-1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"libafs-kernel-2.6.29.6-desktop586-3mnb-1.4.10-1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"libafs-kernel-2.6.29.6-server-3mnb-1.4.10-1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"libafs-kernel-desktop-latest-1.4.10-1.20091209.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"libafs-kernel-desktop586-latest-1.4.10-1.20091209.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"libafs-kernel-server-latest-1.4.10-1.20091209.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"lirc-kernel-2.6.29.6-desktop-3mnb-0.8.5-0.20090320.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"lirc-kernel-2.6.29.6-desktop586-3mnb-0.8.5-0.20090320.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"lirc-kernel-2.6.29.6-server-3mnb-0.8.5-0.20090320.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"lirc-kernel-desktop-latest-0.8.5-1.20091209.0.20090320.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"lirc-kernel-desktop586-latest-0.8.5-1.20091209.0.20090320.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"lirc-kernel-server-latest-0.8.5-1.20091209.0.20090320.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"lzma-kernel-2.6.29.6-desktop-3mnb-4.43-27.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"lzma-kernel-2.6.29.6-desktop586-3mnb-4.43-27.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"lzma-kernel-2.6.29.6-server-3mnb-4.43-27.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"lzma-kernel-desktop-latest-4.43-1.20091209.27.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"lzma-kernel-desktop586-latest-4.43-1.20091209.27.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"lzma-kernel-server-latest-4.43-1.20091209.27.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"madwifi-kernel-2.6.29.6-desktop-3mnb-0.9.4-4.r3998mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"madwifi-kernel-2.6.29.6-desktop586-3mnb-0.9.4-4.r3998mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"madwifi-kernel-2.6.29.6-server-3mnb-0.9.4-4.r3998mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"madwifi-kernel-desktop-latest-0.9.4-1.20091209.4.r3998mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"madwifi-kernel-desktop586-latest-0.9.4-1.20091209.4.r3998mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"madwifi-kernel-server-latest-0.9.4-1.20091209.4.r3998mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"nvidia-current-kernel-2.6.29.6-desktop-3mnb-180.51-1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"nvidia-current-kernel-2.6.29.6-desktop586-3mnb-180.51-1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"nvidia-current-kernel-2.6.29.6-server-3mnb-180.51-1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"nvidia-current-kernel-desktop-latest-180.51-1.20091209.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"nvidia-current-kernel-desktop586-latest-180.51-1.20091209.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"nvidia-current-kernel-server-latest-180.51-1.20091209.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"nvidia173-kernel-2.6.29.6-desktop-3mnb-173.14.18-2mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"nvidia173-kernel-2.6.29.6-desktop586-3mnb-173.14.18-2mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"nvidia173-kernel-2.6.29.6-server-3mnb-173.14.18-2mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"nvidia173-kernel-desktop-latest-173.14.18-1.20091209.2mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"nvidia173-kernel-desktop586-latest-173.14.18-1.20091209.2mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"nvidia173-kernel-server-latest-173.14.18-1.20091209.2mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"nvidia96xx-kernel-2.6.29.6-desktop-3mnb-96.43.11-5mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"nvidia96xx-kernel-2.6.29.6-desktop586-3mnb-96.43.11-5mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"nvidia96xx-kernel-2.6.29.6-server-3mnb-96.43.11-5mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"nvidia96xx-kernel-desktop-latest-96.43.11-1.20091209.5mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"nvidia96xx-kernel-desktop586-latest-96.43.11-1.20091209.5mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"nvidia96xx-kernel-server-latest-96.43.11-1.20091209.5mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"slmodem-kernel-2.6.29.6-desktop-3mnb-2.9.11-0.20080817.4mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"slmodem-kernel-2.6.29.6-desktop586-3mnb-2.9.11-0.20080817.4mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"slmodem-kernel-2.6.29.6-server-3mnb-2.9.11-0.20080817.4mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"slmodem-kernel-desktop-latest-2.9.11-1.20091209.0.20080817.4mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"slmodem-kernel-desktop586-latest-2.9.11-1.20091209.0.20080817.4mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"slmodem-kernel-server-latest-2.9.11-1.20091209.0.20080817.4mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"vboxadditions-kernel-2.6.29.6-desktop-3mnb-2.2.0-4mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"vboxadditions-kernel-2.6.29.6-desktop586-3mnb-2.2.0-4mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"vboxadditions-kernel-2.6.29.6-server-3mnb-2.2.0-4mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"vboxadditions-kernel-desktop-latest-2.2.0-1.20091209.4mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"vboxadditions-kernel-desktop586-latest-2.2.0-1.20091209.4mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"vboxadditions-kernel-server-latest-2.2.0-1.20091209.4mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"virtualbox-kernel-2.6.29.6-desktop-3mnb-2.2.0-4mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"virtualbox-kernel-2.6.29.6-desktop586-3mnb-2.2.0-4mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"virtualbox-kernel-2.6.29.6-server-3mnb-2.2.0-4mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"virtualbox-kernel-desktop-latest-2.2.0-1.20091209.4mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"virtualbox-kernel-desktop586-latest-2.2.0-1.20091209.4mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"virtualbox-kernel-server-latest-2.2.0-1.20091209.4mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"vpnclient-kernel-2.6.29.6-desktop-3mnb-4.8.02.0030-1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"x86_64\", reference:\"vpnclient-kernel-2.6.29.6-desktop-3mnb-4.8.01.0640-3mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"vpnclient-kernel-2.6.29.6-desktop586-3mnb-4.8.02.0030-1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"vpnclient-kernel-2.6.29.6-server-3mnb-4.8.02.0030-1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"x86_64\", reference:\"vpnclient-kernel-2.6.29.6-server-3mnb-4.8.01.0640-3mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"vpnclient-kernel-desktop-latest-4.8.02.0030-1.20091209.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"x86_64\", reference:\"vpnclient-kernel-desktop-latest-4.8.01.0640-1.20091209.3mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"vpnclient-kernel-desktop586-latest-4.8.02.0030-1.20091209.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"vpnclient-kernel-server-latest-4.8.02.0030-1.20091209.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"x86_64\", reference:\"vpnclient-kernel-server-latest-4.8.01.0640-1.20091209.3mdv2009.0\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2010.0\", reference:\"broadcom-wl-kernel-2.6.31.6-desktop-1mnb-5.10.91.9-2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"broadcom-wl-kernel-2.6.31.6-desktop586-1mnb-5.10.91.9-2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"broadcom-wl-kernel-2.6.31.6-server-1mnb-5.10.91.9-2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"broadcom-wl-kernel-desktop-latest-5.10.91.9-1.20091209.2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"broadcom-wl-kernel-desktop586-latest-5.10.91.9-1.20091209.2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"broadcom-wl-kernel-server-latest-5.10.91.9-1.20091209.2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"em8300-kernel-2.6.31.6-desktop-1mnb-0.17.4-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"em8300-kernel-2.6.31.6-desktop586-1mnb-0.17.4-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"em8300-kernel-2.6.31.6-server-1mnb-0.17.4-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"em8300-kernel-desktop-latest-0.17.4-1.20091209.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"em8300-kernel-desktop586-latest-0.17.4-1.20091209.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"em8300-kernel-server-latest-0.17.4-1.20091209.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"fglrx-kernel-2.6.31.6-desktop-1mnb-8.650-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"fglrx-kernel-2.6.31.6-desktop586-1mnb-8.650-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"fglrx-kernel-2.6.31.6-server-1mnb-8.650-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"fglrx-kernel-desktop-latest-8.650-1.20091209.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"fglrx-kernel-desktop586-latest-8.650-1.20091209.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"fglrx-kernel-server-latest-8.650-1.20091209.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"hcfpcimodem-kernel-2.6.31.6-desktop-1mnb-1.19-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"hcfpcimodem-kernel-2.6.31.6-desktop586-1mnb-1.19-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"hcfpcimodem-kernel-2.6.31.6-server-1mnb-1.19-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"hcfpcimodem-kernel-desktop-latest-1.19-1.20091209.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"hcfpcimodem-kernel-desktop586-latest-1.19-1.20091209.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"hcfpcimodem-kernel-server-latest-1.19-1.20091209.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"hsfmodem-kernel-2.6.31.6-desktop-1mnb-7.80.02.05-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"hsfmodem-kernel-2.6.31.6-desktop586-1mnb-7.80.02.05-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"hsfmodem-kernel-2.6.31.6-server-1mnb-7.80.02.05-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"hsfmodem-kernel-desktop-latest-7.80.02.05-1.20091209.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"hsfmodem-kernel-desktop586-latest-7.80.02.05-1.20091209.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"hsfmodem-kernel-server-latest-7.80.02.05-1.20091209.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kernel-2.6.31.6-1mnb-1-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kernel-desktop-2.6.31.6-1mnb-1-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kernel-desktop-devel-2.6.31.6-1mnb-1-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kernel-desktop-devel-latest-2.6.31.6-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kernel-desktop-latest-2.6.31.6-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"kernel-desktop586-2.6.31.6-1mnb-1-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"kernel-desktop586-devel-2.6.31.6-1mnb-1-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"kernel-desktop586-devel-latest-2.6.31.6-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"kernel-desktop586-latest-2.6.31.6-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kernel-doc-2.6.31.6-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kernel-server-2.6.31.6-1mnb-1-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kernel-server-devel-2.6.31.6-1mnb-1-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kernel-server-devel-latest-2.6.31.6-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kernel-server-latest-2.6.31.6-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kernel-source-2.6.31.6-1mnb-1-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kernel-source-latest-2.6.31.6-1mnb2\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"libafs-kernel-2.6.31.6-desktop-1mnb-1.4.11-2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libafs-kernel-2.6.31.6-desktop586-1mnb-1.4.11-2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"libafs-kernel-2.6.31.6-server-1mnb-1.4.11-2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"libafs-kernel-desktop-latest-1.4.11-1.20091209.2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libafs-kernel-desktop586-latest-1.4.11-1.20091209.2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"libafs-kernel-server-latest-1.4.11-1.20091209.2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"lirc-kernel-2.6.31.6-desktop-1mnb-0.8.6-2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"lirc-kernel-2.6.31.6-desktop586-1mnb-0.8.6-2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"lirc-kernel-2.6.31.6-server-1mnb-0.8.6-2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"lirc-kernel-desktop-latest-0.8.6-1.20091209.2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"lirc-kernel-desktop586-latest-0.8.6-1.20091209.2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"lirc-kernel-server-latest-0.8.6-1.20091209.2mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"lzma-kernel-2.6.31.6-desktop-1mnb-4.43-28mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"lzma-kernel-2.6.31.6-desktop586-1mnb-4.43-28mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"lzma-kernel-2.6.31.6-server-1mnb-4.43-28mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"lzma-kernel-desktop-latest-4.43-1.20091209.28mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"lzma-kernel-desktop586-latest-4.43-1.20091209.28mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"lzma-kernel-server-latest-4.43-1.20091209.28mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"madwifi-kernel-2.6.31.6-desktop-1mnb-0.9.4-4.r4068mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"madwifi-kernel-2.6.31.6-desktop586-1mnb-0.9.4-4.r4068mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"madwifi-kernel-2.6.31.6-server-1mnb-0.9.4-4.r4068mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"madwifi-kernel-desktop-latest-0.9.4-1.20091209.4.r4068mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"madwifi-kernel-desktop586-latest-0.9.4-1.20091209.4.r4068mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"madwifi-kernel-server-latest-0.9.4-1.20091209.4.r4068mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"nvidia-current-kernel-2.6.31.6-desktop-1mnb-185.18.36-4mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"nvidia-current-kernel-2.6.31.6-desktop586-1mnb-185.18.36-4mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"nvidia-current-kernel-2.6.31.6-server-1mnb-185.18.36-4mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"nvidia-current-kernel-desktop-latest-185.18.36-1.20091209.4mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"nvidia-current-kernel-desktop586-latest-185.18.36-1.20091209.4mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"nvidia-current-kernel-server-latest-185.18.36-1.20091209.4mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"nvidia173-kernel-2.6.31.6-desktop-1mnb-173.14.20-7mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"nvidia173-kernel-2.6.31.6-desktop586-1mnb-173.14.20-7mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"nvidia173-kernel-2.6.31.6-server-1mnb-173.14.20-7mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"nvidia173-kernel-desktop-latest-173.14.20-1.20091209.7mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"nvidia173-kernel-desktop586-latest-173.14.20-1.20091209.7mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"nvidia173-kernel-server-latest-173.14.20-1.20091209.7mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"nvidia96xx-kernel-2.6.31.6-desktop-1mnb-96.43.13-7mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"nvidia96xx-kernel-2.6.31.6-desktop586-1mnb-96.43.13-7mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"nvidia96xx-kernel-2.6.31.6-server-1mnb-96.43.13-7mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"nvidia96xx-kernel-desktop-latest-96.43.13-1.20091209.7mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"nvidia96xx-kernel-desktop586-latest-96.43.13-1.20091209.7mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"nvidia96xx-kernel-server-latest-96.43.13-1.20091209.7mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"slmodem-kernel-2.6.31.6-desktop-1mnb-2.9.11-0.20080817.4.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"slmodem-kernel-2.6.31.6-desktop586-1mnb-2.9.11-0.20080817.4.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"slmodem-kernel-2.6.31.6-server-1mnb-2.9.11-0.20080817.4.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"slmodem-kernel-desktop-latest-2.9.11-1.20091209.0.20080817.4.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"slmodem-kernel-desktop586-latest-2.9.11-1.20091209.0.20080817.4.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"slmodem-kernel-server-latest-2.9.11-1.20091209.0.20080817.4.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"squashfs-lzma-kernel-2.6.31.6-desktop-1mnb-3.3-11mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"squashfs-lzma-kernel-2.6.31.6-desktop586-1mnb-3.3-11mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"squashfs-lzma-kernel-2.6.31.6-server-1mnb-3.3-11mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"squashfs-lzma-kernel-desktop-latest-3.3-1.20091209.11mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"squashfs-lzma-kernel-desktop586-latest-3.3-1.20091209.11mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"squashfs-lzma-kernel-server-latest-3.3-1.20091209.11mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"vboxadditions-kernel-2.6.31.6-desktop-1mnb-3.0.8-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"vboxadditions-kernel-2.6.31.6-desktop586-1mnb-3.0.8-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"vboxadditions-kernel-2.6.31.6-server-1mnb-3.0.8-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"vboxadditions-kernel-desktop-latest-3.0.8-1.20091209.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"vboxadditions-kernel-desktop586-latest-3.0.8-1.20091209.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"vboxadditions-kernel-server-latest-3.0.8-1.20091209.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"virtualbox-kernel-2.6.31.6-desktop-1mnb-3.0.8-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"virtualbox-kernel-2.6.31.6-desktop586-1mnb-3.0.8-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"virtualbox-kernel-2.6.31.6-server-1mnb-3.0.8-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"virtualbox-kernel-desktop-latest-3.0.8-1.20091209.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"virtualbox-kernel-desktop586-latest-3.0.8-1.20091209.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"virtualbox-kernel-server-latest-3.0.8-1.20091209.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"vpnclient-kernel-2.6.31.6-desktop-1mnb-4.8.02.0030-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"vpnclient-kernel-2.6.31.6-desktop586-1mnb-4.8.02.0030-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"vpnclient-kernel-2.6.31.6-server-1mnb-4.8.02.0030-1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"vpnclient-kernel-desktop-latest-4.8.02.0030-1.20091209.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"vpnclient-kernel-desktop586-latest-4.8.02.0030-1.20091209.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"vpnclient-kernel-server-latest-4.8.02.0030-1.20091209.1mdv2010.0\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T14:05:52", "description": "The Linux kernel for openSUSE 11.2 was updated to 2.6.31.8 to fix the\nfollowing bugs and security issues :\n\n - A file overwrite issue on the ext4 filesystem could be\n used by local attackers that have write access to a\n filesystem to change/overwrite files of other users,\n including root. (CVE-2009-4131)\n\n - A remote denial of service by sending overly long\n packets could be used by remote attackers to crash a\n machine. (CVE-2009-1298)\n\n - The mac80211 subsystem in the Linux kernel allows remote\n attackers to cause a denial of service (panic) via a\n crafted Delete Block ACK (aka DELBA) packet, related to\n an erroneous 'code shuffling patch.' (CVE-2009-4026)\n\n - Race condition in the mac80211 subsystem in the Linux\n kernel allows remote attackers to cause a denial of\n service (system crash) via a Delete Block ACK (aka\n DELBA) packet that triggers a certain state change in\n the absence of an aggregation session. (CVE-2009-4027)\n\n - The poll_mode_io file for the megaraid_sas driver in\n the Linux kernel has world-writable permissions, which\n allows local users to change the I/O mode of the driver\n by modifying this file. (CVE-2009-3939)\n\n - The collect_rx_frame function in\n drivers/isdn/hisax/hfc_usb.c in the Linux kernel allows\n attackers to have an unspecified impact via a crafted\n HDLC packet that arrives over ISDN and triggers a buffer\n under-read. This requires the attacker to access the\n machine on ISDN protocol level. (CVE-2009-4005)\n\n - Array index error in the gdth_read_event function in\n drivers/scsi/gdth.c in the Linux kernel allows local\n users to cause a denial of service or possibly gain\n privileges via a negative event index in an IOCTL\n request. (CVE-2009-3080)\n\n - The get_instantiation_keyring function in\n security/keys/keyctl.c in the KEYS subsystem in the\n Linux kernel does not properly maintain the reference\n count of a keyring, which allows local users to gain\n privileges or cause a denial of service (OOPS) via\n vectors involving calls to this function without\n specifying a keyring by ID, as demonstrated by a series\n of keyctl request2 and keyctl list commands.\n (CVE-2009-3624)\n\n - The fuse_direct_io function in fs/fuse/file.c in the\n fuse subsystem in the Linux kernel might allow attackers\n to cause a denial of service (invalid pointer\n dereference and OOPS) via vectors possibly related to a\n memory-consumption attack. (CVE-2009-4021)\n\n - Multiple race conditions in fs/pipe.c in the Linux\n kernel allow local users to cause a denial of service\n (NULL pointer dereference and system crash) or gain\n privileges by attempting to open an anonymous pipe via a\n /proc/*/fd/ pathname. As openSUSE 11.2 by default sets\n mmap_min_addr protection, this issue will just Oops the\n kernel and not be able to execute code. (CVE-2009-3547)\n\n - net/unix/af_unix.c in the Linux kernel allows local\n users to cause a denial of service (system hang) by\n creating an abstract-namespace AF_UNIX listening socket,\n performing a shutdown operation on this socket, and then\n performing a series of connect operations to this\n socket. (CVE-2009-3621)\n\n - drivers/firewire/ohci.c in the Linux kernel when\n packet-per-buffer mode is used, allows local users to\n cause a denial of service (NULL pointer dereference and\n system crash) or possibly have unknown other impact via\n an unspecified ioctl associated with receiving an ISO\n packet that contains zero in the payload-length field.\n (CVE-2009-4138)\n\n - The ext4_decode_error function in fs/ext4/super.c in\n the ext4 filesystem in the Linux kernel allows\n user-assisted remote attackers to cause a denial of\n service (NULL pointer dereference), and possibly have\n unspecified other impact, via a crafted read-only\n filesystem that lacks a journal. (CVE-2009-4308)\n\n - The ext4_fill_flex_info function in fs/ext4/super.c in\n the Linux kernel allows user-assisted remote attackers\n to cause a denial of service (divide-by-zero error and\n panic) via a malformed ext4 filesystem containing a\n super block with a large FLEX_BG group size (aka\n s_log_groups_per_flex value). (CVE-2009-4307)\n\n - Unspecified vulnerability in the EXT4_IOC_MOVE_EXT (aka\n move extents) ioctl implementation in the ext4\n filesystem in the Linux kernel allows local users to\n cause a denial of service (filesystem corruption) via\n unknown vectors, a different vulnerability than\n CVE-2009-4131. (CVE-2009-4306)\n\n - The EXT4_IOC_MOVE_EXT (aka move extents) ioctl\n implementation in the ext4 filesystem in the Linux\n kernel allows local users to overwrite arbitrary files\n via a crafted request, related to insufficient checks\n for file permissions. This can lead to privilege\n escalations. (CVE-2009-4131)\n\n - The rt2870 and rt2860 drivers were refreshed to the\n level they are in the Linux 2.6.32 kernel, bringing new\n device support and new functionality.", "edition": 26, "published": "2010-01-05T00:00:00", "title": "SuSE 11.2 Security Update: kernel (2009-12-18)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4026", "CVE-2009-3939", "CVE-2009-3621", "CVE-2009-1298", "CVE-2009-4027", "CVE-2009-4005", "CVE-2009-3080", "CVE-2009-3547", "CVE-2009-3624", "CVE-2009-4131", "CVE-2009-4306", "CVE-2009-4308", "CVE-2009-4307", "CVE-2009-4021", "CVE-2009-4138"], "modified": "2010-01-05T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:kernel-trace", "p-cpe:/a:novell:opensuse:kernel-xen-devel", "p-cpe:/a:novell:opensuse:kernel-trace-base", "p-cpe:/a:novell:opensuse:kernel-vanilla-base", "p-cpe:/a:novell:opensuse:kernel-desktop-base", "p-cpe:/a:novell:opensuse:kernel-xen-base", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:preload-kmp-desktop", "cpe:/o:novell:opensuse:11.2", "p-cpe:/a:novell:opensuse:kernel-pae", "p-cpe:/a:novell:opensuse:kernel-pae-devel", "p-cpe:/a:novell:opensuse:kernel-syms", "p-cpe:/a:novell:opensuse:preload-kmp-default", "p-cpe:/a:novell:opensuse:kernel-pae-base", "p-cpe:/a:novell:opensuse:kernel-vanilla", "p-cpe:/a:novell:opensuse:kernel-xen", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel", "p-cpe:/a:novell:opensuse:kernel-debug-base", "p-cpe:/a:novell:opensuse:kernel-trace-devel", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:kernel-desktop-devel", "p-cpe:/a:novell:opensuse:kernel-desktop", "p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-default-base"], "id": "SUSE_11_2_KERNEL-091218.NASL", "href": "https://www.tenable.com/plugins/nessus/43631", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Updates.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(43631);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\n \"CVE-2009-1298\",\n \"CVE-2009-3080\",\n \"CVE-2009-3547\",\n \"CVE-2009-3621\",\n \"CVE-2009-3624\",\n \"CVE-2009-3939\",\n \"CVE-2009-4005\",\n \"CVE-2009-4021\",\n \"CVE-2009-4026\",\n \"CVE-2009-4027\",\n \"CVE-2009-4131\",\n \"CVE-2009-4138\",\n \"CVE-2009-4306\",\n \"CVE-2009-4307\",\n \"CVE-2009-4308\"\n );\n script_bugtraq_id(\n 36723,\n 36793,\n 36901,\n 37019,\n 37036,\n 37068,\n 37069,\n 37170,\n 37231,\n 37277,\n 37339\n );\n script_name(english:\"SuSE 11.2 Security Update: kernel (2009-12-18)\");\n script_summary(english:\"Check for the kernel package.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\"The remote openSUSE host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Linux kernel for openSUSE 11.2 was updated to 2.6.31.8 to fix the\nfollowing bugs and security issues :\n\n - A file overwrite issue on the ext4 filesystem could be\n used by local attackers that have write access to a\n filesystem to change/overwrite files of other users,\n including root. (CVE-2009-4131)\n\n - A remote denial of service by sending overly long\n packets could be used by remote attackers to crash a\n machine. (CVE-2009-1298)\n\n - The mac80211 subsystem in the Linux kernel allows remote\n attackers to cause a denial of service (panic) via a\n crafted Delete Block ACK (aka DELBA) packet, related to\n an erroneous 'code shuffling patch.' (CVE-2009-4026)\n\n - Race condition in the mac80211 subsystem in the Linux\n kernel allows remote attackers to cause a denial of\n service (system crash) via a Delete Block ACK (aka\n DELBA) packet that triggers a certain state change in\n the absence of an aggregation session. (CVE-2009-4027)\n\n - The poll_mode_io file for the megaraid_sas driver in\n the Linux kernel has world-writable permissions, which\n allows local users to change the I/O mode of the driver\n by modifying this file. (CVE-2009-3939)\n\n - The collect_rx_frame function in\n drivers/isdn/hisax/hfc_usb.c in the Linux kernel allows\n attackers to have an unspecified impact via a crafted\n HDLC packet that arrives over ISDN and triggers a buffer\n under-read. This requires the attacker to access the\n machine on ISDN protocol level. (CVE-2009-4005)\n\n - Array index error in the gdth_read_event function in\n drivers/scsi/gdth.c in the Linux kernel allows local\n users to cause a denial of service or possibly gain\n privileges via a negative event index in an IOCTL\n request. (CVE-2009-3080)\n\n - The get_instantiation_keyring function in\n security/keys/keyctl.c in the KEYS subsystem in the\n Linux kernel does not properly maintain the reference\n count of a keyring, which allows local users to gain\n privileges or cause a denial of service (OOPS) via\n vectors involving calls to this function without\n specifying a keyring by ID, as demonstrated by a series\n of keyctl request2 and keyctl list commands.\n (CVE-2009-3624)\n\n - The fuse_direct_io function in fs/fuse/file.c in the\n fuse subsystem in the Linux kernel might allow attackers\n to cause a denial of service (invalid pointer\n dereference and OOPS) via vectors possibly related to a\n memory-consumption attack. (CVE-2009-4021)\n\n - Multiple race conditions in fs/pipe.c in the Linux\n kernel allow local users to cause a denial of service\n (NULL pointer dereference and system crash) or gain\n privileges by attempting to open an anonymous pipe via a\n /proc/*/fd/ pathname. As openSUSE 11.2 by default sets\n mmap_min_addr protection, this issue will just Oops the\n kernel and not be able to execute code. (CVE-2009-3547)\n\n - net/unix/af_unix.c in the Linux kernel allows local\n users to cause a denial of service (system hang) by\n creating an abstract-namespace AF_UNIX listening socket,\n performing a shutdown operation on this socket, and then\n performing a series of connect operations to this\n socket. (CVE-2009-3621)\n\n - drivers/firewire/ohci.c in the Linux kernel when\n packet-per-buffer mode is used, allows local users to\n cause a denial of service (NULL pointer dereference and\n system crash) or possibly have unknown other impact via\n an unspecified ioctl associated with receiving an ISO\n packet that contains zero in the payload-length field.\n (CVE-2009-4138)\n\n - The ext4_decode_error function in fs/ext4/super.c in\n the ext4 filesystem in the Linux kernel allows\n user-assisted remote attackers to cause a denial of\n service (NULL pointer dereference), and possibly have\n unspecified other impact, via a crafted read-only\n filesystem that lacks a journal. (CVE-2009-4308)\n\n - The ext4_fill_flex_info function in fs/ext4/super.c in\n the Linux kernel allows user-assisted remote attackers\n to cause a denial of service (divide-by-zero error and\n panic) via a malformed ext4 filesystem containing a\n super block with a large FLEX_BG group size (aka\n s_log_groups_per_flex value). (CVE-2009-4307)\n\n - Unspecified vulnerability in the EXT4_IOC_MOVE_EXT (aka\n move extents) ioctl implementation in the ext4\n filesystem in the Linux kernel allows local users to\n cause a denial of service (filesystem corruption) via\n unknown vectors, a different vulnerability than\n CVE-2009-4131. (CVE-2009-4306)\n\n - The EXT4_IOC_MOVE_EXT (aka move extents) ioctl\n implementation in the ext4 filesystem in the Linux\n kernel allows local users to overwrite arbitrary files\n via a crafted request, related to insufficient checks\n for file permissions. This can lead to privilege\n escalations. (CVE-2009-4131)\n\n - The rt2870 and rt2860 drivers were refreshed to the\n level they are in the Linux 2.6.32 kernel, bringing new\n device support and new functionality.\");\n # http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?9d661785\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=472410\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=498708\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=522790\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=523487\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=533555\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=533677\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=537081\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=539010\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=540589\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=540997\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=543407\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=543704\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=544779\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=546491\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=547357\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=548010\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=548728\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=549030\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=550787\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=551664\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=552033\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=552154\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=552492\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=556564\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=556568\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=556899\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=557180\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=557403\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=557668\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=557683\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=557760\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=558267\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=559062\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=559132\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=559680\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=560697\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=561018\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=561235\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=564712\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=559680\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=541736\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=561018\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=564382\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=564381\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=564380\");\n script_set_attribute(attribute:\"see_also\", value: \"https://bugzilla.novell.com/show_bug.cgi?id=561018\");\n script_set_attribute(attribute:\"solution\", value:\"Update the affected kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n script_cwe_id(119, 189, 264, 310, 362, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-desktop-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-desktop-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-pae-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-pae-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-trace\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-trace-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-trace-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-xen-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:preload-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:preload-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/12/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/01/05\");\n\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kernel-debug-2.6.31.8-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kernel-debug-base-2.6.31.8-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kernel-debug-devel-2.6.31.8-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kernel-default-2.6.31.8-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kernel-default-base-2.6.31.8-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kernel-default-devel-2.6.31.8-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kernel-desktop-2.6.31.8-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kernel-desktop-base-2.6.31.8-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kernel-desktop-devel-2.6.31.8-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kernel-pae-2.6.31.8-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kernel-pae-base-2.6.31.8-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kernel-pae-devel-2.6.31.8-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kernel-syms-2.6.31.8-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kernel-trace-2.6.31.8-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kernel-trace-base-2.6.31.8-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kernel-trace-devel-2.6.31.8-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kernel-vanilla-2.6.31.8-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kernel-vanilla-base-2.6.31.8-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kernel-vanilla-devel-2.6.31.8-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kernel-xen-2.6.31.8-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kernel-xen-base-2.6.31.8-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kernel-xen-devel-2.6.31.8-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"preload-kmp-default-1.1_2.6.31.8_0.1-6.9.3\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"preload-kmp-desktop-1.1_2.6.31.8_0.1-6.9.3\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-debug / kernel-debug-base / kernel-debug-devel / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "fedora": [{"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2009-4131"], "description": "The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc. ", "modified": "2009-12-10T18:07:37", "published": "2009-12-10T18:07:37", "id": "FEDORA:E647C10F85F", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 12 Update: kernel-2.6.31.6-166.fc12", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2009-4131"], "description": "The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc. ", "modified": "2009-12-25T08:23:23", "published": "2009-12-25T08:23:23", "id": "FEDORA:151E510F7EA", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 12 Update: kernel-2.6.31.9-174.fc12", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2009-4131", "CVE-2010-0006"], "description": "The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc. ", "modified": "2010-01-21T00:06:43", "published": "2010-01-21T00:06:43", "id": "FEDORA:E9A9210FB09", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 12 Update: kernel-2.6.31.12-174.2.3.fc12", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2009-4131", "CVE-2009-4537", "CVE-2010-0623", "CVE-2010-1146"], "description": "The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc. ", "modified": "2010-05-18T21:59:07", "published": "2010-05-18T21:59:07", "id": "FEDORA:101AF111631", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 12 Update: kernel-2.6.32.12-115.fc12", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2009-4131", "CVE-2009-4537", "CVE-2010-0623", "CVE-2010-1146", "CVE-2010-1437", "CVE-2010-1636"], "description": "The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc. ", "modified": "2010-06-14T17:13:44", "published": "2010-06-14T17:13:44", "id": "FEDORA:2A7BE111947", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 12 Update: kernel-2.6.32.14-127.fc12", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2009-4131", "CVE-2009-4536", "CVE-2009-4537", "CVE-2009-4538", "CVE-2010-0006", "CVE-2010-0307", "CVE-2010-0410", "CVE-2010-0415"], "description": "The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc. ", "modified": "2010-02-16T13:19:25", "published": "2010-02-16T13:19:25", "id": "FEDORA:D7C4010F8B4", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 12 Update: kernel-2.6.31.12-174.2.19.fc12", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2009-4131", "CVE-2009-4537", "CVE-2010-0623", "CVE-2010-1146", "CVE-2010-1437", "CVE-2010-2071", "CVE-2010-2478", "CVE-2010-2495"], "description": "The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc. ", "modified": "2010-07-13T07:49:26", "published": "2010-07-13T07:49:26", "id": "FEDORA:58608110C02", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 12 Update: kernel-2.6.32.16-141.fc12", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2009-4131", "CVE-2009-4537", "CVE-2010-0623", "CVE-2010-1146", "CVE-2010-1437", "CVE-2010-2066", "CVE-2010-2071", "CVE-2010-2478", "CVE-2010-2524"], "description": "The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc. ", "modified": "2010-08-03T00:59:08", "published": "2010-08-03T00:59:08", "id": "FEDORA:B72D7110F0C", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 12 Update: kernel-2.6.32.16-150.fc12", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2009-4131", "CVE-2009-4537", "CVE-2010-0623", "CVE-2010-1146", "CVE-2010-1437", "CVE-2010-2066", "CVE-2010-2071", "CVE-2010-2266", "CVE-2010-2478", "CVE-2010-2524", "CVE-2010-2959"], "description": "The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc. ", "modified": "2010-09-02T20:42:04", "published": "2010-09-02T20:42:04", "id": "FEDORA:1F915226FCF", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 12 Update: kernel-2.6.32.21-166.fc12", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2009-4131", "CVE-2009-4537", "CVE-2010-0623", "CVE-2010-1146", "CVE-2010-1437", "CVE-2010-2066", "CVE-2010-2071", "CVE-2010-2226", "CVE-2010-2240", "CVE-2010-2266", "CVE-2010-2478", "CVE-2010-2524", "CVE-2010-2798"], "description": "The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc. ", "modified": "2010-08-23T22:02:23", "published": "2010-08-23T22:02:23", "id": "FEDORA:1EC1210F9FC", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 12 Update: kernel-2.6.32.19-163.fc12", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "ubuntu": [{"lastseen": "2020-07-09T00:24:11", "bulletinFamily": "unix", "cvelist": ["CVE-2009-1298", "CVE-2009-4131"], "description": "David Ford discovered that the IPv4 defragmentation routine did not \ncorrectly handle oversized packets. A remote attacker could send \nspecially crafted traffic that would cause a system to crash, leading \nto a denial of service. (The fix was included in the earlier kernels \nfrom USN-864-1.) (CVE-2009-1298)\n\nAkira Fujita discovered that the Ext4 \"move extents\" ioctl did not \ncorrectly check permissions. A local attacker could exploit this to \noverwrite arbitrary files on the system, leading to root privilege \nescalation. (CVE-2009-4131)", "edition": 5, "modified": "2009-12-10T00:00:00", "published": "2009-12-10T00:00:00", "id": "USN-869-1", "href": "https://ubuntu.com/security/notices/USN-869-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:35", "bulletinFamily": "software", "cvelist": ["CVE-2009-1298", "CVE-2009-4131"], "description": "Crash on malformed IP packet defragmentation, privilege escalation with Ext4 "move extents" ioctl.", "edition": 1, "modified": "2009-12-11T00:00:00", "published": "2009-12-11T00:00:00", "id": "SECURITYVULNS:VULN:10464", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:10464", "title": "Linux kernel multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:32", "bulletinFamily": "software", "cvelist": ["CVE-2009-1298", "CVE-2009-4131"], "description": "===========================================================\r\nUbuntu Security Notice USN-869-1 December 10, 2009\r\nlinux vulnerability\r\nCVE-2009-1298, CVE-2009-4131\r\n===========================================================\r\n\r\nA security issue affects the following Ubuntu releases:\r\n\r\nUbuntu 9.10\r\n\r\nThis advisory also applies to the corresponding versions of\r\nKubuntu, Edubuntu, and Xubuntu.\r\n\r\nThe problem can be corrected by upgrading your system to the\r\nfollowing package versions:\r\n\r\nUbuntu 9.10:\r\n linux-image-2.6.31-16-386 2.6.31-16.53\r\n linux-image-2.6.31-16-generic 2.6.31-16.53\r\n linux-image-2.6.31-16-generic-pae 2.6.31-16.53\r\n linux-image-2.6.31-16-ia64 2.6.31-16.53\r\n linux-image-2.6.31-16-lpia 2.6.31-16.53\r\n linux-image-2.6.31-16-powerpc 2.6.31-16.53\r\n linux-image-2.6.31-16-powerpc-smp 2.6.31-16.53\r\n linux-image-2.6.31-16-powerpc64-smp 2.6.31-16.53\r\n linux-image-2.6.31-16-server 2.6.31-16.53\r\n linux-image-2.6.31-16-sparc64 2.6.31-16.53\r\n linux-image-2.6.31-16-sparc64-smp 2.6.31-16.53\r\n linux-image-2.6.31-16-virtual 2.6.31-16.53\r\n\r\nAfter a standard system upgrade you need to reboot your computer to\r\neffect the necessary changes.\r\n\r\nDetails follow:\r\n\r\nDavid Ford discovered that the IPv4 defragmentation routine did not\r\ncorrectly handle oversized packets. A remote attacker could send\r\nspecially crafted traffic that would cause a system to crash, leading\r\nto a denial of service. (The fix was included in the earlier kernels\r\nfrom USN-864-1.) (CVE-2009-1298)\r\n\r\nAkira Fujita discovered that the Ext4 "move extents" ioctl did not\r\ncorrectly check permissions. A local attacker could exploit this to\r\noverwrite arbitrary files on the system, leading to root privilege\r\nescalation. (CVE-2009-4131)\r\n\r\n\r\nUpdated packages for Ubuntu 9.10:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.31-16.53.diff.gz\r\n Size/MD5: 2759717 46bb1e1c70f8cd4b8a426f36145b96b3\r\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.31-16.53.dsc\r\n Size/MD5: 3781 ba87d38489ec61b8f83824717d524fec\r\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.31.orig.tar.gz\r\n Size/MD5: 78278595 16c0355d3612806ef87addf7c9f8c9f9\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc_2.6.31-16.53_all.deb\r\n Size/MD5: 3788070 2066149ef4cf1eb56029b0b474f8dc1f\r\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-16_2.6.31-16.53_all.deb\r\n Size/MD5: 9527628 a98981b3a5da26fe246fdf35a2119b7e\r\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.31_2.6.31-16.53_all.deb\r\n Size/MD5: 62153736 e31831df66d0fcd0b78a3ce4d3fe2400\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 221392 4c65682a6d8ddd0a8cdc554b4e0d0432\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/char-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 15536 f8f213f30fe031fa429271f3b08c7770\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 52136 035e9db4477d2333520d7e1c2174868c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 44828 7f8ff1f4b3c491d7a773d898d7bd3d7e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 50078 8dce43d818f98e78187a593ca9bb081c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 92520 fca83159eb7dd5c4452d91380382e3ff\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 37778 48f05c3aa331765f9ed01c78f67dbd37\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 522822 4b4831946d3e38ffda45d2adc0ba4a6c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 130552 1f1bba06aef4f3b5b14f84182a833fcb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 53838 ebb5bba585bfd0530a7367e753c70780\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 310124 fcef46eda5c7a3765e9b8b224d4c59b0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 4352774 229a983cec5009fcbefa87113d292fe7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-16-generic_2.6.31-16.53_amd64.deb\r\n Size/MD5: 691698 f2950c44f90969a7c2d288723a6b38ad\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-16-server_2.6.31-16.53_amd64.deb\r\n Size/MD5: 691650 f62b9f8f16a9ce1f6a607ebb3c4487bf\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-16-generic_2.6.31-16.53_amd64.deb\r\n Size/MD5: 28921388 f34bb6516ad428f132ea616b47298e93\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-16-server_2.6.31-16.53_amd64.deb\r\n Size/MD5: 28883496 7fdb7bd0d2a12e416818737e0fb92942\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-16-virtual_2.6.31-16.53_amd64.deb\r\n Size/MD5: 11737718 9f77e06415c8b1dd874e55127df81615\r\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.31-16.53_amd64.deb\r\n Size/MD5: 739364 aed6a158c3e5d9ca30856e10d4017867\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 168280 ffc7a08805d77f7f25019118ea5a30ae\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 202762 30bc7511f5126c9941a68934232d654d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 27268 cefc15496c2a29de9c9cb179cb7e8e3c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 311814 1d6917dcbfb73c3ef17f12aa6342f73a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 2281968 cc8fc02dfc7f7911bf1e84e13869e286\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 158686 b36dea5de2bca6981fc9828ebf0d1a3c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 203100 383915d44594f4f621bb7e376cb1f8bd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 161070 9a49f1f23db4eca300d2de08ac4ad549\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 38064 3569916e727b0f9b9ae24c96705f44d0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 5762 2777b91c8a8ffaaa0c42e0c159e49c75\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 73498 6df9ccff527e0f5aeb40ae4ff145a098\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 22248 860de3b51003b30d58084223e89cb04e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 9548 8bbce0c3a6db3862ee6d5382b943556c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 39842 aaa53c5dae5952028ccb8f230515e5ff\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 23504 94a306087cbadbb8f396a06281a43189\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 1389572 2d2e7744d79462eef3e8a67f3e4028e6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 47380 e84090b8d7eec619e3ab49d9982897f2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 51616 4097f56d2e1b125f762cdc96cf81d606\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 128718 baa6b9a44688e7479bbf93310d5522fa\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.31-16-generic-di_2.6.31-16.53_amd64.udeb\r\n Size/MD5: 15818 726d41aa9553b604f3dc9c259261cf58\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 198834 33ef2b92f7fdfcfbff013c2e4b5ecbb3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/char-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 32462 2659032807cd1a2e924b0fa329a2f527\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 49942 4c1ff905601f271495776ef921121f67\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 42114 2c4c2ecce0b9920f1caf305ac6549420\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 45950 ef462b137eff2ff78f061a95e0bbd6a1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 87380 fece903fdf84f7e6791f1d1d5716f54d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 33752 9c4b1e0874773522b8578deb0863e810\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 519412 3a0acfa536549cd40ec94900da11a053\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 128062 8343238782469e3dbb9f668f53ff314b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 49740 b31a0b3690d030ff6324beb4a9aceb29\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 295736 e29e8b8ea3c8210ca6e5e9347a4cca58\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 4185966 8db0b59495e0cb4aecc7d95e7bdc9cdf\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-16-386_2.6.31-16.53_i386.deb\r\n Size/MD5: 671048 e29694f4aedfd0a0ed0c78a21b226066\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-16-generic-pae_2.6.31-16.53_i386.deb\r\n Size/MD5: 670694 c26dab3b275ec9848c23bb62c9b64c85\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-16-generic_2.6.31-16.53_i386.deb\r\n Size/MD5: 670992 374081ef1662d125d99138c4574d32f0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-16-386_2.6.31-16.53_i386.deb\r\n Size/MD5: 28771668 9861afb3445411397664cf7ae44c555a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-16-generic-pae_2.6.31-16.53_i386.deb\r\n Size/MD5: 28935472 48a65223efa3b3b1a1c54c3586fb521a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-16-generic_2.6.31-16.53_i386.deb\r\n Size/MD5: 28832722 809c454e238dae4cb749df93ba542a8b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-16-virtual_2.6.31-16.53_i386.deb\r\n Size/MD5: 11190188 6c15e81718fd41c007bb612cb6bb5db4\r\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.31-16.53_i386.deb\r\n Size/MD5: 739344 90b28b13be2518c935a06f368a0c1038\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 172778 b775ca8fcd7a408ff6ec1e89bb5748e3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 186130 cc4d5dca631cdbed74b9f2661eb30057\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 28374 c6fe97908c37bca567e5675f1411510d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 292768 a0059aa2de973a9199806eca936ebad2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 2400212 a6223d598dfb807ea7112843ee71a6ef\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 142004 6607d27d8dad6847f41bab71cbfde9d9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 189572 72291ac0ce3268792f6bb53afcc6aeb2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 148500 40cd8d52c2dc417fe5546a0509bf8460\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 35308 962ea3d7096d8f1e370b748acb663bac\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 6844 dcab82ea44f1f535c09438e4806500e7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 85696 966b54b4f6ec4c294714acd8a9ee3dd6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 46414 8e39cd1e4924b43bfca024a6a6dce667\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 8910 1681a86723ce87c7f4b35795c45f4019\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 36276 a5446dfc19cdb998ccbaa4b1c3ca07ae\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 21688 bb2e9413b9d57b1fbf2b16112c6a3140\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 1495046 4bb94158e75034134625f19679240249\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 44080 c739073970d8c4519c291c69322a1069\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 48458 169870f8cfb4a51f87b0359e2aaa5cb0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 117578 49d3e9ab048e66359d32053862148def\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.31-16-generic-di_2.6.31-16.53_i386.udeb\r\n Size/MD5: 14516 73a7ae93726bbc740d7bf002ec2f47ba\r\n\r\n lpia architecture (Low Power Intel Architecture):\r\n\r\n http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 198808 c1ea3c9a24a402a8df3a7fb01a0fe18f\r\n http://ports.ubuntu.com/pool/main/l/linux/char-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 32448 b6d46b76ca3a818c7c53edadbbca9082\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 49944 aaba7e556ccaf57678acc28ab5eacaad\r\n http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 42156 6d6665963a478444299b1971e8bcb782\r\n http://ports.ubuntu.com/pool/main/l/linux/fb-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 45946 4265f05b2e183d28c6fa85627ca01b83\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 87380 08aa24407a8eae43612427458a685d3c\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 33750 bb3a4fa9316fb9116a1f6e4cb8ab4e83\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 519594 3a9df45ec664d4b7eddc6cf71aedcde6\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 128096 e83ca3e5610fb1eecbf039cd2fc572d8\r\n http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 49742 93d34cdae126a65118cb6112c5cb68b2\r\n http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 295726 e8981b5221408017df40658f10cf5027\r\n http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 4187394 8fe5aa554b19e84514be382166bf3e40\r\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-16-lpia_2.6.31-16.53_lpia.deb\r\n Size/MD5: 670146 d6c22d50659820697933d9aca2d843f2\r\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-16-lpia_2.6.31-16.53_lpia.deb\r\n Size/MD5: 28827002 b2529960e06aada8a47e7fd186ec44dc\r\n http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.31-16.53_lpia.deb\r\n Size/MD5: 739328 1eeb403661a63bebd2b655cc81fedfcd\r\n http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 172834 a5c931d816560410b79b63b5b672b864\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 186108 93fc03887028a74eba6ac16bcd6c6ed1\r\n http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 28364 ba960c2c3f8f04d5d8076ba7d59caca4\r\n http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 292774 8586ee587a26bf84b19530cb44503537\r\n http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 2400294 58bd5adc0268224cae95f39600372a57\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 141994 cb3321864dc1491e2b4b3d564929b4a5\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 189554 c4531eca5bcd1e352ccc95c56ed77db3\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 148480 a4e0704d41d16a1e54f21739084145c2\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 35294 6c8a356ffc371d49ed135192794bc9a3\r\n http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 6828 7ab376d2da0796954be3a91127d9c7c7\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 85668 bc0a44587d1d7d23bc912e2d7325f33b\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 46418 8dc517682170fd664db9ed7d04bff8ee\r\n http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 8902 59be4bb6554bbc28a39389592a93fa15\r\n http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 36264 7e23372cea5c7588eab2f7b422c173dc\r\n http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 21680 c07bb93108ddcea594b6f7afac2392f7\r\n http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 1494786 738987519bb0737dd86af28567a5158d\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 44070 a1dc502b8648935e9ee3ed3feadb3ad3\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 48460 7e1ecc9658479055b377e57f07673636\r\n http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 117558 236c6d98cb859537b39042cab44e7408\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/virtio-modules-2.6.31-16-lpia-di_2.6.31-16.53_lpia.udeb\r\n Size/MD5: 14506 f912fc9edcb6b82f4dbd43b49135c9c1\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 321464 769c4a9959cb77777ffc23705c0d3bb8\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 263644 7f094fb48a893baa441f7bd1b648f9ab\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 58854 49215a4931f5645a84dba696cb2ce1e4\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 67046 1b8250d0bfa863ca44a6dab45a0c0d48\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 45920 fe05ce15f61ae007d9f3c1d8ec2057c0\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 51300 29d33d613d76d11aaabfb90a580fb5da\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 90682 9fbcb097d7854f3d27e6cd5ba085c15f\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 105156 bd4943b06b91094123f99e8df3eb431e\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 39494 cf471cd4951499cb4100af5cd150924b\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 39276 08c35a86e3d3163fad312d61e2c77c70\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 565186 b2b16befe390774c0f770cd0350d5a95\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 609026 ca80ea7702aac8a1275ec790944a103e\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 149188 dba6b24f3fccb8fdeb902a5bb504cef0\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 147250 94853c02dc20e1fdeee28886e9f7305d\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 79744 099f436fec0e649ba1ed5f58652cf8bf\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 84136 45554e43d12547077835d6201170771c\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 402960 f166345b039bbd1a6fc2ce9b4b34688a\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 342536 57059512ed5842751d74e9a565f7eec2\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 3812340 0048fed3305831c8e8386983dff67de1\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 5192026 54b566210835793c92f390a8ba9330ee\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-16-powerpc-smp_2.6.31-16.53_powerpc.deb\r\n Size/MD5: 778696 ac1e22e6a4cab2fcdda46f5ec0e44f7a\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-16-powerpc64-smp_2.6.31-16.53_powerpc.deb\r\n Size/MD5: 798248 4ca8d1f42bb308ed493f89b1c2bae59a\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-16-powerpc_2.6.31-16.53_powerpc.deb\r\n Size/MD5: 779670 d034bbd642e72c5b1c82046aaeca60cf\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-16-powerpc-smp_2.6.31-16.53_powerpc.deb\r\n Size/MD5: 24816072 5750fd6003a9ff4e52ef71b160d35f78\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-16-powerpc64-smp_2.6.31-16.53_powerpc.deb\r\n Size/MD5: 25826970 f2616393d03ebc241c15ad373abe24a7\r\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-16-powerpc_2.6.31-16.53_powerpc.deb\r\n Size/MD5: 24655164 f0d2e7732c1ee927f8c8ecc40c050c29\r\n http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.31-16.53_powerpc.deb\r\n Size/MD5: 724426 fc160908eba33700010ee2950599e267\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 271890 0eb05e4797f932e5366297b6e65694ec\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 294594 ba55ad947909f8a12dc2e908a8e9e16c\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 210550 27ed645c98e1c02b16c1d9a8e1d1ddc3\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 216972 f4a4e8bb270ecf136d7b000eb3f599d2\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 25800 bbdc9b4ceb2a7bbfd6e7ba26ad7e24de\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 28984 30afe13ea4ee74b683ca2920e70e19c0\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 315002 7d7aac4b116d227e54da6d1850450e66\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 357746 3b9728ec25f31a98b0773dca1e82e817\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 2027584 5d3c2778b0c48002ebabee346dd44c48\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 2247608 19f6eca7f6a05b56d33254fb56ac96ca\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 213574 196db8eb3ef9b6e5356d566ab5b6e8ef\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 209806 5950c2adc86e4df0c26e2331a65af118\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 210164 59cfbef54d417c72f2dd25a742d664b6\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 244810 5c46a2340f2cc4e922c2fa37cd4f18ca\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 111838 7f6738b2af571e914d9d70ae6cbf28f9\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 131608 bb79aad4f00af9dcfef21549134f6aaf\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 49034 69f72a0deea2e1273b64bc17f033e324\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 44088 1d178cd3bcef112628749882e9103829\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 5848 0faf314df8692394e35954f45aa0aa6d\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 6506 01f5e1746d96d6f86d3bfdff38996e70\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 78780 5a02f6d950b1a5b075f07ceec394aef5\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 84602 397cab612077d45c5eb2ddda534c7801\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 74320 e17da9fa1509479da99d47144d094c5e\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 27228 852c7fa0836589a87eb1d88d0ff05c7a\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 8538 4cc3e8637e2b52084d96803bbaec57a0\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 9818 7a25f3d4cd257003e0592d3363a0d2c9\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 58814 0805944d3d6eef8fb1b96c6bd3c1f512\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 70146 665ccc2165aefc8f5e45b07e79017307\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 23730 1d30532fd77337b3328646f4bfd08f5b\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 30818 ebb9ec306b10177f089bd04dfa445cd5\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 1556922 fb29cda48f271f2aaec192cebc36a99e\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 1509144 36ed69e13bcab5332bdb9bef8130e821\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 81690 5dce76f2d239dcdd660fa456ad79230c\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 88530 27872a5f1b0570e9cd0f3a8ef58d11c0\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 64388 85fd20ff5f8d59b1a72db4f5858177a5\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 77008 534b3392722aae864b5f12ffa7c5612d\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-16-powerpc-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 141270 8fbc608e986eabe480e3d4e0ec283c46\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-16-powerpc64-smp-di_2.6.31-16.53_powerpc.udeb\r\n Size/MD5: 150886 e4e003d93d9cb6f8dc995bc82ab1bff4\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-16-sparc64-di_2.6.31-16.53_sparc.udeb\r\n Size/MD5: 139442 db449d9e66e05862a6cbcc19cead2c8e\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-16-sparc64-di_2.6.31-16.53_sparc.udeb\r\n Size/MD5: 70120 493ae2e44f9b025347bcc1caad2d301c\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-16-sparc64-di_2.6.31-16.53_sparc.udeb\r\n Size/MD5: 46514 2f7812137b6b7e3b66e8f1ec29c0a620\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-16-sparc64-di_2.6.31-16.53_sparc.udeb\r\n Size/MD5: 93980 66f5531eb917c16a384d2c1f1b3c432d\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-16-sparc64-di_2.6.31-16.53_sparc.udeb\r\n Size/MD5: 572222 13a8b6c104c2c9ee155ea26c27245572\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-16-sparc64-di_2.6.31-16.53_sparc.udeb\r\n Size/MD5: 148316 95dd38a1f61ad2c84834d5a712931731\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-16-sparc64-di_2.6.31-16.53_sparc.udeb\r\n Size/MD5: 75858 17e16db718d27ccf11c2f01198886150\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-16-sparc64-di_2.6.31-16.53_sparc.udeb\r\n Size/MD5: 2892430 135cdfe87f7d10d486c777cfa5af5297\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-16-sparc64-smp_2.6.31-16.53_sparc.deb\r\n Size/MD5: 596954 ac010958e1c9b69205a216f53c94f226\r\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-16-sparc64_2.6.31-16.53_sparc.deb\r\n Size/MD5: 595726 9ea69b32d9ffceb9c4653b28f7912089\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-16-sparc64-smp_2.6.31-16.53_sparc.deb\r\n Size/MD5: 20488622 9a289a515f9de4935c66bee671bbe8ab\r\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-16-sparc64_2.6.31-16.53_sparc.deb\r\n Size/MD5: 20185556 cfa14881ceba0726d2c0c63c6947c05a\r\n http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.31-16.53_sparc.deb\r\n Size/MD5: 736544 18ffdfe90df3b94d4e1b05b3085db27e\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-16-sparc64-di_2.6.31-16.53_sparc.udeb\r\n Size/MD5: 266058 7a529388680469f46a89c086241b7b53\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-16-sparc64-di_2.6.31-16.53_sparc.udeb\r\n Size/MD5: 209180 3ca26807f73644f1a05b3920c3bc8811\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-16-sparc64-di_2.6.31-16.53_sparc.udeb\r\n Size/MD5: 26266 3da629ae5770e252d1909cd84431cbbe\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-16-sparc64-di_2.6.31-16.53_sparc.udeb\r\n Size/MD5: 314162 7983479e6afe18838ed72a3174753c56\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-16-sparc64-di_2.6.31-16.53_sparc.udeb\r\n Size/MD5: 1675478 f6d39c90a35b79fd040b52bbf1478704\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-16-sparc64-di_2.6.31-16.53_sparc.udeb\r\n Size/MD5: 222818 e32c0fe4992722f0da2748462a7b2057\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-16-sparc64-di_2.6.31-16.53_sparc.udeb\r\n Size/MD5: 121956 a4cc44e5c2a7c714841c37aefca00ec3\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-16-sparc64-di_2.6.31-16.53_sparc.udeb\r\n Size/MD5: 38800 231f1e448f02a7a7f86e4e3574572381\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-16-sparc64-di_2.6.31-16.53_sparc.udeb\r\n Size/MD5: 100806 b6dbff7d356b38d4996fa2b680cd2393\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-16-sparc64-di_2.6.31-16.53_sparc.udeb\r\n Size/MD5: 8930 420a7ce2591ba2c938b410ff0eeed81b\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-16-sparc64-di_2.6.31-16.53_sparc.udeb\r\n Size/MD5: 62916 2fd3da5dbf807810ca118d594dece6d6\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-16-sparc64-di_2.6.31-16.53_sparc.udeb\r\n Size/MD5: 120986 a64d7dcd2da9ea7ce763c444aeb9532f\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-16-sparc64-di_2.6.31-16.53_sparc.udeb\r\n Size/MD5: 1217922 566834a7a6e003bb44758975d487b5ca\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-16-sparc64-di_2.6.31-16.53_sparc.udeb\r\n Size/MD5: 101340 0fa5b3364e0df9e25ffc37edf080215f\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-16-sparc64-di_2.6.31-16.53_sparc.udeb\r\n Size/MD5: 200096 d19248fc78812e9897455e069d9f4719\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-16-sparc64-di_2.6.31-16.53_sparc.udeb\r\n Size/MD5: 184462 b3f342dd19c09ed89bb410e147268aa9\r\n", "edition": 1, "modified": "2009-12-11T00:00:00", "published": "2009-12-11T00:00:00", "id": "SECURITYVULNS:DOC:22919", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:22919", "title": "[USN-869-1] Linux kernel vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "suse": [{"lastseen": "2016-09-04T11:48:10", "bulletinFamily": "unix", "cvelist": ["CVE-2009-4026", "CVE-2009-3939", "CVE-2009-3621", "CVE-2009-1298", "CVE-2009-4027", "CVE-2009-4005", "CVE-2009-3080", "CVE-2009-3547", "CVE-2009-3624", "CVE-2009-4131", "CVE-2009-4306", "CVE-2009-4308", "CVE-2009-4307", "CVE-2009-4021", "CVE-2009-4138"], "description": "The Linux kernel for openSUSE 11.2 was updated to 2.6.31.8 fixing lots of bugs and several security issues.\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2010-01-07T17:51:27", "published": "2010-01-07T17:51:27", "id": "SUSE-SA:2010:001", "href": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html", "type": "suse", "title": "remote denial of service in kernel", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:36:27", "bulletinFamily": "unix", "cvelist": ["CVE-2009-3556", "CVE-2009-4537", "CVE-2010-0008", "CVE-2009-3939", "CVE-2010-0007", "CVE-2009-4272", "CVE-2009-3621", "CVE-2009-3726", "CVE-2010-0727", "CVE-2009-4141", "CVE-2009-3001", "CVE-2007-4567", "CVE-2009-4027", "CVE-2010-0415", "CVE-2009-3080", "CVE-2009-4538", "CVE-2009-3547", "CVE-2009-4020", "CVE-2009-3620", "CVE-2009-3002", "CVE-2009-4536", "CVE-2010-1188", "CVE-2009-4036", "CVE-2009-4131", "CVE-2009-2908", "CVE-2009-4307", "CVE-2009-3889", "CVE-2009-4021", "CVE-2010-0003", "CVE-2009-3286", "CVE-2009-4138", "CVE-2009-2695", "CVE-2009-2849"], "description": " [2.6.18-194.el5]\n- [net] mlx4: pass attributes down to vlan interfaces (Doug Ledford) [573098]\n- [block] cfq-iosched: fix sequential read perf regression (Jeff Moyer) [571818]\n[2.6.18-193.el5]\n- [fs] gfs2: locking fix for potential dos (Steven Whitehouse) [572390] {CVE-2010-0727}\n- [acpi] power_meter: avoid oops on driver load (Matthew Garrett) [566575]\n- [net] r8169: fix assignments in backported net_device_ops (Ivan Vecera) [568040]\n- [net] virtio_net: refill rx buffer on out-of-memory (Herbert Xu) [554078]\n[2.6.18-192.el5]\n- [cpu] fix amd l3 cache disable functionality (Jarod Wilson) [517586]\n- [misc] backport upstream strict_strto* functions (Jarod Wilson) [517586]\n- [wireless] rt2x00: fix work cancel race conditions (Stanislaw Gruszka) [562972]\n- [net] igb: fix DCA support for 82580 NICs (Stefan Assmann) [513712]\n- Revert: [ia64] kdump: fix a deadlock while redezvousing (Neil Horman) [506694]\n- [block] cfq: kick busy queues w/o waiting for merged req (Jeff Moyer) [570814]\n- [fs] cifs: max username len check in setup does not match (Jeff Layton) [562947]\n- [fs] cifs: CIFS shouldnt make mountpoints shrinkable (Jeff Layton) [562947]\n- [fs] cifs: fix dentry hash for case-insensitive mounts (Jeff Layton) [562947]\n- [fs] cifs: fix len for converted unicode readdir names (Jeff Layton) [562947]\n- [x86_64] xen: fix missing 32-bit syscalls on 64-bit Xen (Christopher Lalancette) [559410]\n- [fs] gfs2: fix kernel BUG when using fiemap (Abhijith Das) [569610]\n- [net] sctp: backport cleanups for ootb handling (Neil Horman) [555667] {CVE-2010-0008}\n- [xen] vtd: ignore unknown DMAR entries (Don Dugger) [563900]\n[2.6.18-191.el5]\n- [wireless] iwlwifi: fix dual band N-only use on 5x00 (Stanislaw Gruszka) [566696]\n- [net] be2net: critical bugfix from upstream (Ivan Vecera) [567718]\n- [net] tg3: fix 5717 and 57765 asic revs panic under load (John Feeney) [565964]\n- [net] bnx2x: use single tx queue (Stanislaw Gruszka) [567979]\n- [net] igb: fix WoL initialization when disabled in eeprom (Stefan Assmann) [564102]\n- [net] igb: fix warning in igb_ethtool.c (Stefan Assmann) [561076]\n- [net] s2io: restore ability to tx/rx vlan traffic (Neil Horman) [562732]\n- [net] ixgbe: stop unmapping DMA buffers too early (Andy Gospodarek) [568153]\n- [net] e1000e: disable NFS filtering capabilites in ICH hw (Andy Gospodarek) [558809]\n- [net] bnx2: update firmware and version to 2.0.8 (Andy Gospodarek) [561578]\n- [net] mlx4: fix broken SRIOV code (Doug Ledford) [567730]\n- [net] mlx4: pass eth attributes down to vlan interfaces (Doug Ledford) [557109]\n- [x86_64] fix missing 32 bit syscalls on 64 bit (Wade Mealing) [559410]\n- [s390] zcrypt: Do not remove coprocessor on error 8/72 (Hendrik Brueckner) [561067]\n- [misc] usb-serial: add support for Qualcomm modems (Pete Zaitcev) [523888]\n- [scsi] mpt2sas: fix missing initialization (Tomas Henzl) [565637]\n- [i386] mce: avoid deadlocks during MCE broadcasts (Prarit Bhargava) [562862]\n- [x86_64] k8: do not mark early_is_k8_nb as __init (Paolo Bonzini) [567275]\n- [ia64] kdump: fix a deadlock while redezvousing (Neil Horman) [506694]\n- [dm] raid45: constructor error path oops fix (Heinz Mauelshagen) [565494]\n- [mm] prevent severe performance degradation hang fix (Dave Anderson) [544448]\n- [net] cxgb3: memory barrier addition fixup (Steve Best) [561957]\n[2.6.18-190.el5]\n- [x86_64] mce: avoid deadlocks during MCE broadcasts (Prarit Bhargava) [562866]\n- [scsi] device_handler: add netapp to alua dev list (Mike Christie) [562080]\n- [misc] wacom: add Intuos4 support (Don Zickus) [502708]\n- [scsi] be2iscsi: fix eh bugs and enable new hw support (Mike Christie) [564145]\n- [net] ixgbe: initial support of ixgbe PF and VF drivers (Andy Gospodarek) [525577]\n- [fs] ext4: avoid divide by 0 when mounting corrupted fs (Eric Sandeen) [547253]\n- [net] bnx2x: update to 1.52.1-6 firmware (Stanislaw Gruszka) [560556]\n- [net] bnx2x: update to 1.52.1-6 (Stanislaw Gruszka) [560556]\n- [misc] hvc_iucv: alloc send/receive buffers in DMA zone (Hendrik Brueckner) [566202]\n- [net] ixgbe: prevent speculatively processing descriptors (Steve Best) [566309]\n- [fs] fix randasys crashes x86_64 systems regression (Peter Bogdanovic) [562857]\n- [scsi] fix bugs in fnic and libfc (Mike Christie) [565594]\n- [net] tg3: fix 57765 LED (John Feeney) [566016]\n- [net] tg3: fix race condition with 57765 devices (John Feeney) [565965]\n- [fs] gfs2: use correct GFP for alloc page on write (Steven Whitehouse) [566221]\n- [scsi] lpfc: update version for 8.2.0.63.3p release (Rob Evers) [564506]\n- [scsi] lpfc: fix driver build issues in rhel5.5 (Rob Evers) [564506]\n- [scsi] lpfc: relax event queue field checking (Rob Evers) [564506]\n- [scsi] lpfc: implement the PORT_CAPABITIES mailbox cmd (Rob Evers) [564506]\n- [scsi] lpfc: fix a merge issue (Rob Evers) [564506]\n- [scsi] lpfc: Add support for new SLI features (Rob Evers) [564506]\n- [scsi] lpfc: Add support for 64-bit PCI BAR region 0 (Rob Evers) [564506]\n- [nfs] fix a deadlock in the sunrpc code (Steve Dickson) [548846]\n- [fs] ecryptfs: fix metadata in xattr feature regression (Eric Sandeen) [553670]\n- [scsi] qla2xxx: return FAILED if abort command fails (Rob Evers) [559972]\n- [virtio] fix module loading for virtio-balloon module (Anthony Liguori) [564361]\n- [mm] xen: make mmap() with PROT_WRITE (Andrew Jones) [562761]\n- [hwmon] w83627hf: fix data to platform_device_add_data (Dean Nelson) [557172]\n- [hwmon] smsc47m1: fix data to platform_device_add_data (Dean Nelson) [560944]\n- [hwmon] it87: fix sio_data to platform_device_add_data (Dean Nelson) [559950]\n- [hwmon] f71805f: fix sio_data to platform_device_add_data (Dean Nelson) [564399]\n- [base] make platform_device_add_data accept const pointer (Dean Nelson) [557172 559950 560944 564399]\n- [net] forcedeth: fix putting system into S4 (Matthew Garrett) [513203]\n- [net] netfilter: allow changing queue length via netlink (Steve Best) [562945]\n- [mm] i386: fix iounmaps use of vm_structs size field (Danny Feng) [549465]\n- [ppc] fix sched while atomic error in alignment handler (Steve Best) [543637]\n- [pci] aer: disable advanced error reporting by default (Prarit Bhargava) [559978]\n- [s390] qeth: set default BLKT settings by OSA hw level (Hendrik Brueckner) [559621]\n- [net] e1000e: fix deadlock unloading module on some ICH8 (Andy Gospodarek) [555818]\n- [misc] rwsem: fix a bug in rwsem_is_locked() (Amerigo Wang) [526092]\n- [s390] clear high-order bits after switch to 64-bit mode (Hendrik Brueckner) [546302]\n[2.6.18-189.el5]\n- [net] wireless fixes from 2.6.32.7 (John Linville) [559711]\n- [net] wireless fixes from 2.6.32.4 (John Linville) [559711]\n- [net] wireless fixes through 2.6.32.3 (John Linville) [559711]\n- [net] wireless fixes from 2.6.32.2 (John Linville) [559711]\n[2.6.18-188.el5]\n- [net] be2net: latest bugfixes from upstream for rhel5.5 (Ivan Vecera) [561322]\n- [infiniband] fix bitmask handling from QP control block (Steve Best) [561953]\n- [infiniband] fix issue w/sleep in interrupt ehca handler (Steve Best) [561952]\n- [char] ipmi: fix ipmi_watchdog deadlock (Tony Camuso) [552675]\n- [net] cnic: additional fixes for rhel5.5 update (Mike Christie) [517378]\n- [net] cxgb3: add memory barriers (Steve Best) [561957]\n- [fs] nfsv4: distinguish expired from stale stateid (Wade Mealing) [514654]\n- [net] igb: fix msix_other interrupt masking (Stefan Assmann) [552348]\n- [net] niu: fix deadlock when using bonding (Andy Gospodarek) [547943]\n- [x86] xen: invalidate dom0 pages before starting guest (Christopher Lalancette) [466681]\n- [cpufreq] powernow-k8: fix crash on AMD family 0x11 procs (Bhavna Sarathy) [555180]\n- [misc] ptrace: PTRACE_KILL hangs in 100% cpu loop (Vitaly Mayatskikh) [544138]\n- [scsi] megaraid: fix 32-bit apps on 64-bit kernel (Tomas Henzl) [518243]\n- [misc] fix APIC and TSC reads for guests (Prarit Bhargava) [562006]\n- [mm] fix sys_move_pages infoleak (Eugene Teo) [562590] {CVE-2010-0415}\n- [fs] aio: fix .5% OLTP perf regression from eventfd (Jeff Moyer) [548565]\n- [net] sky2: fix initial link state errors (Andy Gospodarek) [559329]\n- [x86_64] wire up compat sched_rr_get_interval (Danny Feng) [557092]\n- [net] netfilter: enforce CAP_NET_ADMIN in ebtables (Danny Feng) [555243] {CVE-2010-0007}\n- [misc] fix kernel info leak with print-fatal-signals=1 (Danny Feng) [554584] {CVE-2010-0003}\n- [fs] gfs2: dont withdraw on partial rindex entries (Benjamin Marzinski) [553447]\n- [net] ipv6: fix OOPS in ip6_dst_lookup_tail (Thomas Graf) [552354]\n- [misc] khungtaskd: set PF_NOFREEZE flag to fix suspend (Amerigo Wang) [550014]\n- [block] loop: fix aops check for GFS (Josef Bacik) [549397]\n[2.6.18-187.el5]\n- [misc] EDAC driver fix for non-MMCONFIG systems (Bhavna Sarathy) [550123]\n- [misc] audit: fix breakage and leaks in audit_tree.c (Alexander Viro) [549750]\n- [mm] prevent hangs during memory reclaim on large systems (Larry Woodman) [546428]\n- [usb] support more Huawei modems (Pete Zaitcev) [517454]\n- [x86] fix AMD M-C boot inside xen on pre-5.5 hypervisor (Paolo Bonzini) [560013]\n- [kvm] pvclock on i386 suffers from double registering (Glauber Costa) [557095]\n- [md] fix kernel panic releasing bio after recovery failed (Takahiro Yasui) [555171]\n- [md] fix deadlock at suspending mirror device (Takahiro Yasui) [555120]\n- [pci] VF cant be enabled in dom0 (Don Dutile) [547980]\n- [acpi] fix NULL pointer panic in acpi_run_os (Prarit Bhargava) [547733]\n- [kvm] kvmclock wont restore properly after resume (Glauber Costa) [539521]\n- [x86_64] export additional features in cpuinfo for xen (Prarit Bhargava) [517928]\n- [fs] proc: make smaps readable even after setuid (Dave Anderson) [322881]\n- [net] iptables: fix routing of REJECT target packets (Jiri Olsa) [548079]\n- [net] niu: fix the driver to be functional with vlans (Jiri Pirko) [538649]\n- [mm] prevent performance hit for 32-bit apps on x86_64 (Larry Woodman) [544448]\n- [mm] mmap: dont ENOMEM when mapcount is temp exceeded (Danny Feng) [552648]\n- [fs] proc: make errno values consistent when race occurs (Danny Feng) [556545]\n- [net] igb: update driver to support End Point DCA (Stefan Assmann) [513712]\n- [scsi] qla2xxx: FCP2 update, dpc bug, fast mailbox read (Rob Evers) [550286]\n- [scsi] qla2xxx: fix timeout value for CT passthru cmds (Rob Evers) [552327]\n- [scsi] lpfc: update to version 8.2.0.63.p2 (Rob Evers) [557792]\n- [scsi] lpfc: update driver to version 8.2.0.63.1p FC/FCoE (Rob Evers) [555604]\n- [scsi] be2iscsi: upstream driver refresh for rhel5.5 (Mike Christie) [554545]\n- [pci] add ids for intel b43 graphics controller (John Villalovos) [523637]\n- [misc] support Nehalem-EX processors in Oprofile (John Villalovos) [521992]\n- [scsi] scsi_dh: make rdac hw handlers activate() async (Rob Evers) [537514]\n- [scsi] scsi_dh: change scsidh_activate interface to async (Rob Evers) [537514]\n- [alsa] support Creative X-Fi EMU20K1 and EMU20K2 chips (Jaroslav Kysela) [523786]\n- [net] tg3: update to version 3.106 for 57765 asic support (John Feeney) [545135]\n- [net] bonding: fix alb mode locking regression (Andy Gospodarek) [533496]\n- [scsi] stex: dont try to scan a nonexistent lun (David Milburn) [531488]\n- [scsi] bnx2i: additional fixes for rhel5.5 update (Mike Christie) [517378]\n- [misc] hpilo: fix build warning in ilo_isr (Tony Camuso) [515010]\n- [scsi] qla2xxx: add AER support (Rob Evers) [513927]\n- [x86] relocate initramfs so we can increase vmalloc space (Neil Horman) [499253]\n- [mm] memory mapped files not updating timestamps (Peter Staubach) [452129]\n[2.6.18-186.el5]\n- [net] emergency route cache flushing fixes (Thomas Graf) [545663] {CVE-2009-4272}\n- [fs] fasync: split 'fasync_helper()' into separate add/remove functions (Danny Feng) [548657] {CVE-2009-4141}\n- [scsi] qla2xxx: NPIV vport management pseudofiles are world writable (Tom Coughlan) [537318] {CVE-2009-3556}\n- [net] ipv6: fix ipv6_hop_jumbo remote system crash (Amerigo Wang) [548643] {CVE-2007-4567}\n- [net] e1000e: fix broken wol (Andy Gospodarek) [557974]\n- [net] r8169: add missing hunk from frame length filtering fix (Jarod Wilson) [552438]\n[2.6.18-185.el5]\n- [net] e1000e: fix rx length check errors (Amerigo Wang) [551223] {CVE-2009-4538}\n- [net] e1000: fix rx length check errors (Neil Horman) [552138] {CVE-2009-4536}\n- [net] r8169: improved frame length filtering (Neil Horman) [550915] {CVE-2009-4537}\n- kabi: fix dma_async_register symbol move (Jarod Wilson) [526342]\n- [kabi] add {napi,vlan}_gro_receive and intel dca symbols (Jon Masters) [526342]\n- Revert: amd64_edac: fix access to pci conf space type 1 (Jarod Wilson) [479070]\n[2.6.18-184.el5]\n- [scsi] lpfc: Update lpfc to version 8.2.0.63 driver release (Rob Evers) [549763]\n- [scsi] lpfc: Fix single SCSI buffer not handled on SLI4 (Rob Evers) [549763]\n- [scsi] lpfc: Fix Dead FCF not triggering discovery others (Rob Evers) [549763]\n- [scsi] lpfc: Fix vport->fc_flag set outside of lock fail (Rob Evers) [549763]\n- [scsi] lpfc: Fix processing of failed read fcf record (Rob Evers) [549763]\n- [scsi] lpfc: Fix fc header seq_count checks (Rob Evers) [549763]\n- [scsi] lpfc: Update to version 8.2.0.62 driver release (Rob Evers) [549763]\n- [scsi] lpfc: Fix hbq buff only for sli4 (Rob Evers) [549763]\n- [scsi] lpfc: Fix hbq buff adds to receive queue (Rob Evers) [549763]\n- [scsi] lpfc: Fix multi-frame sequence response frames (Rob Evers) [549763]\n- [scsi] lpfc: Fix adapter reset and off/online stress test (Rob Evers) [549763]\n- [scsi] lpfc: Update to version 8.2.0.61 driver release (Rob Evers) [549763]\n- [scsi] lpfc: Fix vport register VPI after devloss timeout (Rob Evers) [549763]\n- [scsi] lpfc: Fix crash during unload and sli4 abort cmd (Rob Evers) [549763]\n- [scsi] lpfc: Blocked all SCSI I/O requests from midlayer (Rob Evers) [549763]\n- [scsi] lpfc: Made TigerShark set up and use single FCP EQ (Rob Evers) [549763]\n- [scsi] lpfc: Update to 8.2.0.60 driver release (Rob Evers) [549763]\n- [scsi] lpfc: Fix vport not logging out when being deleted (Rob Evers) [549763]\n- [net] fixup problems with vlans and bonding (Andy Gospodarek) [526976]\n- [net] ixgbe: upstream update to include 82599-KR support (Andy Gospodarek) [513707]\n- [net] enic: update to upstream version 1.1.0.241a (Andy Gospodarek) [550148]\n- [net] be2net: multiple bug fixes (Ivan Vecera) [549460]\n- [net] virtio_net: fix tx wakeup race condition (Herbert Xu) [524651]\n- [net] add send/receive tracepoints (Neil Horman) [475457]\n- [iscsi] fix install panic w/xen iSCSI boot device (Miroslav Rezanina) [512991]\n- Revert: [mm] SRAT and NUMA fixes for span and/or is disc (Larry Woodman) [474097]\n- [misc] oprofile support for nehalme ep processors (John Villalovos) [498624]\n- [scsi] fix duplicate libiscsi symbol and kabi warnings (Jarod Wilson) [515284]\n- [edac] amd64_edac: fix access to pci conf space type 1 (Bhavna Sarathy) [479070]\n- [misc] do not evaluate WARN_ON condition twice (Hendrik Brueckner) [548653]\n- [xen] fix cpu frequency scaling on Intel procs (Christopher Lalancette) [553324]\n- [xen] passthrough MSI-X mask bit acceleration V3 (Don Dugger) [537734]\n- [xen] change interface of hvm_mmio_access V3 (Don Dugger) [537734]\n- [xen] fix msix table fixmap allocation V3 (Don Dugger) [537734]\n[2.6.18-183.el5]\n- [kabi] add scsi_dma_{,un}map (Jon Masters) [533489]\n- [kabi] add scsi_nl_{send_vendor_msg,{add,remove}_driver} (Jon Masters) [515812]\n- [kabi] add do_settimeofday and __user_walk_fd (Jon Masters) [486205]\n- [kabi] add pci_domain_nr (Jon Masters) [450121]\n- [sound] alsa hda driver update for rhel5.5 (Jaroslav Kysela) [525390]\n- Revert: [pci] avoid disabling acpi to use non-core PCI (Mauro Carvalho Chehab) [504330 547898]\n- [net] wireless: fix build when using O=objdir (John Linville) [546712]\n- [pci] remove msi-x vector allocation limitation (Stefan Assmann) [531266]\n- [net] vxge: avoid netpollNAPI race (Michal Schmidt) [453683]\n- [scsi] update fcoe for rhel5.5 (Mike Christie) [526259]\n- [net] update tg3 driver to version 3.100 (John Feeney) [515312]\n- [block] fix rcu accesses in partition statistics code (Jerome Marchand) [493517]\n- [pci] enable acs p2p upstream forwarding (Chris Wright) [518305]\n- [net] e1000e: support for 82567V-3 and MTU fixes (Andy Gospodarek) [513706]\n- [pci] aer hest disable support (Prarit Bhargava) [547762]\n- [pci] aer hest firmware first support (Prarit Bhargava) [547762]\n- [block] iosched: fix batching fairness (Jeff Moyer) [462472]\n- [block] iosched: reset batch for ordered requests (Jeff Moyer) [462472]\n- [net] bonding: allow arp_ip_targets on separate vlan from bond device (Andy Gospodarek) [526976]\n- [firewire] ohci: handle receive packets with zero data (Jay Fenlason) [547242] {CVE-2009-4138}\n- [drm] intel: add IRONLAKE support to AGP/DRM drivers (Dave Airlie) [547908]\n- [xen] mask AMDs Node ID MSR (Andrew Jones) [547518]\n- Revert: [xen] fix msi-x table fixmap allocation (Don Dugger) [537734]\n- Revert: [xen] change interface of hvm_mmio_access (Don Dugger) [537734]\n- Revert: [xen] passthrough msi-x mask bit acceleration (Don Dugger) [537734]\n[2.6.18-182.el5]\n- [x86_64] disable vsyscall in kvm guests (Glauber Costa) [542612]\n- [fs] ext3: replace lock_super with explicit resize lock (Eric Sandeen) [525100]\n- [net] bonding: add debug module option (Jiri Pirko) [546624]\n- [fs] respect flag in do_coredump (Danny Feng) [544189] {CVE-2009-4036}\n- [md] fix a race in dm-raid1 (Mikulas Patocka) [502927]\n- [misc] timer: add tracepoints (Jason Baron) [534178]\n- [net] ipv4: fix possible invalid memory access (Prarit Bhargava) [541213]\n- [x86] support AMD L3 cache index disable (Bhavna Sarathy) [517586]\n- [scsi] add emc clariion support to scsi_dh modules (Mike Christie) [437107]\n- [infiniband] fix iser sg aligment handling (Mike Christie) [540686]\n- [scsi] qla2xxx: CT passthrough and link data rate fixes (Marcus Barrow) [543057]\n- [scsi] qla2xxx: update to 8.03.01.04.05.05-k (Marcus Barrow) [542834]\n- [net] s2io: update driver to current upstream version (Michal Schmidt) [513942]\n- [ia64] export cpu_core_map (like i386 and x86_64) (Michal Schmidt) [448856]\n- [net] sfc: additional fixes for rhel5.5 (Michal Schmidt) [448856]\n- [redhat] configs: enable building of the sfc driver (Michal Schmidt) [448856]\n- [net] sfc: add the sfc (Solarflare) driver (Michal Schmidt) [448856]\n- [net] vxge: driver update to 2.0.6 (Michal Schmidt) [453683]\n- [scsi] ibmvscsi: upstream multipath enhancements for 5.5 (Kevin Monroe) [512203]\n[2.6.18-181.el5]\n- [vfs] DIO write returns -EIO on try_to_release_page fail (Jeff Moyer) [461100]\n- [wireless] enable use of internal regulatory database (John Linville) [546712]\n- [wireless] add wireless regulatory rules database (John Linville) [546712]\n- [wireless] use internal regulatory database infrastructure (John Linville) [546712]\n- [wireless] update old static regulatory domain rules (John Linville) [543723]\n- [net] wireless: report reasonable bitrate for 802.11n (John Linville) [546281]\n- [net] mac80211: report correct signal for non-dBm values (John Linville) [545899]\n- [net] wireless: kill some warning spam (John Linville) [545121]\n- [net] mac80211: avoid uninit ptr deref in ieee80211 (John Linville) [545121]\n- [net] wireless: avoid deadlock when enabling rfkill (John Linville) [542593]\n- [wireless] configuration changes for updates (John Linville) [456943 474328 514661 516859]\n- [net] ath9k: backport driver from 2.6.32 (John Linville) [456943]\n- [net] wireless: updates of mac80211 etc from 2.6.32 (John Linville) [474328 514661 516859]\n- [net] wireless support updates from 2.6.32 (John Linville) [456943 474328 514661 516859]\n- [net] bnx2: update to version 2.0.2 (John Feeney) [517377]\n- [usb] support lexar expresscard (Pete Zaitcev) [511374]\n- [net] cnic: update driver for RHEL5.5 (Stanislaw Gruszka) [517378]\n- [net] bnx2x: update to 1.52.1-5 (Stanislaw Gruszka) [515716 522600]\n- [net] bnx2x: add mdio support (Stanislaw Gruszka) [515716 522600]\n- [net] bnx2x: add firmware version 5.2.7.0 (Stanislaw Gruszka) [515716 522600]\n- [net] bnx2x: update to 1.52.1 (Stanislaw Gruszka) [515716 522600]\n- [fs] make NR_OPEN tunable (Eric Sandeen) [507159]\n- [net] mdio: add mdio module from upstream (Michal Schmidt) [448856]\n- [net] ethtool: add more defines for mdio to use (Michal Schmidt) [448856]\n- [pci] add and export pci_clear_master (Michal Schmidt) [448856]\n- [mm] SRAT and NUMA fixes for span and/or is discontig mem (Larry Woodman) [474097]\n- [fs] eventfd: remove fput call from possible IRQ context (Jeff Moyer) [493101]\n- [fs] eventfd: kaio integration fix (Jeff Moyer) [493101]\n- [fs] eventfd: sanitize anon_inode_getfd() (Jeff Moyer) [493101]\n(Jeff Moyer) [493101]\n- [fs] eventfd: clean compile when CONFIG_EVENTFD=n (Jeff Moyer) [493101]\n- [s390] wire up signald, timerfd and eventfd syscalls (Jeff Moyer) [493101]\n- [fs] eventfd: use waitqueue lock (Jeff Moyer) [493101]\n- [ppc] wire up eventfd syscalls (Jeff Moyer) [493101]\n- [ia64] wire up {signal, timer, event}fd syscalls (Jeff Moyer) [493101]\n- [fs] aio: KAIO eventfd support example (Jeff Moyer) [493101]\n- [fs] eventfd: wire up x86 arches (Jeff Moyer) [493101]\n- [fs] add eventfd core (Jeff Moyer) [493101]\n- [net] r8169: update to latest upstream for rhel5.5 (Ivan Vecera) [540582]\n- [net] benet: update driver to latest upstream for rhel5.5 (Ivan Vecera) [515269]\n- [net] e1000e: update and fix WOL issues (Andy Gospodarek) [513706 513930 517593 531086]\n- [net] e1000: update to latest upstream for rhel5.5 (Dean Nelson) [515524]\n- [net] mlx4: update to recent version with SRIOV support (Doug Ledford) [503113 512162 520674 527499 529396 534158]\n- [md] raid: deal with soft lockups during resync (Doug Ledford) [501075]\n- [x86] amd: add node ID MSR support (Bhavna Sarathy) [530181]\n- [net] ipv4: fix an unexpectedly freed skb in tcp (Amerigo Wang) [546402]\n[2.6.18-180.el5]\n- [fs] ext4: fix insufficient checks in EXT4_IOC_MOVE_EXT (Eric Sandeen) [546105] {CVE-2009-4131}\n- [fs] fix possible inode corruption on unlock (Eric Sandeen) [545612]\n- [fs] xfs: fix fallocate error return sign (Eric Sandeen) [544349]\n- [net] bnx2: fix frags index (Flavio Leitner) [546326]\n- [pci] implement public pci_ioremap_bar function (Prarit Bhargava) [546244]\n- [trace] add coredump tracepoint (Masami Hiramatsu) [517115]\n- [trace] add signal tracepoints (Masami Hiramatsu) [517121]\n- [trace] add itimer tracepoints (Jason Baron) [534178]\n- [gfs2] make O_APPEND behave as expected (Steven Whitehouse) [544342]\n- [gfs2] fix rename locking issue (Steven Whitehouse) [538484]\n- [usb] add quirk for iso on amd sb800 (Pete Zaitcev) [537433]\n- [mm] add kernel pagefault tracepoint for x86 & x86_64 (Larry Woodman) [517133]\n- [ia64] dma_get_required_mask altix workaround (George Beshers) [517192]\n- [misc] sysctl: require CAP_SYS_RAWIO to set mmap_min_addr (Amerigo Wang) [534018]\n- [pci] intel-iommu: no pagetable validate in passthru mode (Don Dutile) [518103]\n- [pci] intel-iommu: set dmar_disabled when DMAR at zero (Don Dutile) [516811 518103]\n- [pci] dmar: rhsa entry decode (Don Dutile) [516811 518103]\n- [pci] intel-iommu: add hot (un)plug support (Don Dutile) [516811 518103]\n- [pci] inte-iommu: alloc_coherent obey coherent_dma_mask (Don Dutile) [516811 518103]\n- [pci] dmar: check for DMAR at zero BIOS error earlier (Don Dutile) [516811 518103]\n- [pci] intel-iommu: fix for isoch dmar w/no tlb space (Don Dutile) [516811 518103]\n- [pci] intel-iommu: add 2.6.32-rc4 sw and hw pass-through (Don Dutile) [516811 518103]\n- [pci] intel-iommu: IOTLB flushing mods & ATSR support (Don Dutile) [516811 518103]\n- [aio] implement request batching (Jeff Moyer) [532769]\n- [net] netxen: further p3 updates for rhel5.5 (Marcus Barrow) [542746]\n- [net] netxen: driver updates from 2.6.32 (Marcus Barrow) [516833]\n- [net] netxen: driver updates from 2.6.31 (Marcus Barrow) [516833]\n- [xen] passthrough msi-x mask bit acceleration (Don Dugger) [537734]\n- [xen] change interface of hvm_mmio_access (Don Dugger) [537734]\n- [xen] fix msi-x table fixmap allocation (Don Dugger) [537734]\n- [xen] fix w/sata set to ide combined mode on amd (Bhavna Sarathy) [544021]\n- [xen] domU irq ratelimiting (Don Dugger) [524747]\n[2.6.18-179.el5]\n- [scsi] st: display current settings of option bits (Tom Coughlan) [501030]\n- [pci] AER: prevent errors being reported multiple times (Prarit Bhargava) [544923]\n- [cifs] NULL out pointers when chasing DFS referrals (Jeff Layton) [544417]\n- [fbfront] xenfb: dont recreate thread on every restore (Christopher Lalancette) [541325]\n- [net] igb: update igb driver to support barton hills (Stefan Assmann) [513710]\n- [fs] hfs: fix a potential buffer overflow (Amerigo Wang) [540741] {CVE-2009-4020}\n- [fuse] prevent fuse_put_request on invalid pointer (Danny Feng) [538737] {CVE-2009-4021}\n- [scsi] lpfc: update version from 8.2.0.58 to 8.2.0.59 (Rob Evers) [529244]\n- [scsi] lpfc: update version from 8.2.0.55 to 8.2.0.58 (Rob Evers) [516541 529244]\n- [scsi] lpfc: update version from 8.2.0.52 to 8.2.0.55 (Rob Evers) [529244]\n- [scsi] pmcraid: minor driver update for rhel5.5 (Rob Evers) [529979]\n- [scsi] add pmcraid driver (Rob Evers) [529979]\n- [scsi] bfa: brocade bfa fibre-channel/fcoe driver (Rob Evers) [475695]\n- [md] support origin size < chunk size (Mikulas Patocka) [502965]\n- [md] lock snapshot while reading status (Mikulas Patocka) [543307]\n- [md] fix deadlock in device mapper multipath (Mikulas Patocka) [543270]\n- [md] raid5: mark cancelled readahead bios with -EIO (Eric Sandeen) [512552]\n- [fs] ext2: convert to new aops (Josef Bacik) [513136]\n- [fs] jbd: fix race in slab creation/deletion (Josef Bacik) [496847]\n- [net] enic: update to upstream version 1.1.0.100 (Andy Gospodarek) [519086]\n- [scsi] megaraid: make driver legacy I/O port free (Tomas Henzl) [515863]\n- [scsi] megaraid: upgrade to version 4.17-RH1 (Tomas Henzl) [518243]\n- [net] ipvs: synchronize closing of connections (Danny Feng) [492942]\n- [fs] dlm: fix connection close handling (David Teigland) [521093]\n- [hwmon] add support for syleus chip to fschmd driver (Dean Nelson) [513101]\n- [s390] dasd: fix DIAG access for read-only devices (Hendrik Brueckner) [537859]\n- [acpi] backport support for ACPI 4.0 power metering (Matthew Garrett) [514923]\n- [scsi] mpt2sas: use selected regions (Tomas Henzl) [516702]\n- [scsi] mpt2sas: upgrade to 01.101.06.00 (Tomas Henzl) [516702]\n- [block] blktrace: only tear down our own debug/block (Eric Sandeen) [498489]\n- Revert: [scsi] fix inconsistent usage of max_lun (David Milburn) [531488]\n[2.6.18-178.el5]\n- [x86] fix stale data in shared_cpu_map cpumasks (Prarit Bhargava) [541953]\n- [mm] call vfs_check_frozen after unlocking the spinlock (Amerigo Wang) [541956]\n- [md] fix data corruption with different chunksizes (Mikulas Patocka) [210490]\n- [md] fix snapshot crash on invalidation (Mikulas Patocka) [461506]\n- [net] cxgb3: fix port index issue (Doug Ledford) [516948]\n- [net] cxgb3: correct hex/decimal error (Doug Ledford) [516948]\n- [net] mlx4_en: add a pci id table (Doug Ledford) [508770]\n- [infiniband] null out skb pointers on error (Doug Ledford) [531784]\n- [infiniband] init neigh->dgid.raw on bonding events (Doug Ledford) [538067]\n- [nfs] add an nfsiod workqueue (Ian Kent) [489931]\n- [nfs] nfsiod: ensure the asynchronous RPC calls complete (Ian Kent) [489931]\n- [nfs] sunrpc: allow rpc_release() CB run on another workq (Ian Kent) [489931]\n- [nfs] fix a deadlock with lazy umount -2 (Ian Kent) [489931]\n- [nfs] fix a deadlock with lazy umount (Ian Kent) [489931]\n- [fs] ext3/4: free journal buffers (Eric Sandeen) [506217]\n- [net] resolve issues with vlan creation and filtering (Andy Gospodarek) [521345]\n- [scsi] stex: update driver for RHEL-5.5 (David Milburn) [516881]\n- [scsi] be2iscsi: add driver to generic config (Mike Christie) [515284]\n- [scsi] add be2iscsi driver (Mike Christie) [515284]\n- [fs] ext4: update to 2.6.32 codebase (Eric Sandeen) [528054]\n- [scsi] disable state transition from OFFLINE to RUNNING (Takahiro Yasui) [516934]\n- [scsi] fusion: update mpt driver to 3.4.13rh (Tomas Henzl) [516710]\n- [net] gro: fix illegal merging of trailer trash (Herbert Xu) [537876]\n[2.6.18-177.el5]\n- [scsi] gdth: prevent negative offsets in ioctl (Amerigo Wang) [539421] {CVE-2009-3080}\n- [net] ixgbe: add and enable CONFIG_IXGBE_DCA (Andy Gospodarek) [514306]\n- [net] ixgbe: update to upstream version 2.0.44-k2 (Andy Gospodarek) [513707 514306 516699]\n- [cifs] duplicate data on appending to some samba servers (Jeff Layton) [500838]\n- [s390] kernel: fix single stepping on svc0 (Hendrik Brueckner) [540527]\n- [fs] gfs2: fix glock ref count issues (Steven Whitehouse) [539240]\n- [vbd] xen: fix crash after ballooning (Christopher Lalancette) [540811]\n- [block] cfq-iosched: get rid of cfqq hash (Jeff Moyer) [427709 448130 456181]\n- [scsi] devinfo update for hitachi entries for RHEL5.5 (Takahiro Yasui) [430631]\n- [net] call cond_resched in rt_run_flush (Amerigo Wang) [517588]\n- [cifs] update cifs version number (Jeff Layton) [500838]\n- [cifs] avoid invalid kfree in cifs_get_tcp_session (Jeff Layton) [500838]\n- [cifs] fix broken mounts when a SSH tunnel is used (Jeff Layton) [500838]\n- [cifs] fix memory leak in ntlmv2 hash calculation (Jeff Layton) [500838]\n- [cifs] fix potential NULL deref in parse_DFS_referrals (Jeff Layton) [500838]\n- [cifs] fix read buffer overflow (Jeff Layton) [500838]\n- [cifs] free nativeFileSystem before allocating new one (Jeff Layton) [500838]\n- [cifs] add addr= mount option alias for ip= (Jeff Layton) [500838]\n- [cifs] copy struct *after* setting port, not before (Jeff Layton) [500838]\n- [cifs] fix artificial limit on reading symlinks (Jeff Layton) [500838]\n- [scsi] megaraid: fix sas permissions in sysfs (Casey Dahlin) [537313] {CVE-2009-3889 CVE-2009-3939}\n- [cpufreq] avoid playing with cpus_allowed in powernow-k8 (Alex Chiang) [523505]\n- [cpufreq] change cpu freq arrays to per_cpu variables (Alex Chiang) [523505]\n- [cpufreq] powernow-k8: get drv data for correct cpu (Alex Chiang) [523505]\n- [cpufreq] x86: change NR_CPUS arrays in powernow-k8 (Alex Chiang) [523505]\n- [cifs] fix error handling in mount-time dfs referral code (Jeff Layton) [513410]\n- [cifs] add loop check when mounting dfs tree (Jeff Layton) [513410]\n- [cifs] fix some build warnings (Jeff Layton) [513410]\n- [cifs] fix build when dfs support not enabled (Jeff Layton) [513410]\n- [cifs] remote dfs root support (Jeff Layton) [513410]\n- [cifs] enable dfs submounts to handle remote referrals (Jeff Layton) [513410]\n- [edac] i3200_edac: backport driver to RHEL 5.5 (Mauro Carvalho Chehab) [469976]\n- [edac] add upstream i3200_edac driver (Mauro Carvalho Chehab) [469976]\n- [cifs] no CIFSGetSrvInodeNumber in is_path_accessible (Jeff Layton) [529431]\n- [block] blktrace: correctly record block to and from devs (Jason Baron) [515551]\n- [sched] enable CONFIG_DETECT_HUNG_TASK support (Amerigo Wang) [506059]\n- [xen] fix SRAT check for discontiguous memory (Christopher Lalancette) [519225]\n- [xen] implement fully preemptible page table teardown (Christopher Lalancette) [510037]\n[2.6.18-176.el5]\n- [xen] mask extended topo cpuid feature (Andrew Jones ) [533292]\n- [fs] pipe.c null pointer dereference (Jeff Moyer ) [530939] {CVE-2009-3547}\n- [xen] cd-rom drive does not recognize new media (Miroslav Rezanina ) [221676]\n- [nfs] fix stale nfs_fattr passed to nfs_readdir_lookup (Harshula Jayasuriya ) [531016]\n- [spec] s390: enable kernel module signing (Don Zickus ) [483665]\n- [nfs] bring nfs4acl into line with mainline code (Jeff Layton ) [479870 530575]\n- [ia64] kdump: restore registers in the stack on init (Takao Indoh ) [515753]\n- [nfs] nfsd4: do exact check of attribute specified (Jeff Layton ) [512361]\n- [net] igb: add support for 82576ns serdes adapter (Stefan Assmann ) [517063]\n- [s390] zfcp_scsi: dynamic queue depth adjustment param (Pete Zaitcev ) [508355]\n- [scsi] fix inconsistent usage of max lun (David Milburn ) [531488]\n- [ipmi] fix ipmi_si modprobe hang (Tony Camuso ) [507402]\n- [x86] kvm: dont ask HV for tsc khz if not using kvmclock (Glauber Costa ) [531268]\n- [net] qlge: updates and fixes for RHEL-5.5 (Marcus Barrow ) [519453]\n- [net] igb: fix kexec with igb controller (Stefan Assmann ) [527424]\n- [net] qlge: fix crash with kvm guest device passthru (Marcus Barrow ) [507689]\n- [misc] hpilo: add polling mechanism (Tony Camuso ) [515010]\n- [misc] hpilo: add interrupt handler (Tony Camuso ) [515010]\n- [misc] hpilo: staging for interrupt handling (Tony Camuso ) [515010]\n- [edac] amd64_edac: enable driver in kernel config (Bhavna Sarathy ) [479070]\n- [edac] amd64_edac: remove early hardware probe (Bhavna Sarathy ) [479070]\n- [edac] amd64_edac: detect ddr3 support (Bhavna Sarathy ) [479070]\n- [edac] amd64_edac: add ddr3 support (Bhavna Sarathy ) [479070]\n- [edac] add amd64_edac driver (Bhavna Sarathy ) [479070]\n- [net] igb: set vf rlpml must take vlan tag into account (Don Dugger ) [515602]\n- [misc] hibernate: increase timeout (Matthew Garrett ) [507331]\n- [nfs] make sure dprintk() macro works everywhere (Jeff Layton ) [532701]\n- [acpi] include core wmi support and dell-wmi driver (Matthew Garrett ) [516623]\n- [powerpc] fix to handle SLB resize during migration (Kevin Monroe ) [524112]\n- [mm] oom killer output should display UID (Larry Woodman ) [520419]\n- [net] fix race in data receive/select (Amerigo Wang ) [509866]\n- [net] augment raw_send_hdrinc to validate ihl in user hdr (Neil Horman ) [500924]\n- [i2c] include support for Hudson-2 SMBus controller (Stanislaw Gruszka ) [515125]\n- [net] bonding: introduce primary_reselect option (Jiri Pirko ) [471532]\n- [net] bonding: ab_arp use std active slave select code (Jiri Pirko ) [471532]\n- [net] use netlink notifications to track neighbour states (Danny Feng ) [516589]\n- [net] introduce generic function __neigh_notify (Danny Feng ) [516589]\n- [fs] skip inodes w/o pages to free in drop_pagecache_sb (Larry Woodman ) [528070]\n[2.6.18-175.el5]\n- [net] bnx2x: add support for bcm8727 phy (Stanislaw Gruszka ) [515716]\n- [net] sched: fix panic in bnx2_poll_work (John Feeney ) [526481]\n- [acpi] prevent duplicate dirs in /proc/acpi/processor (Matthew Garrett ) [537395]\n- [mm] conditional flush in flush_all_zero_pkmaps (Eric Sandeen ) [484683]\n- [fs] ecryptfs: copy lower attrs before dentry instantiate (Eric Sandeen ) [489774]\n- [ppc] fix compile warnings in eeh code (Prarit Bhargava ) [538407]\n- [md] multiple device failure renders dm-raid1 unfixable (Jonathan E Brassow ) [498532]\n- [scsi] ibmvscsi: FCoCEE NPIV support (Steve Best ) [512192]\n- [fs] gfs2: fix potential race in glock code (Steven Whitehouse ) [498976]\n- [kvm] balloon driver for guests (Peter Bogdanovic ) [522629]\n- [sctp] assign tsns earlier to avoid reordering (Neil Horman ) [517504]\n- [x86] fix boot crash with < 8-core AMD Magny-cours system (Bhavna Sarathy) [522215]\n- [x86] support amd magny-cours power-aware scheduler fix (Bhavna Sarathy ) [513685]\n- [x86] cpu: upstream cache fixes needed for amd m-c (Bhavna Sarathy ) [526315]\n- [x86_64] set proc id and core id before calling fixup_dcm (Bhavna Sarathy) [526315]\n- [x86] disable NMI watchdog on CPU remove (Prarit Bhargava ) [532514]\n- [nfsd] dont allow setting ctime over v4 (Jeff Layton ) [497909]\n- [acpi] bm_check and bm_control update (Luming Yu ) [509422]\n- [x86_64] amd: iommu system management erratum 63 fix (Bhavna Sarathy ) [531469]\n- [net] bnx2i/cnic: update driver version for RHEL5.5 (Mike Christie ) [516233]\n- [x86] fix L1 cache by adding missing break (Bhavna Sarathy ) [526770]\n- [x86] amd: fix hot plug cpu issue on 32-bit magny-cours (Bhavna Sarathy ) [526770]\n- [acpi] disable ARB_DISABLE on platforms where not needed (Luming Yu ) [509422]\n- [s390] do not annotate cmdline as __initdata (Hendrik Brueckner ) [506898]\n- [x86_64] fix 32-bit process register leak (Amerigo Wang ) [526798]\n- [misc] dont call printk while crashing (Mauro Carvalho Chehab ) [497195]\n- [x86] mce_amd: fix up threshold_bank4 creation (Bhavna Sarathy ) [526315]\n- [pci] fix SR-IOV function dependency link problem (Don Dugger ) [503837]\n- [xen] fix numa on magny-cours systems (Bhavna Sarathy ) [526051]\n- [xen] add two HP ProLiant DMI quirks to the hypervisor (Paolo Bonzini ) [536677]\n- [xen] hook sched rebalance logic to opt_hardvirt (Christopher Lalancette ) [529271]\n- [xen] crank the correct stat in the scheduler (Christopher Lalancette ) [529271]\n- [xen] whitespace fixups in xen scheduler (Christopher Lalancette ) [529271]\n- [xen] fix crash with memory imbalance (Bhavna Sarathy ) [526785]\n[2.6.18-174.el5]\n- [fs] private dentry list to avoid dcache_lock contention (Lachlan McIlroy ) [526612]\n- [gfs2] drop rindex glock on grows (Benjamin Marzinski ) [482756]\n- [acpi] run events on cpu 0 (Matthew Garrett ) [485016]\n- [cpufreq] add option to avoid smi while calibrating (Matthew Garrett ) [513649]\n- [acpi] support physical cpu hotplug on x86_64 (Stefan Assmann ) [516999]\n- [scsi] qla2xxx: enable msi-x correctly on qlogic 2xxx series (Marcus Barrow ) [531593]\n- [apic] fix server c1e spurious lapic timer events (Bhavna Sarathy ) [519422]\n- [pci] aer: fix ppc64 compile - no msi support (Prarit Bhargava ) [514442 517093]\n- [pci] aer: config changes to enable aer support (Prarit Bhargava ) [514442 517093]\n- [pci] aer: fix NULL pointer in aer injection code (Prarit Bhargava ) [514442 517093]\n- [pci] aer: add domain support to aer_inject (Prarit Bhargava ) [514442 517093]\n- [pci] aer: backport acpi osc functions (Prarit Bhargava ) [517093]\n- [pci] aer: pcie support and compile fixes (Prarit Bhargava ) [517093]\n- [pci] aer: changes required to compile in RHEL5 (Prarit Bhargava ) [514442 517093]\n- [pci] aer: base aer driver support (Prarit Bhargava ) [514442 517093]\n- [kvm] use upstream kvm_get_tsc_khz (Glauber Costa ) [531025]\n- [cifs] turn oplock breaks into a workqueue job (Jeff Layton ) [531005]\n- [cifs] fix oplock request handling in posix codepath (Jeff Layton ) [531005]\n- [cifs] have cifsFileInfo hold an extra inode reference (Jeff Layton ) [531005]\n- [cifs] take GlobalSMBSes_lock as read-only (Jeff Layton ) [531005]\n- [cifs] remove cifsInodeInfo.oplockPending flag (Jeff Layton ) [531005]\n- [cifs] replace wrtPending with a real reference count (Jeff Layton ) [531005]\n- [cifs] clean up set_cifs_acl interfaces (Jeff Layton ) [531005]\n- [cifs] reorganize get_cifs_acl (Jeff Layton ) [531005]\n- [cifs] protect GlobalOplock_Q with its own spinlock (Jeff Layton ) [531005]\n- [scsi] qla2xxx: updates and fixes for RHEL-5.5 (Marcus Barrow ) [519447]\n- [net] vlan: silence multicast debug messages (Danny Feng ) [461442]\n- [fs] fix inode_table test in ext{2,3}_check_descriptors (Eric Sandeen ) [504797]\n- [net] netlink: fix typo in initialization (Jiri Pirko ) [527906]\n- [mm] prevent tmpfs from going readonly during oom kills (Larry Woodman ) [497257]\n- [x86] set cpu_llc_id on AMD CPUs (Bhavna Sarathy ) [513684]\n- [x86] fix up threshold_bank4 support on AMD Magny-cours (Bhavna Sarathy ) [513684]\n- [x86] fix up L3 cache information for AMD Magny-cours (Bhavna Sarathy ) [513684]\n- [x86] amd: fix CPU llc_shared_map information (Bhavna Sarathy ) [513684]\n- [fs] trim instantiated file blocks on write errors (Eric Sandeen ) [515529]\n- [s390] optimize storage key operations for anon pages (Hans-Joachim Picht ) [519977]\n- [net] cxgb3: bug fixes from latest upstream version (Doug Ledford ) [510818]\n- [misc] saner FASYNC handling on file close (Paolo Bonzini ) [510746]\n- [wireless] mac80211: fix reported wireless extensions version (John Linville ) [513430]\n- [mm] dont oomkill when hugepage alloc fails on node (Larry Woodman ) [498510]\n- [xen] iommu-amd: extend loop ctr for polling completion wait (Bhavna Sarathy ) [518474 526766]\n- [xen] iommu: add passthrough and no-intremap parameters (Bhavna Sarathy ) [518474 526766]\n- [xen] iommu: enable amd iommu debug at run-time (Bhavna Sarathy ) [518474 526766]\n- [xen] support interrupt remapping on M-C (Bhavna Sarathy ) [518474 526766]\n- [xen] iommu: move iommu_setup() to setup ioapic correctly (Bhavna Sarathy ) [518474 526766]\n[2.6.18-173.el5]\n- [acpi] thinkpad_acpi: disable ecnvram brightness on some (Matthew Garrett ) [522745]\n- [block] cfq-iosched: dont delay queue kick for merged req (Jeff Moyer ) [456181 448130 427709]\n- [block] cfq-iosched: fix idling interfering with plugging (Jeff Moyer ) [456181 448130 427709]\n- [block] cfq: separate merged cfqqs if they stop cooperating (Jeff Moyer ) [456181 448130 427709]\n- [block] cfq: change the meaning of the cfqq_coop flag (Jeff Moyer ) [456181 448130 427709]\n- [block] cfq: merge cooperating cfq_queues (Jeff Moyer ) [456181 448130 427709]\n- [block] cfq: calc seek_mean per cfq_queue not per cfq_io_context (Jeff Moyer ) [456181 448130 427709]\n- [block] cfq-iosched: cache prio_tree root in cfqq->p_root (Jeff Moyer ) [456181 448130 427709]\n- [block] cfq-iosched: fix aliased req & cooperation detect (Jeff Moyer ) [456181 448130 427709]\n- [block] cfq-iosched: default seek when not enough samples (Jeff Moyer ) [456181 448130 427709]\n- [block] cfq-iosched: make seek_mean converge more quick (Jeff Moyer ) [456181 448130 427709]\n- [block] cfq-iosched: add close cooperator code (Jeff Moyer ) [456181 448130 427709]\n- [block] cfq-iosched: development update (Jeff Moyer ) [456181 448130 427709]\n- [gfs2] careful unlinking inodes (Steven Whitehouse ) [519049]\n- [scsi] arcmsr: add missing parameter (Tomas Henzl ) [521203]\n- [nfs] v4: fix setting lock on open file with no state (Jeff Layton ) [533115] {CVE-2009-3726}\n- [misc] futex priority based wakeup (Jon Thomas ) [531552]\n- [dlm] use GFP_NOFS on all lockspaces (David Teigland ) [530537]\n- [gfs2] improve statfs and quota usability (Benjamin Marzinski ) [529796]\n- [net] forcedeth: let phy power down when IF is down (Ivan Vecera ) [513692]\n- [drm] r128: check for init on all ioctls that require it (Danny Feng ) [529603] {CVE-2009-3620}\n- [scsi] htpiop: RocketRAID driver update v1.0 -> v1.6 (Rob Evers ) [519076]\n- [ipmi] add HP message handling (Tony Camuso ) [507402]\n- [mm] prevent hangs/long pauses when zone_reclaim_mode=1 (Larry Woodman ) [507360]\n- [s390] ipl: vmhalt, vmpanic, vmpoff, vmreboot dont work (Hans-Joachim Picht ) [518229]\n- [nfs] bring putpubfh handling inline with upstream (Wade Mealing ) [515405]\n[2.6.18-172.el5]\n- [fs] dio: dont zero out pages array inside struct dio (Jeff Moyer ) [488161]\n- [cifs] libfs: sb->s_maxbytes casts to a signed value (Jeff Layton ) [486092]\n- [serial] power7: support the single-port serial device (Kevin Monroe ) [525812]\n- [kABI] add pci_{enable,disable}_msi{,x} (Jon Masters ) [521081]\n- [scsi] mpt: errata 28 fix on LSI53C1030 (Tomas Henzl ) [518689]\n- [scsi] panic at .ipr_sata_reset after device reset (Kevin Monroe ) [528175]\n- [scsi] lpfc: update to 8.2.0.52 FC/FCoE (Rob Evers ) [515272]\n- [x86] add ability to access Nehalem uncore config space (John Villalovos ) [504330]\n- [net] sunrpc: remove flush_workqueue from xs_connect (Jeff Layton ) [495059]\n- [xen] ia64: command-line arg to increase the heap size (Paolo Bonzini ) [521865]\n[2.6.18-171.el5]\n- [security] require root for mmap_min_addr (Eric Paris ) [518143] {CVE-2009-2695}\n- [ata] ahci: add AMD SB900 controller device IDs (David Milburn ) [515114]\n- [net] lvs: adjust sync protocol handling for ipvsadm -2 (Neil Horman ) [524129]\n- Revert: [net] lvs: fix sync protocol handling for timeout values (Neil Horman ) [524129]\n- [net] AF_UNIX: deadlock on connecting to shutdown socket (Jiri Pirko ) [529631] {CVE-2009-3621}\n- [fs] inotify: remove debug code (Danny Feng ) [499019]\n- [fs] inotify: fix race (Danny Feng ) [499019]\n[2.6.18-170.el5]\n- [net] lvs: fix sync protocol handling for timeout values (Neil Horman ) [524129]\n- [net] igb: return PCI_ERS_RESULT_DISCONNECT on failure (Dean Nelson ) [514250]\n- [net] e100: return PCI_ERS_RESULT_DISCONNECT on failure (Dean Nelson ) [514250]\n- [nfs] knfsd: query fs for v4 getattr of FATTR4_MAXNAME (Jeff Layton ) [469689]\n- [block] blkfront: respect elevator=xyz cmd line option (Paolo Bonzini ) [498461]\n- [firewire] fw-ohci: fix IOMMU resource exhaustion (Jay Fenlason ) [513827]\n- [scsi] cciss: ignore stale commands after reboot (Tomas Henzl ) [525440]\n- [scsi] cciss: version change (Tomas Henzl ) [525440]\n- [scsi] cciss: switch to using hlist (Tomas Henzl ) [525440]\n- [x86] support always running Local APIC (John Villalovos ) [496306]\n- [x86_64] fix hugepage memory tracking (Jim Paradis ) [518671]\n- [net] bnx2: apply BROKEN_STATS workaround to 5706/5708 (Flavio Leitner ) [527748]\n- [pci] pci_dev->is_enabled must be set (Prarit Bhargava ) [527496]\n- [audit] dereferencing krule as if it were an audit_watch (Alexander Viro ) [526819]\n- [mm] fix spinlock performance issue on large systems (John Villalovos ) [526078]\n- [misc] hotplug: add CPU_DYING notifier (Eduardo Habkost ) [510814]\n- [misc] hotplug: use cpuset hotplug callback to CPU_DYING (Eduardo Habkost ) [510814]\n- [misc] define CPU_DYING and CPU_DYING_FROZEN (Eduardo Habkost ) [510814]\n- [misc] hotplug: adapt thermal throttle to CPU_DYING (Eduardo Habkost ) [510814]\n- [fs] file truncations when both suid and write perms set (Amerigo Wang ) [486975]\n- [x86] finish sysdata conversion (Danny Feng ) [519633]\n- [misc] pipe: fix fd leaks (Amerigo Wang ) [509625]\n- [x86_64] PCI space below 4GB forces mem remap above 1TB (Larry Woodman ) [523522]\n- [pci] pciehp: fix PCIe hotplug slot detection (Michal Schmidt ) [521731]\n- [net] syncookies: support for TCP options via timestamps (jolsa@redhat.com ) [509062]\n- [net] tcp: add IPv6 support to TCP SYN cookies (jolsa@redhat.com ) [509062]\n- [xen] blkfront: check for out-of-bounds array accesses (Paolo Bonzini ) [517238]\n- [xen] fix timeout with PV guest and physical CDROM (Paolo Bonzini ) [506899]\n- [net] e1000e: return PCI_ERS_RESULT_DISCONNECT on fail (Dean Nelson ) [508387]\n- [x86_64] vsmp: fix bit-wise operator and compile issue (Prarit Bhargava ) [515408]\n- [net] e100: add support for 82552 (Dean Nelson ) [475610]\n- [net] netfilter: honour source routing for LVS-NAT (Jiri Pirko ) [491010]\n- [misc] hwmon: update to latest upstream for RHEL-5.5 (Prarit Bhargava ) [467994 250561 446061]\n- [xen] panic in msi_msg_read_remap_rte with acpi=off (Miroslav Rezanina ) [525467]\n- [xen] mask out xsave for hvm guests (Andrew Jones ) [524052]\n- [xen] allow booting with broken serial hardware (Chris Lalancette ) [518338]\n- [xen] mask out more CPUID bits for PV guests (Chris Lalancette ) [502826]\n- [xen] x86: fix wrong asm (Paolo Bonzini ) [510686]\n- [xen] always inline memcmp (Paolo Bonzini) [510686]\n- [xen] i386: handle x87 opcodes in TLS segment fixup (Paolo Bonzini ) [510225]\n[2.6.18-169.el5]\n- [scsi] export symbol scsilun_to_int (Tomas Henzl ) [528153]\n- [fs] eCryptfs: prevent lower dentry from going negative (Eric Sandeen ) [527835] {CVE-2009-2908}\n- [nfs] v4: reclaimer thread stuck in an infinite loop (Sachin S. Prabhu ) [526888]\n- [scsi] scsi_dh_rdac: changes for rdac debug logging (Rob Evers ) [524335]\n- [scsi] scsi_dh_rdac: collect rdac debug info during init (Rob Evers ) [524335]\n- [scsi] scsi_dh_rdac: move init code around (Rob Evers ) [524335]\n- [scsi] scsi_dh_rdac: return correct mode select cmd info (Rob Evers ) [524335]\n- [scsi] scsi_dh_rdac: add support for Dell PV array (Rob Evers ) [524335]\n- [scsi] scsi_dh_rdac: add support for SUN devices (Rob Evers ) [524335]\n- [scsi] scsi_dh_rdac: support ST2500, ST2510 and ST2530 (Rob Evers ) [524335]\n- [s390] cio: boot through XAUTOLOG with conmode 3270 (Hans-Joachim Picht ) [508934]\n- [x86] add smp_call_function_many/single functions (Prarit Bhargava ) [526043]\n- [s390] iucv: fix output register in iucv_query_maxconn (Hans-Joachim Picht ) [524251]\n- [s390] set preferred s390 console based on conmode (Hans-Joachim Picht ) [520461]\n- [s390] dasd: add large volume support (Hans-Joachim Picht ) [511972]\n- [s390] dasd: fail requests when dev state is not ready (Hans-Joachim Picht ) [523219]\n- [s390] cio: failing set online/offline processing (Hans-Joachim Picht ) [523323]\n- [x86] oprofile: support arch perfmon (John Villalovos ) [523479]\n- [x86] oprofile: fix K8/core2 on multiple cpus (John Villalovos ) [523479]\n- [x86] oprofile: utilize perf counter reservation (John Villalovos ) [523479]\n- [gfs2] genesis stuck writing to unlinked file (Abhijith Das ) [505331]\n- [net] r8169: avoid losing MSI interrupts (Ivan Vecera ) [514589]\n- [s390] cio: set correct number of internal I/O retries (Hans-Joachim Picht ) [519814]\n- [net] e1000: return PCI_ERS_RESULT_DISCONNECT on fail (Dean Nelson ) [508389]\n- [net] ixgbe: return PCI_ERS_RESULT_DISCONNECT on fail (Dean Nelson ) [508388]\n- [crypto] s390: enable ansi_cprng config option (Jarod Wilson ) [504667]\n- [s390] dasd: dev attr to disable blocking on lost paths (Hans-Joachim Picht ) [503222]\n- [s390] qeth: handle VSwitch Port Isolation error codes (Hans-Joachim Picht ) [503232]\n- [s390] qeth: improve no_checksumming handling for layer3 (Hans-Joachim Picht ) [503238]\n- [gfs2] smbd proccess hangs with flock call (Abhijith Das ) [502531]\n- [input] psmouse: reenable mouse on shutdown (Prarit Bhargava ) [501025]\n- [xen] x86: make NMI detection work (Miroslav Rezanina ) [494120]\n[2.6.18-168.el5]\n- [gfs2] mount option: -o errors=withdraw|panic (Bob Peterson ) [518106]\n- [net] bonding: set primary param via sysfs (Jiri Pirko ) [499884]\n- [scsi] fusion: re-enable mpt_msi_enable option (Tomas Henzl ) [520820]\n- [x86] xen: add 'ida' flag (Prarit Bhargava ) [522846]\n- [net] ipt_recent: sanity check hit count (Amerigo Wang ) [523982]\n- [acpi] fix syntax in ACPI debug statement (Stefan Assmann ) [524787]\n- [s390] AF_IUCV SOCK_SEQPACKET support (Hans-Joachim Picht ) [512006]\n- [x86] fix nosmp option (Prarit Bhargava ) [509581]\n- [nfs] nfsd4: idmap upcalls should use unsigned uid/gid (Jeff Layton ) [519184]\n- [ia64] fix ppoll and pselect syscalls (Prarit Bhargava ) [520867]\n- [net] ipv4: ip_append_data handle NULL routing table (Jiri Pirko ) [520297]\n- [net] fix drop monitor to not panic on null dev (Neil Horman ) [523279]\n- [gfs2] gfs2_delete_inode failing on RO filesystem (Abhijith Das ) [501359]\n- [nfs] statfs error-handling fix (Jeff Layton ) [519112]\n- [pci] avoid disabling acpi to use non-core PCI devices (Mauro Carvalho Chehab ) [504330]\n- [nfs] fix regression in nfs_open_revalidate (Jeff Layton ) [511278]\n- [nfs] fix cache invalidation problems in nfs_readdir (Jeff Layton ) [511170]\n- [fs] sanitize invalid partition table entries (Stefan Assmann ) [481658]\n- [char] fix corrupted intel_rng kernel messages (Jerome Marchand ) [477778]\n- [net] ipv6: do not fwd pkts with the unspecified saddr (Jiri Pirko ) [517899]\n- [ata] ahci: add device ID for 82801JI sata controller (David Milburn ) [506200]\n- [misc] support Intel multi-APIC-cluster systems (Prarit Bhargava ) [507333]\n- [ext3] fix online resize bug (Josef Bacik ) [515759]\n- [xen] netback: call netdev_features_changed (Herbert Xu ) [493092]\n- [net] igbvf: recognize failure to set mac address (Stefan Assmann ) [512469]\n- [misc] documentation: fix file-nr definition in fs.txt (Danny Feng ) [497200]\n- [misc] cpufreq: dont set policy for offline cpus (Prarit Bhargava ) [511211]\n- [net] sunrpc client: IF for binding to a local address (Jeff Layton ) [500653]\n- [fs] nlm: track local address and bind to it for CBs (Jeff Layton ) [500653]\n- [net] sunrpc: set rq_daddr in svc_rqst on socket recv (Jeff Layton ) [500653]\n- [cpufreq] P-state limit: limit can never be increased (Stanislaw Gruszka ) [489566]\n- [crypto] s390: permit weak keys unless REQ_WEAK_KEY set (Jarod Wilson ) [504667]\n- [fs] procfs: fix fill all subdirs as DT_UNKNOWN (Danny Feng ) [509713]\n- [block] ll_rw_blk: more flexable read_ahead_kb store (Danny Feng ) [510257]\n- [audit] correct the record length of execve (Amerigo Wang ) [509134]\n- [net] tcp: do not use TSO/GSO when there is urgent data (Danny Feng ) [502572]\n- [net] vxge: new driver for Neterion 10Gb Ethernet (Michal Schmidt ) [453683]\n- [net] vxge: Makefile, Kconfig and config additions (Michal Schmidt ) [453683]\n- [pci] add PCI Express link status register definitions (Michal Schmidt ) [453683]\n- [net] 8139too: RTNL and flush_scheduled_work deadlock (Jiri Pirko ) [487346]\n- [x86] suspend-resume: work on large logical CPU systems (John Villalovos ) [499271]\n- [gfs2] '>>' does not update ctime,mtime on the file (Abhijith Das ) [496716]\n- [net] icmp: fix icmp_errors_use_inbound_ifaddr sysctl (Jiri Pirko ) [502822]\n- [nfs] fix stripping SUID/SGID flags when chmod/chgrp dir (Peter Staubach ) [485099]\n- [net] bonding: allow bond in mode balance-alb to work (Jiri Pirko ) [487763]\n- [x86] fix mcp55 apic routing (Neil Horman ) [473404]\n- [net] rtl8139: set mac address on running device (Jiri Pirko ) [502491]\n- [net] tun: allow group ownership of TUN/TAP devices (Jiri Pirko ) [497955]\n- [net] tcp: do not use TSO/GSO when there is urgent data (Jiri Olsa ) [497032]\n- [misc] undefined reference to __udivdi3 (Amerigo Wang ) [499063]\n[2.6.18-167.el5]\n- [scsi] st.c: memory use after free after MTSETBLK ioctl (David Jeffery ) [520192]\n- [nfs] knfsd: fix NFSv4 O_EXCL creates (Jeff Layton ) [524521] {CVE-2009-3286}\n- [net] r8169: balance pci_map/unmap pair, use hw padding (Ivan Vecera ) [515857]\n- [net] tc: fix unitialized kernel memory leak (Jiri Pirko ) [520863]\n- [misc] kthreads: kthread_create vs kthread_stop() race (Oleg Nesterov ) [440273]\n- [net] fix unbalance rtnl locking in rt_secret_reschedule (Neil Horman ) [510067]\n[2.6.18-166.el5]\n- [x86_64] kvm: bound last_kvm to prevent backwards time (Glauber Costa ) [524076]\n- [x86] kvm: fix vsyscall going backwards (Glauber Costa ) [524076]\n- [misc] fix RNG to not use first generated random block (Neil Horman ) [522860]\n- [x86] kvm: mark kvmclock_init as cpuinit (Glauber Costa ) [523450]\n- [x86_64] kvm: allow kvmclock to be overwritten (Glauber Costa ) [523447]\n- [x86] kvmclock: fix bogus wallclock value (Glauber Costa ) [519771]\n- [scsi] scsi_dh_rdace: add more sun hardware (mchristi@redhat.com ) [518496]\n- [misc] cprng: fix cont test to be fips compliant (Neil Horman ) [523259]\n- [net] bridge: fix LRO crash with tun (Andy Gospodarek ) [483646]\n- Revert: [net] atalk/irda: memory leak to user in getname (Don Zickus ) [519310] {CVE-2009-3001 CVE-2009-3002}\n- Revert: [x86_64] fix gettimeoday TSC overflow issue - 1 (Don Zickus ) [467942]\n[2.6.18-165.el5]\n- [net] sky2: revert some phy power refactoring changes (Neil Horman ) [509891]\n- [net] atalk/irda: memory leak to user in getname (Danny Feng ) [519310] {CVE-2009-3001 CVE-2009-3002}\n- [x86_64] fix gettimeoday TSC overflow issue - 1 (Prarit Bhargava ) [467942]\n- [md] prevent crash when accessing suspend_* sysfs attr (Danny Feng ) [518136] {CVE-2009-2849}\n- [nfs] nlm_lookup_host: dont return invalidated nlm_host (Sachin S. Prabhu ) [507549]\n- [net] bonding: tlb/alb: set active slave when enslaving (Jiri Pirko ) [499884]\n- [nfs] r/w I/O perf degraded by FLUSH_STABLE page flush (Peter Staubach ) [498433]\n- [SELinux] allow preemption b/w transition perm checks (Eric Paris ) [516216]\n- [scsi] scsi_transport_fc: fc_user_scan correction (David Milburn ) [515176]\n- [net] tg3: refrain from touching MPS (John Feeney ) [516123]\n- [net] qlge: fix hangs and read performance (Marcus Barrow ) [517893]\n- [scsi] qla2xxx: allow use of MSI when MSI-X disabled (Marcus Barrow ) [517922]\n- [net] mlx4_en fix for vlan traffic (Doug Ledford ) [514141]\n- [net] mlx4_en device multi-function patch (Doug Ledford ) [500346]\n- [net] mlx4_core: fails to load on large systems (Doug Ledford ) [514147]\n- [x86] disable kvmclock by default (Glauber Costa ) [476075]\n- [x86] disable kvmclock when shuting the machine down (Glauber Costa ) [476075]\n- [x86] re-register clock area in prepare_boot_cpu (Glauber Costa ) [476075]\n- [x86] kvmclock smp support (Glauber Costa ) [476075]\n- [x86] use kvm wallclock (Glauber Costa ) [476075]\n- [x86_64] kvm clocksources implementation (Glauber Costa ) [476075]\n- [x86] kvm: import kvmclock.c (Glauber Costa ) [476075]\n- [x86] kvm: import pvclock.c and headers (Glauber Costa ) [476075]\n- [x86] export additional cpu flags in /proc/cpuinfo (Prarit Bhargava ) [517928]\n- [x86] detect APIC clock calibration problems (Prarit Bhargava ) [503957]\n- [fs] cifs: new opts to disable overriding of ownership (Jeff Layton ) [515252]\n- [x86] pnpacpi: fix serial ports on IBM Point-of-Sale HW (Kevin Monroe ) [506799]", "edition": 72, "modified": "2010-04-05T00:00:00", "published": "2010-04-05T00:00:00", "id": "ELSA-2010-0178", "href": "http://linux.oracle.com/errata/ELSA-2010-0178.html", "title": "Oracle Enterprise Linux 5.5 kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}