Local attackers can exploit Linux kernel leaks to access sensitive memory and environment variables.
Reporter | Title | Published | Views | Family All 83 |
---|---|---|---|---|
Tenable Nessus | GLSA-200408-24 : Linux Kernel: Multiple information leaks | 30 Aug 200400:00 | – | nessus |
Tenable Nessus | Mandrake Linux Security Advisory : kernel (MDKSA-2004:087) | 27 Aug 200400:00 | – | nessus |
Tenable Nessus | Fedora Core 1 : kernel-2.4.22-1.2199.nptl (2004-251) | 10 Aug 200400:00 | – | nessus |
Tenable Nessus | SUSE-SA:2004:024: kernel | 9 Aug 200400:00 | – | nessus |
Tenable Nessus | RHEL 2.1 : kernel (RHSA-2004:418) | 9 Aug 200400:00 | – | nessus |
Tenable Nessus | RHEL 3 : kernel (RHSA-2004:413) | 9 Aug 200400:00 | – | nessus |
Tenable Nessus | Ubuntu 4.10 : linux-source-2.6.8.1 vulnerabilities (USN-38-1) | 15 Jan 200600:00 | – | nessus |
Tenable Nessus | RHEL 2.1 : kernel (RHSA-2004:505) | 14 Dec 200400:00 | – | nessus |
Tenable Nessus | RHEL 2.1 : kernel (RHSA-2006:0191) | 5 Feb 200600:00 | – | nessus |
Tenable Nessus | RHEL 3 : kernel (RHSA-2004:549) | 13 Dec 200400:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Gentoo | any | all | sys-kernel/aa-sources | 2.6.5-r5 | UNKNOWN |
Gentoo | any | all | sys-kernel/alpha-sources | 2.4.21-r12 | UNKNOWN |
Gentoo | any | all | sys-kernel/ck-sources | 2.6.7-r5 | UNKNOWN |
Gentoo | any | all | sys-kernel/development-sources | 2.6.8 | UNKNOWN |
Gentoo | any | all | sys-kernel/gentoo-dev-sources | 2.6.7-r12 | UNKNOWN |
Gentoo | any | all | sys-kernel/gentoo-sources | 2.4.26-r9 | UNKNOWN |
Gentoo | any | all | sys-kernel/grsec-sources | 2.4.27.2.0.1-r1 | UNKNOWN |
Gentoo | any | all | sys-kernel/gs-sources | 2.4.25_pre7-r11 | UNKNOWN |
Gentoo | any | all | sys-kernel/hardened-dev-sources | 2.6.7-r7 | UNKNOWN |
Gentoo | any | all | sys-kernel/hardened-sources | 2.4.27-r1 | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo