Scientific Linux Security Update : kernel on SL4.x i386/x86_64
2012-08-01T00:00:00
ID SL_20101019_KERNEL_ON_SL4_X.NASL Type nessus Reporter This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2012-08-01T00:00:00
Description
This update fixes the following security issues :
Information leak flaws were found in the Linux kernel
Traffic Control Unit implementation. A local attacker
could use these flaws to cause the kernel to leak kernel
memory to user-space, possibly leading to the disclosure
of sensitive information. (CVE-2010-2942, Moderate)
A flaw was found in the tcf_act_police_dump() function
in the Linux kernel network traffic policing
implementation. A data structure in
tcf_act_police_dump() was not initialized properly
before being copied to user-space. A local, unprivileged
user could use this flaw to cause an information leak.
(CVE-2010-3477, Moderate)
A missing upper bound integer check was found in the
sys_io_submit() function in the Linux kernel
asynchronous I/O implementation. A local, unprivileged
user could use this flaw to cause an information leak.
(CVE-2010-3067, Low)
This update also fixes the following bugs :
When two systems using bonding devices in the adaptive
load balancing (ALB) mode communicated with each other,
an endless loop of ARP replies started between these two
systems due to a faulty MAC address update. With this
update, the MAC address update no longer creates
unneeded ARP replies. (BZ#629239)
When running the Connectathon NFS Testsuite with certain
clients and Scientific Linux 4.8 as the server,
nfsvers4, lock, and test2 failed the Connectathon test.
(BZ#625535)
For UDP/UNIX domain sockets, due to insufficient memory
barriers in the network code, a process sleeping in
select() may have missed notifications about new data.
In rare cases, this bug may have caused a process to
sleep forever. (BZ#640117)
In certain situations, a bug found in either the HTB or
TBF network packet schedulers in the Linux kernel could
have caused a kernel panic when using Broadcom network
cards with the bnx2 driver. (BZ#624363)
Previously, allocating fallback cqr for DASD
reserve/release IOCTLs failed because it used the memory
pool of the respective device. This update preallocates
sufficient memory for a single reserve/release request.
(BZ#626828)
In some situations a bug prevented 'force online'
succeeding for a DASD device. (BZ#626827)
Using the 'fsstress' utility may have caused a kernel
panic. (BZ#633968)
This update introduces additional stack guard patches.
(BZ#632515)
A bug was found in the way the megaraid_sas driver
handled physical disks and management IOCTLs. All
physical disks were exported to the disk layer, allowing
an oops in megasas_complete_cmd_dpc() when completing
the IOCTL command if a timeout occurred. (BZ#631903)
Previously, a warning message was returned when a large
amount of messages was passed through netconsole and a
considerable amount of network load was added. With this
update, the warning message is no longer displayed.
(BZ#637729)
Executing a large 'dd' command (1 to 5GB) on an iSCSI
device with the qla3xxx driver caused a system crash due
to the incorrect storing of a private data structure.
With this update, the size of the stored data structure
is checked and the system crashes no longer occur.
(BZ#624364)
The system must be rebooted for this update to take effect.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text is (C) Scientific Linux.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(60871);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_cve_id("CVE-2010-2942", "CVE-2010-3067", "CVE-2010-3477");
script_name(english:"Scientific Linux Security Update : kernel on SL4.x i386/x86_64");
script_summary(english:"Checks rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:
"The remote Scientific Linux host is missing one or more security
updates."
);
script_set_attribute(
attribute:"description",
value:
"This update fixes the following security issues :
- Information leak flaws were found in the Linux kernel
Traffic Control Unit implementation. A local attacker
could use these flaws to cause the kernel to leak kernel
memory to user-space, possibly leading to the disclosure
of sensitive information. (CVE-2010-2942, Moderate)
- A flaw was found in the tcf_act_police_dump() function
in the Linux kernel network traffic policing
implementation. A data structure in
tcf_act_police_dump() was not initialized properly
before being copied to user-space. A local, unprivileged
user could use this flaw to cause an information leak.
(CVE-2010-3477, Moderate)
- A missing upper bound integer check was found in the
sys_io_submit() function in the Linux kernel
asynchronous I/O implementation. A local, unprivileged
user could use this flaw to cause an information leak.
(CVE-2010-3067, Low)
This update also fixes the following bugs :
- When two systems using bonding devices in the adaptive
load balancing (ALB) mode communicated with each other,
an endless loop of ARP replies started between these two
systems due to a faulty MAC address update. With this
update, the MAC address update no longer creates
unneeded ARP replies. (BZ#629239)
- When running the Connectathon NFS Testsuite with certain
clients and Scientific Linux 4.8 as the server,
nfsvers4, lock, and test2 failed the Connectathon test.
(BZ#625535)
- For UDP/UNIX domain sockets, due to insufficient memory
barriers in the network code, a process sleeping in
select() may have missed notifications about new data.
In rare cases, this bug may have caused a process to
sleep forever. (BZ#640117)
- In certain situations, a bug found in either the HTB or
TBF network packet schedulers in the Linux kernel could
have caused a kernel panic when using Broadcom network
cards with the bnx2 driver. (BZ#624363)
- Previously, allocating fallback cqr for DASD
reserve/release IOCTLs failed because it used the memory
pool of the respective device. This update preallocates
sufficient memory for a single reserve/release request.
(BZ#626828)
- In some situations a bug prevented 'force online'
succeeding for a DASD device. (BZ#626827)
- Using the 'fsstress' utility may have caused a kernel
panic. (BZ#633968)
- This update introduces additional stack guard patches.
(BZ#632515)
- A bug was found in the way the megaraid_sas driver
handled physical disks and management IOCTLs. All
physical disks were exported to the disk layer, allowing
an oops in megasas_complete_cmd_dpc() when completing
the IOCTL command if a timeout occurred. (BZ#631903)
- Previously, a warning message was returned when a large
amount of messages was passed through netconsole and a
considerable amount of network load was added. With this
update, the warning message is no longer displayed.
(BZ#637729)
- Executing a large 'dd' command (1 to 5GB) on an iSCSI
device with the qla3xxx driver caused a system crash due
to the incorrect storing of a private data structure.
With this update, the size of the stored data structure
is checked and the system crashes no longer occur.
(BZ#624364)
The system must be rebooted for this update to take effect."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=624363"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=624364"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=625535"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=626827"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=626828"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=629239"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=631903"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=632515"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=633968"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=637729"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=640117"
);
# https://listserv.fnal.gov/scripts/wa.exe?A2=ind1010&L=scientific-linux-errata&T=0&P=1870
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?e4dd9f70"
);
script_set_attribute(attribute:"solution", value:"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"x-cpe:/o:fermilab:scientific_linux");
script_set_attribute(attribute:"vuln_publication_date", value:"2010/09/21");
script_set_attribute(attribute:"patch_publication_date", value:"2010/10/19");
script_set_attribute(attribute:"plugin_publication_date", value:"2012/08/01");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Scientific Linux Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Scientific Linux " >!< release) audit(AUDIT_HOST_NOT, "running Scientific Linux");
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Scientific Linux", cpu);
flag = 0;
if (rpm_check(release:"SL4", reference:"kernel-2.6.9-89.31.1.EL")) flag++;
if (rpm_check(release:"SL4", reference:"kernel-devel-2.6.9-89.31.1.EL")) flag++;
if (rpm_check(release:"SL4", reference:"kernel-doc-2.6.9-89.31.1.EL")) flag++;
if (rpm_check(release:"SL4", cpu:"i386", reference:"kernel-hugemem-2.6.9-89.31.1.EL")) flag++;
if (rpm_check(release:"SL4", cpu:"i386", reference:"kernel-hugemem-devel-2.6.9-89.31.1.EL")) flag++;
if (rpm_check(release:"SL4", cpu:"x86_64", reference:"kernel-largesmp-2.6.9-89.31.1.EL")) flag++;
if (rpm_check(release:"SL4", cpu:"x86_64", reference:"kernel-largesmp-devel-2.6.9-89.31.1.EL")) flag++;
if (rpm_check(release:"SL4", reference:"kernel-smp-2.6.9-89.31.1.EL")) flag++;
if (rpm_check(release:"SL4", reference:"kernel-smp-devel-2.6.9-89.31.1.EL")) flag++;
if (rpm_check(release:"SL4", reference:"kernel-xenU-2.6.9-89.31.1.EL")) flag++;
if (rpm_check(release:"SL4", reference:"kernel-xenU-devel-2.6.9-89.31.1.EL")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
else security_warning(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
{"id": "SL_20101019_KERNEL_ON_SL4_X.NASL", "bulletinFamily": "scanner", "title": "Scientific Linux Security Update : kernel on SL4.x i386/x86_64", "description": "This update fixes the following security issues :\n\n - Information leak flaws were found in the Linux kernel\n Traffic Control Unit implementation. A local attacker\n could use these flaws to cause the kernel to leak kernel\n memory to user-space, possibly leading to the disclosure\n of sensitive information. (CVE-2010-2942, Moderate)\n\n - A flaw was found in the tcf_act_police_dump() function\n in the Linux kernel network traffic policing\n implementation. A data structure in\n tcf_act_police_dump() was not initialized properly\n before being copied to user-space. A local, unprivileged\n user could use this flaw to cause an information leak.\n (CVE-2010-3477, Moderate)\n\n - A missing upper bound integer check was found in the\n sys_io_submit() function in the Linux kernel\n asynchronous I/O implementation. A local, unprivileged\n user could use this flaw to cause an information leak.\n (CVE-2010-3067, Low)\n\nThis update also fixes the following bugs :\n\n - When two systems using bonding devices in the adaptive\n load balancing (ALB) mode communicated with each other,\n an endless loop of ARP replies started between these two\n systems due to a faulty MAC address update. With this\n update, the MAC address update no longer creates\n unneeded ARP replies. (BZ#629239)\n\n - When running the Connectathon NFS Testsuite with certain\n clients and Scientific Linux 4.8 as the server,\n nfsvers4, lock, and test2 failed the Connectathon test.\n (BZ#625535)\n\n - For UDP/UNIX domain sockets, due to insufficient memory\n barriers in the network code, a process sleeping in\n select() may have missed notifications about new data.\n In rare cases, this bug may have caused a process to\n sleep forever. (BZ#640117)\n\n - In certain situations, a bug found in either the HTB or\n TBF network packet schedulers in the Linux kernel could\n have caused a kernel panic when using Broadcom network\n cards with the bnx2 driver. (BZ#624363)\n\n - Previously, allocating fallback cqr for DASD\n reserve/release IOCTLs failed because it used the memory\n pool of the respective device. This update preallocates\n sufficient memory for a single reserve/release request.\n (BZ#626828)\n\n - In some situations a bug prevented 'force online'\n succeeding for a DASD device. (BZ#626827)\n\n - Using the 'fsstress' utility may have caused a kernel\n panic. (BZ#633968)\n\n - This update introduces additional stack guard patches.\n (BZ#632515)\n\n - A bug was found in the way the megaraid_sas driver\n handled physical disks and management IOCTLs. All\n physical disks were exported to the disk layer, allowing\n an oops in megasas_complete_cmd_dpc() when completing\n the IOCTL command if a timeout occurred. (BZ#631903)\n\n - Previously, a warning message was returned when a large\n amount of messages was passed through netconsole and a\n considerable amount of network load was added. With this\n update, the warning message is no longer displayed.\n (BZ#637729)\n\n - Executing a large 'dd' command (1 to 5GB) on an iSCSI\n device with the qla3xxx driver caused a system crash due\n to the incorrect storing of a private data structure.\n With this update, the size of the stored data structure\n is checked and the system crashes no longer occur.\n (BZ#624364)\n\nThe system must be rebooted for this update to take effect.", "published": "2012-08-01T00:00:00", "modified": "2012-08-01T00:00:00", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}, "href": "https://www.tenable.com/plugins/nessus/60871", "reporter": "This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://bugzilla.redhat.com/show_bug.cgi?id=625535", "https://bugzilla.redhat.com/show_bug.cgi?id=637729", "https://bugzilla.redhat.com/show_bug.cgi?id=624364", "https://bugzilla.redhat.com/show_bug.cgi?id=632515", "https://bugzilla.redhat.com/show_bug.cgi?id=624363", "https://bugzilla.redhat.com/show_bug.cgi?id=640117", "https://bugzilla.redhat.com/show_bug.cgi?id=626828", "http://www.nessus.org/u?e4dd9f70", "https://bugzilla.redhat.com/show_bug.cgi?id=633968", "https://bugzilla.redhat.com/show_bug.cgi?id=629239", "https://bugzilla.redhat.com/show_bug.cgi?id=631903", "https://bugzilla.redhat.com/show_bug.cgi?id=626827"], "cvelist": ["CVE-2010-2942", "CVE-2010-3477", "CVE-2010-3067"], "type": "nessus", "lastseen": "2021-01-17T13:45:06", "edition": 25, "viewCount": 10, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2010-3477", "CVE-2010-3067", "CVE-2010-2942"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310870358", "OPENVAS:1361412562310122298", "OPENVAS:880602", "OPENVAS:1361412562310880602", "OPENVAS:1361412562310880448", "OPENVAS:870344", "OPENVAS:1361412562310122306", "OPENVAS:880448", "OPENVAS:1361412562310870344", "OPENVAS:870358"]}, {"type": "redhat", "idList": ["RHSA-2010:0839", "RHSA-2011:0007", "RHSA-2010:0779", "RHSA-2010:0723", "RHSA-2010:0771", "RHSA-2010:0758"]}, {"type": "centos", "idList": ["CESA-2010:0723", "CESA-2010:0839", "CESA-2010:0779"]}, {"type": "nessus", "idList": ["ORACLELINUX_ELSA-2010-2008.NASL", "ORACLELINUX_ELSA-2010-0839.NASL", "SUSE_11_3_KERNEL-100915.NASL", "REDHAT-RHSA-2010-0839.NASL", "REDHAT-RHSA-2010-0779.NASL", "CENTOS_RHSA-2010-0839.NASL", "CENTOS_RHSA-2010-0779.NASL", "ORACLELINUX_ELSA-2010-0779.NASL", "SL_20101109_KERNEL_ON_SL5_X.NASL", "ORACLELINUX_ELSA-2010-2009.NASL"]}, {"type": "oraclelinux", "idList": ["ELSA-2010-0723", "ELSA-2010-0839", "ELSA-2011-0263", "ELSA-2010-0779", "ELSA-2010-2009", "ELSA-2010-2008"]}, {"type": "seebug", "idList": ["SSV:20134", "SSV:20133"]}, {"type": "fedora", "idList": ["FEDORA:E07AD11061A", "FEDORA:3E64B10F9E5", "FEDORA:25A5910FA53"]}, {"type": "ubuntu", "idList": ["USN-1074-2", "USN-1074-1", "USN-1000-1"]}, {"type": "suse", "idList": ["SUSE-SA:2010:060", "SUSE-SA:2010:040", "SUSE-SA:2010:041", "SUSE-SA:2010:054"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:11275", "SECURITYVULNS:DOC:25229"]}, {"type": "debian", "idList": ["DEBIAN:DSA-2126-1:370B4"]}, {"type": "vmware", "idList": ["VMSA-2011-0012"]}], "modified": "2021-01-17T13:45:06", "rev": 2}, "score": {"value": 5.7, "vector": "NONE", "modified": "2021-01-17T13:45:06", "rev": 2}, "vulnersScore": 5.7}, "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(60871);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-2942\", \"CVE-2010-3067\", \"CVE-2010-3477\");\n\n script_name(english:\"Scientific Linux Security Update : kernel on SL4.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes the following security issues :\n\n - Information leak flaws were found in the Linux kernel\n Traffic Control Unit implementation. A local attacker\n could use these flaws to cause the kernel to leak kernel\n memory to user-space, possibly leading to the disclosure\n of sensitive information. (CVE-2010-2942, Moderate)\n\n - A flaw was found in the tcf_act_police_dump() function\n in the Linux kernel network traffic policing\n implementation. A data structure in\n tcf_act_police_dump() was not initialized properly\n before being copied to user-space. A local, unprivileged\n user could use this flaw to cause an information leak.\n (CVE-2010-3477, Moderate)\n\n - A missing upper bound integer check was found in the\n sys_io_submit() function in the Linux kernel\n asynchronous I/O implementation. A local, unprivileged\n user could use this flaw to cause an information leak.\n (CVE-2010-3067, Low)\n\nThis update also fixes the following bugs :\n\n - When two systems using bonding devices in the adaptive\n load balancing (ALB) mode communicated with each other,\n an endless loop of ARP replies started between these two\n systems due to a faulty MAC address update. With this\n update, the MAC address update no longer creates\n unneeded ARP replies. (BZ#629239)\n\n - When running the Connectathon NFS Testsuite with certain\n clients and Scientific Linux 4.8 as the server,\n nfsvers4, lock, and test2 failed the Connectathon test.\n (BZ#625535)\n\n - For UDP/UNIX domain sockets, due to insufficient memory\n barriers in the network code, a process sleeping in\n select() may have missed notifications about new data.\n In rare cases, this bug may have caused a process to\n sleep forever. (BZ#640117)\n\n - In certain situations, a bug found in either the HTB or\n TBF network packet schedulers in the Linux kernel could\n have caused a kernel panic when using Broadcom network\n cards with the bnx2 driver. (BZ#624363)\n\n - Previously, allocating fallback cqr for DASD\n reserve/release IOCTLs failed because it used the memory\n pool of the respective device. This update preallocates\n sufficient memory for a single reserve/release request.\n (BZ#626828)\n\n - In some situations a bug prevented 'force online'\n succeeding for a DASD device. (BZ#626827)\n\n - Using the 'fsstress' utility may have caused a kernel\n panic. (BZ#633968)\n\n - This update introduces additional stack guard patches.\n (BZ#632515)\n\n - A bug was found in the way the megaraid_sas driver\n handled physical disks and management IOCTLs. All\n physical disks were exported to the disk layer, allowing\n an oops in megasas_complete_cmd_dpc() when completing\n the IOCTL command if a timeout occurred. (BZ#631903)\n\n - Previously, a warning message was returned when a large\n amount of messages was passed through netconsole and a\n considerable amount of network load was added. With this\n update, the warning message is no longer displayed.\n (BZ#637729)\n\n - Executing a large 'dd' command (1 to 5GB) on an iSCSI\n device with the qla3xxx driver caused a system crash due\n to the incorrect storing of a private data structure.\n With this update, the size of the stored data structure\n is checked and the system crashes no longer occur.\n (BZ#624364)\n\nThe system must be rebooted for this update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=624363\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=624364\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=625535\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=626827\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=626828\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=629239\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=631903\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=632515\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=633968\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=637729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=640117\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1010&L=scientific-linux-errata&T=0&P=1870\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e4dd9f70\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/09/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/10/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL4\", reference:\"kernel-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"kernel-devel-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"kernel-doc-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"SL4\", cpu:\"i386\", reference:\"kernel-hugemem-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"SL4\", cpu:\"i386\", reference:\"kernel-hugemem-devel-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"SL4\", cpu:\"x86_64\", reference:\"kernel-largesmp-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"SL4\", cpu:\"x86_64\", reference:\"kernel-largesmp-devel-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"kernel-smp-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"kernel-smp-devel-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"kernel-xenU-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"kernel-xenU-devel-2.6.9-89.31.1.EL\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "naslFamily": "Scientific Linux Local Security Checks", "pluginID": "60871", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "scheme": null}
{"cve": [{"lastseen": "2021-02-02T05:45:02", "description": "The tcf_act_police_dump function in net/sched/act_police.c in the actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc4 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel memory via vectors involving a dump operation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2942.", "edition": 7, "cvss3": {}, "published": "2010-09-21T20:00:00", "title": "CVE-2010-3477", "type": "cve", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3477"], "modified": "2020-08-14T14:03:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:6.06", "cpe:/o:canonical:ubuntu_linux:8.04", "cpe:/o:debian:debian_linux:5.0", "cpe:/o:linux:linux_kernel:2.6.36", "cpe:/o:canonical:ubuntu_linux:10.10", "cpe:/o:canonical:ubuntu_linux:9.10", "cpe:/o:canonical:ubuntu_linux:10.04", "cpe:/o:canonical:ubuntu_linux:9.04"], "id": "CVE-2010-3477", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3477", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"]}, {"lastseen": "2021-02-02T05:45:01", "description": "Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.", "edition": 7, "cvss3": {}, "published": "2010-09-21T18:00:00", "title": "CVE-2010-3067", "type": "cve", "cwe": ["CWE-190"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3067"], "modified": "2020-08-14T14:00:00", "cpe": ["cpe:/o:suse:linux_enterprise_software_development_kit:10", "cpe:/o:opensuse:opensuse:11.2", "cpe:/o:canonical:ubuntu_linux:6.06", "cpe:/o:suse:linux_enterprise_server:10", "cpe:/o:canonical:ubuntu_linux:8.04", "cpe:/o:debian:debian_linux:5.0", "cpe:/o:suse:linux_enterprise_desktop:10", "cpe:/o:linux:linux_kernel:2.6.36", "cpe:/o:canonical:ubuntu_linux:10.10", "cpe:/o:canonical:ubuntu_linux:9.10", "cpe:/o:opensuse:opensuse:11.3", "cpe:/o:canonical:ubuntu_linux:10.04", "cpe:/o:suse:linux_enterprise_real_time_extension:11", "cpe:/o:suse:linux_enterprise_server:9", "cpe:/o:canonical:ubuntu_linux:9.04"], "id": "CVE-2010-3067", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3067", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"]}, {"lastseen": "2021-02-02T05:45:01", "description": "The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.", "edition": 7, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2010-09-21T18:00:00", "title": "CVE-2010-2942", "type": "cve", "cwe": ["CWE-401"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-2942"], "modified": "2020-08-11T14:39:00", "cpe": ["cpe:/a:avaya:aura_communication_manager:5.2", "cpe:/o:linux:linux_kernel:2.6.35.13", "cpe:/o:canonical:ubuntu_linux:6.06", "cpe:/o:suse:suse_linux_enterprise_desktop:10", "cpe:/o:vmware:esx:4.1", "cpe:/a:avaya:iq:5.1", "cpe:/a:avaya:aura_presence_services:6.1.1", "cpe:/a:avaya:voice_portal:5.1", "cpe:/a:avaya:aura_system_manager:6.1.1", "cpe:/a:avaya:aura_session_manager:5.2", "cpe:/o:canonical:ubuntu_linux:8.04", "cpe:/a:avaya:aura_system_manager:6.0", "cpe:/a:avaya:aura_system_platform:6.0", "cpe:/o:linux:linux_kernel:2.6.36", "cpe:/o:suse:suse_linux_enterprise_desktop:11", "cpe:/o:canonical:ubuntu_linux:10.10", "cpe:/o:canonical:ubuntu_linux:9.10", "cpe:/o:opensuse:opensuse:11.1", "cpe:/o:opensuse:opensuse:11.3", "cpe:/a:avaya:aura_system_manager:5.2", "cpe:/a:avaya:aura_system_platform:1.1", "cpe:/o:canonical:ubuntu_linux:10.04", "cpe:/a:avaya:aura_session_manager:6.0", "cpe:/a:avaya:aura_system_manager:6.1", "cpe:/a:avaya:aura_session_manager:1.1", "cpe:/a:avaya:iq:5.0", "cpe:/a:avaya:aura_presence_services:6.1", "cpe:/o:canonical:ubuntu_linux:9.04", "cpe:/o:suse:suse_linux_enterprise_server:10", "cpe:/a:avaya:voice_portal:5.0", "cpe:/o:suse:suse_linux_enterprise_server:11", "cpe:/o:vmware:esx:4.0", "cpe:/a:avaya:aura_presence_services:6.0"], "id": "CVE-2010-2942", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2942", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*", "cpe:2.3:a:avaya:aura_communication_manager:5.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.35.13:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:aura_presence_services:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:aura_presence_services:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp3:*:*:*:*:*:*", "cpe:2.3:a:avaya:aura_system_platform:6.0:-:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp1:*:*:*:*:*:*", "cpe:2.3:a:avaya:iq:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:aura_system_manager:5.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*", "cpe:2.3:a:avaya:voice_portal:5.1:sp1:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:*:*:*:*", "cpe:2.3:a:avaya:voice_portal:5.1:-:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:aura_presence_services:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:aura_system_manager:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp3:*:*:*:*:*:*", "cpe:2.3:a:avaya:voice_portal:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:-:*:*:*:*:*:*", "cpe:2.3:a:avaya:aura_session_manager:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:aura_session_manager:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:aura_system_platform:6.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:avaya:aura_session_manager:1.1:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:iq:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:aura_system_manager:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:11:-:*:*:*:*:*:*", "cpe:2.3:a:avaya:aura_system_platform:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:aura_system_manager:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"]}], "openvas": [{"lastseen": "2017-12-21T11:32:30", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-2942", "CVE-2010-3477", "CVE-2010-3067"], "description": "Check for the Version of kernel", "modified": "2017-12-20T00:00:00", "published": "2010-10-22T00:00:00", "id": "OPENVAS:870344", "href": "http://plugins.openvas.org/nasl.php?oid=870344", "type": "openvas", "title": "RedHat Update for kernel RHSA-2010:0779-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for kernel RHSA-2010:0779-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n This update fixes the following security issues:\n \n * Information leak flaws were found in the Linux kernel Traffic Control\n Unit implementation. A local attacker could use these flaws to cause the\n kernel to leak kernel memory to user-space, possibly leading to the\n disclosure of sensitive information. (CVE-2010-2942, Moderate)\n \n * A flaw was found in the tcf_act_police_dump() function in the Linux\n kernel network traffic policing implementation. A data structure in\n tcf_act_police_dump() was not initialized properly before being copied to\n user-space. A local, unprivileged user could use this flaw to cause an\n information leak. (CVE-2010-3477, Moderate)\n \n * A missing upper bound integer check was found in the sys_io_submit()\n function in the Linux kernel asynchronous I/O implementation. A local,\n unprivileged user could use this flaw to cause an information leak.\n (CVE-2010-3067, Low)\n \n Red Hat would like to thank Tavis Ormandy for reporting CVE-2010-3067.\n \n This update also fixes the following bugs:\n \n * When two systems using bonding devices in the adaptive load balancing\n (ALB) mode communicated with each other, an endless loop of ARP replies\n started between these two systems due to a faulty MAC address update. With\n this update, the MAC address update no longer creates unneeded ARP replies.\n (BZ#629239)\n \n * When running the Connectathon NFS Testsuite with certain clients and Red\n Hat Enterprise Linux 4.8 as the server, nfsvers4, lock, and test2 failed\n the Connectathon test. (BZ#625535)\n \n * For UDP/UNIX domain sockets, due to insufficient memory barriers in the\n network code, a process sleeping in select() may have missed notifications\n about new data. In rare cases, this bug may have caused a process to sleep\n forever. (BZ#640117)\n \n * In certain situations, a bug found in either the HTB or TBF network\n packet schedulers in the Linux kernel could have caused a kernel panic when\n using Broadcom network cards with the bnx2 driver. (BZ#624363)\n \n * Previously, allocating fallback cqr for DASD reserve/release IOCTLs\n failed because it used the memory pool of the respective device. This\n update preallocates sufficient memory for a single reserve/release request.\n (BZ#626828)\n \n * In some situations a bug prevented "force online" succeeding for a DASD\n device. (BZ#626827)\n \n * Using the "fsstress" utility may have cause ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_affected = \"kernel on Red Hat Enterprise Linux AS version 4,\n Red Hat Enterprise Linux ES version 4,\n Red Hat Enterprise Linux WS version 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2010-October/msg00020.html\");\n script_id(870344);\n script_version(\"$Revision: 8186 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-20 07:30:34 +0100 (Wed, 20 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-10-22 16:42:09 +0200 (Fri, 22 Oct 2010)\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"RHSA\", value: \"2010:0779-01\");\n script_cve_id(\"CVE-2010-2942\", \"CVE-2010-3067\", \"CVE-2010-3477\");\n script_name(\"RedHat Update for kernel RHSA-2010:0779-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_4\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.9~89.31.1.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.9~89.31.1.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.9~89.31.1.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem\", rpm:\"kernel-hugemem~2.6.9~89.31.1.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem-devel\", rpm:\"kernel-hugemem-devel~2.6.9~89.31.1.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.9~89.31.1.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp-devel\", rpm:\"kernel-smp-devel~2.6.9~89.31.1.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU\", rpm:\"kernel-xenU~2.6.9~89.31.1.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU-devel\", rpm:\"kernel-xenU-devel~2.6.9~89.31.1.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.9~89.31.1.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-largesmp\", rpm:\"kernel-largesmp~2.6.9~89.31.1.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-largesmp-devel\", rpm:\"kernel-largesmp-devel~2.6.9~89.31.1.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-12-21T11:32:44", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-2942", "CVE-2010-3477", "CVE-2010-3067"], "description": "Check for the Version of kernel", "modified": "2017-12-20T00:00:00", "published": "2010-11-04T00:00:00", "id": "OPENVAS:880448", "href": "http://plugins.openvas.org/nasl.php?oid=880448", "type": "openvas", "title": "CentOS Update for kernel CESA-2010:0779 centos4 i386", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for kernel CESA-2010:0779 centos4 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n This update fixes the following security issues:\n\n * Information leak flaws were found in the Linux kernel Traffic Control\n Unit implementation. A local attacker could use these flaws to cause the\n kernel to leak kernel memory to user-space, possibly leading to the\n disclosure of sensitive information. (CVE-2010-2942, Moderate)\n\n * A flaw was found in the tcf_act_police_dump() function in the Linux\n kernel network traffic policing implementation. A data structure in\n tcf_act_police_dump() was not initialized properly before being copied to\n user-space. A local, unprivileged user could use this flaw to cause an\n information leak. (CVE-2010-3477, Moderate)\n\n * A missing upper bound integer check was found in the sys_io_submit()\n function in the Linux kernel asynchronous I/O implementation. A local,\n unprivileged user could use this flaw to cause an information leak.\n (CVE-2010-3067, Low)\n\n Red Hat would like to thank Tavis Ormandy for reporting CVE-2010-3067.\n\n This update also fixes the following bugs:\n\n * When two systems using bonding devices in the adaptive load balancing\n (ALB) mode communicated with each other, an endless loop of ARP replies\n started between these two systems due to a faulty MAC address update. With\n this update, the MAC address update no longer creates unneeded ARP replies.\n (BZ#629239)\n\n * When running the Connectathon NFS Testsuite with certain clients and Red\n Hat Enterprise Linux 4.8 as the server, nfsvers4, lock, and test2 failed\n the Connectathon test. (BZ#625535)\n\n * For UDP/UNIX domain sockets, due to insufficient memory barriers in the\n network code, a process sleeping in select() may have missed notifications\n about new data. In rare cases, this bug may have caused a process to sleep\n forever. (BZ#640117)\n\n * In certain situations, a bug found in either the HTB or TBF network\n packet schedulers in the Linux kernel could have caused a kernel panic when\n using Broadcom network cards with the bnx2 driver. (BZ#624363)\n\n * Previously, allocating fallback cqr for DASD reserve/release IOCTLs\n failed because it used the memory pool of the respective device. This\n update preallocates sufficient memory for a single reserve/release request.\n (BZ#626828)\n\n * In some situations a bug prevented "force online" succeeding for a DASD\n device. (BZ#626827)\n\n * Using the "fsstress" utility may have caused a kernel panic. (BZ#633968)\n\n * This update introduces additional stack guard patches. (BZ#632515)\n\n * ...\n\n Description truncated, for more information please check the Reference URL\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"kernel on CentOS 4\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2010-October/017107.html\");\n script_id(880448);\n script_version(\"$Revision: 8186 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-20 07:30:34 +0100 (Wed, 20 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-11-04 12:09:38 +0100 (Thu, 04 Nov 2010)\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"CESA\", value: \"2010:0779\");\n script_cve_id(\"CVE-2010-2942\", \"CVE-2010-3067\", \"CVE-2010-3477\");\n script_name(\"CentOS Update for kernel CESA-2010:0779 centos4 i386\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.9~89.31.1.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.9~89.31.1.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem\", rpm:\"kernel-hugemem~2.6.9~89.31.1.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem-devel\", rpm:\"kernel-hugemem-devel~2.6.9~89.31.1.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.9~89.31.1.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp-devel\", rpm:\"kernel-smp-devel~2.6.9~89.31.1.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU\", rpm:\"kernel-xenU~2.6.9~89.31.1.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU-devel\", rpm:\"kernel-xenU-devel~2.6.9~89.31.1.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.9~89.31.1.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-01-18T11:04:50", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-2942", "CVE-2010-3477", "CVE-2010-3067"], "description": "Check for the Version of kernel", "modified": "2018-01-17T00:00:00", "published": "2010-11-04T00:00:00", "id": "OPENVAS:1361412562310880448", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880448", "type": "openvas", "title": "CentOS Update for kernel CESA-2010:0779 centos4 i386", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for kernel CESA-2010:0779 centos4 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n This update fixes the following security issues:\n\n * Information leak flaws were found in the Linux kernel Traffic Control\n Unit implementation. A local attacker could use these flaws to cause the\n kernel to leak kernel memory to user-space, possibly leading to the\n disclosure of sensitive information. (CVE-2010-2942, Moderate)\n\n * A flaw was found in the tcf_act_police_dump() function in the Linux\n kernel network traffic policing implementation. A data structure in\n tcf_act_police_dump() was not initialized properly before being copied to\n user-space. A local, unprivileged user could use this flaw to cause an\n information leak. (CVE-2010-3477, Moderate)\n\n * A missing upper bound integer check was found in the sys_io_submit()\n function in the Linux kernel asynchronous I/O implementation. A local,\n unprivileged user could use this flaw to cause an information leak.\n (CVE-2010-3067, Low)\n\n Red Hat would like to thank Tavis Ormandy for reporting CVE-2010-3067.\n\n This update also fixes the following bugs:\n\n * When two systems using bonding devices in the adaptive load balancing\n (ALB) mode communicated with each other, an endless loop of ARP replies\n started between these two systems due to a faulty MAC address update. With\n this update, the MAC address update no longer creates unneeded ARP replies.\n (BZ#629239)\n\n * When running the Connectathon NFS Testsuite with certain clients and Red\n Hat Enterprise Linux 4.8 as the server, nfsvers4, lock, and test2 failed\n the Connectathon test. (BZ#625535)\n\n * For UDP/UNIX domain sockets, due to insufficient memory barriers in the\n network code, a process sleeping in select() may have missed notifications\n about new data. In rare cases, this bug may have caused a process to sleep\n forever. (BZ#640117)\n\n * In certain situations, a bug found in either the HTB or TBF network\n packet schedulers in the Linux kernel could have caused a kernel panic when\n using Broadcom network cards with the bnx2 driver. (BZ#624363)\n\n * Previously, allocating fallback cqr for DASD reserve/release IOCTLs\n failed because it used the memory pool of the respective device. This\n update preallocates sufficient memory for a single reserve/release request.\n (BZ#626828)\n\n * In some situations a bug prevented "force online" succeeding for a DASD\n device. (BZ#626827)\n\n * Using the "fsstress" utility may have caused a kernel panic. (BZ#633968)\n\n * This update introduces additional stack guard patches. (BZ#632515)\n\n * ...\n\n Description truncated, for more information please check the Reference URL\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"kernel on CentOS 4\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2010-October/017107.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.880448\");\n script_version(\"$Revision: 8447 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-17 17:12:19 +0100 (Wed, 17 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-11-04 12:09:38 +0100 (Thu, 04 Nov 2010)\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"CESA\", value: \"2010:0779\");\n script_cve_id(\"CVE-2010-2942\", \"CVE-2010-3067\", \"CVE-2010-3477\");\n script_name(\"CentOS Update for kernel CESA-2010:0779 centos4 i386\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.9~89.31.1.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.9~89.31.1.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem\", rpm:\"kernel-hugemem~2.6.9~89.31.1.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem-devel\", rpm:\"kernel-hugemem-devel~2.6.9~89.31.1.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.9~89.31.1.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp-devel\", rpm:\"kernel-smp-devel~2.6.9~89.31.1.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU\", rpm:\"kernel-xenU~2.6.9~89.31.1.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU-devel\", rpm:\"kernel-xenU-devel~2.6.9~89.31.1.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.9~89.31.1.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-01-18T11:04:38", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-2942", "CVE-2010-3477", "CVE-2010-3067"], "description": "Check for the Version of kernel", "modified": "2018-01-17T00:00:00", "published": "2010-10-22T00:00:00", "id": "OPENVAS:1361412562310870344", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870344", "type": "openvas", "title": "RedHat Update for kernel RHSA-2010:0779-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for kernel RHSA-2010:0779-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n This update fixes the following security issues:\n \n * Information leak flaws were found in the Linux kernel Traffic Control\n Unit implementation. A local attacker could use these flaws to cause the\n kernel to leak kernel memory to user-space, possibly leading to the\n disclosure of sensitive information. (CVE-2010-2942, Moderate)\n \n * A flaw was found in the tcf_act_police_dump() function in the Linux\n kernel network traffic policing implementation. A data structure in\n tcf_act_police_dump() was not initialized properly before being copied to\n user-space. A local, unprivileged user could use this flaw to cause an\n information leak. (CVE-2010-3477, Moderate)\n \n * A missing upper bound integer check was found in the sys_io_submit()\n function in the Linux kernel asynchronous I/O implementation. A local,\n unprivileged user could use this flaw to cause an information leak.\n (CVE-2010-3067, Low)\n \n Red Hat would like to thank Tavis Ormandy for reporting CVE-2010-3067.\n \n This update also fixes the following bugs:\n \n * When two systems using bonding devices in the adaptive load balancing\n (ALB) mode communicated with each other, an endless loop of ARP replies\n started between these two systems due to a faulty MAC address update. With\n this update, the MAC address update no longer creates unneeded ARP replies.\n (BZ#629239)\n \n * When running the Connectathon NFS Testsuite with certain clients and Red\n Hat Enterprise Linux 4.8 as the server, nfsvers4, lock, and test2 failed\n the Connectathon test. (BZ#625535)\n \n * For UDP/UNIX domain sockets, due to insufficient memory barriers in the\n network code, a process sleeping in select() may have missed notifications\n about new data. In rare cases, this bug may have caused a process to sleep\n forever. (BZ#640117)\n \n * In certain situations, a bug found in either the HTB or TBF network\n packet schedulers in the Linux kernel could have caused a kernel panic when\n using Broadcom network cards with the bnx2 driver. (BZ#624363)\n \n * Previously, allocating fallback cqr for DASD reserve/release IOCTLs\n failed because it used the memory pool of the respective device. This\n update preallocates sufficient memory for a single reserve/release request.\n (BZ#626828)\n \n * In some situations a bug prevented "force online" succeeding for a DASD\n device. (BZ#626827)\n \n * Using the "fsstress" utility may have cause ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_affected = \"kernel on Red Hat Enterprise Linux AS version 4,\n Red Hat Enterprise Linux ES version 4,\n Red Hat Enterprise Linux WS version 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2010-October/msg00020.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870344\");\n script_version(\"$Revision: 8440 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-17 08:58:46 +0100 (Wed, 17 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-10-22 16:42:09 +0200 (Fri, 22 Oct 2010)\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"RHSA\", value: \"2010:0779-01\");\n script_cve_id(\"CVE-2010-2942\", \"CVE-2010-3067\", \"CVE-2010-3477\");\n script_name(\"RedHat Update for kernel RHSA-2010:0779-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_4\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.9~89.31.1.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.9~89.31.1.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.9~89.31.1.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem\", rpm:\"kernel-hugemem~2.6.9~89.31.1.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem-devel\", rpm:\"kernel-hugemem-devel~2.6.9~89.31.1.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.9~89.31.1.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp-devel\", rpm:\"kernel-smp-devel~2.6.9~89.31.1.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU\", rpm:\"kernel-xenU~2.6.9~89.31.1.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU-devel\", rpm:\"kernel-xenU-devel~2.6.9~89.31.1.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.9~89.31.1.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-largesmp\", rpm:\"kernel-largesmp~2.6.9~89.31.1.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-largesmp-devel\", rpm:\"kernel-largesmp-devel~2.6.9~89.31.1.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:37:07", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-3904", "CVE-2010-3477", "CVE-2010-3067"], "description": "Oracle Linux Local Security Checks ELSA-2010-2009", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310122306", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310122306", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2010-2009", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2010-2009.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.122306\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:16:23 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2010-2009\");\n script_tag(name:\"insight\", value:\"ELSA-2010-2009 - Oracle Linux 5 Unbreakable Enterprise kernel security fix update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2010-2009\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2010-2009.html\");\n script_cve_id(\"CVE-2010-3067\", \"CVE-2010-3477\", \"CVE-2010-3904\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.32~100.21.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.32~100.21.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.32~100.21.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.32~100.21.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.32~100.21.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-firmware\", rpm:\"kernel-firmware~2.6.32~100.21.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.32~100.21.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ofa\", rpm:\"ofa~2.6.32~100.21.1.el5~1.5.1~4.0.23\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:42", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-3078", "CVE-2010-3477", "CVE-2010-3086", "CVE-2010-3066", "CVE-2010-3067", "CVE-2010-3448"], "description": "Oracle Linux Local Security Checks ELSA-2010-0839", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310122298", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310122298", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2010-0839", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2010-0839.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.122298\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:16:14 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2010-0839\");\n script_tag(name:\"insight\", value:\"ELSA-2010-0839 - kernel security and bug fix update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2010-0839\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2010-0839.html\");\n script_cve_id(\"CVE-2010-3066\", \"CVE-2010-3067\", \"CVE-2010-3078\", \"CVE-2010-3086\", \"CVE-2010-3477\", \"CVE-2010-3448\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~194.26.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~194.26.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~194.26.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~194.26.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~194.26.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~194.26.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~194.26.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~194.26.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~194.26.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~194.26.1.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~194.26.1.0.1.el5~1.4.7~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~194.26.1.0.1.el5PAE~1.4.7~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~194.26.1.0.1.el5debug~1.4.7~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~194.26.1.0.1.el5xen~1.4.7~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"oracleasm\", rpm:\"oracleasm~2.6.18~194.26.1.0.1.el5~2.0.5~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"oracleasm\", rpm:\"oracleasm~2.6.18~194.26.1.0.1.el5PAE~2.0.5~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"oracleasm\", rpm:\"oracleasm~2.6.18~194.26.1.0.1.el5debug~2.0.5~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"oracleasm\", rpm:\"oracleasm~2.6.18~194.26.1.0.1.el5xen~2.0.5~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2017-12-21T11:32:39", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-3078", "CVE-2010-3477", "CVE-2010-3086", "CVE-2010-2963", "CVE-2010-3066", "CVE-2010-3067"], "description": "Check for the Version of kernel", "modified": "2017-12-20T00:00:00", "published": "2010-11-16T00:00:00", "id": "OPENVAS:870358", "href": "http://plugins.openvas.org/nasl.php?oid=870358", "type": "openvas", "title": "RedHat Update for kernel RHSA-2010:0839-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for kernel RHSA-2010:0839-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n This update fixes the following security issues:\n \n * A NULL pointer dereference flaw was found in the io_submit_one() function\n in the Linux kernel asynchronous I/O implementation. A local, unprivileged\n user could use this flaw to cause a denial of service. (CVE-2010-3066,\n Moderate)\n \n * A flaw was found in the xfs_ioc_fsgetxattr() function in the Linux kernel\n XFS file system implementation. A data structure in xfs_ioc_fsgetxattr()\n was not initialized properly before being copied to user-space. A local,\n unprivileged user could use this flaw to cause an information leak.\n (CVE-2010-3078, Moderate)\n \n * The exception fixup code for the __futex_atomic_op1, __futex_atomic_op2,\n and futex_atomic_cmpxchg_inatomic() macros replaced the LOCK prefix with a\n NOP instruction. A local, unprivileged user could use this flaw to cause a\n denial of service. (CVE-2010-3086, Moderate)\n \n * A flaw was found in the tcf_act_police_dump() function in the Linux\n kernel network traffic policing implementation. A data structure in\n tcf_act_police_dump() was not initialized properly before being copied to\n user-space. A local, unprivileged user could use this flaw to cause an\n information leak. (CVE-2010-3477, Moderate)\n \n * A missing upper bound integer check was found in the sys_io_submit()\n function in the Linux kernel asynchronous I/O implementation. A local,\n unprivileged user could use this flaw to cause an information leak.\n (CVE-2010-3067, Low)\n \n Red Hat would like to thank Tavis Ormandy for reporting CVE-2010-3066,\n CVE-2010-3086, and CVE-2010-3067, and Dan Rosenberg for reporting\n CVE-2010-3078.\n \n This update also fixes several bugs. Documentation for these bug fixes will\n be available shortly from the Technical Notes document linked to in the\n References section.\n \n Users should upgrade to these updated packages, which contain backported\n patches to correct these issues. The system must be rebooted for this\n update to take effect.\";\n\ntag_affected = \"kernel on Red Hat Enterprise Linux (v. 5 server)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2010-November/msg00008.html\");\n script_id(870358);\n script_version(\"$Revision: 8186 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-20 07:30:34 +0100 (Wed, 20 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-11-16 14:49:48 +0100 (Tue, 16 Nov 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:H/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"RHSA\", value: \"2010:0839-01\");\n script_cve_id(\"CVE-2010-3066\", \"CVE-2010-3067\", \"CVE-2010-3078\", \"CVE-2010-3086\", \"CVE-2010-3477\", \"CVE-2010-2963\");\n script_name(\"RedHat Update for kernel RHSA-2010:0839-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-debuginfo\", rpm:\"kernel-PAE-debuginfo~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-debuginfo\", rpm:\"kernel-xen-debuginfo~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.2, "vector": "AV:LOCAL/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:39:36", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-3078", "CVE-2010-3477", "CVE-2010-3086", "CVE-2010-2963", "CVE-2010-3066", "CVE-2010-3067"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2011-08-09T00:00:00", "id": "OPENVAS:1361412562310880602", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880602", "type": "openvas", "title": "CentOS Update for kernel CESA-2010:0839 centos5 i386", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for kernel CESA-2010:0839 centos5 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2010-November/017159.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.880602\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:H/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"CESA\", value:\"2010:0839\");\n script_cve_id(\"CVE-2010-3066\", \"CVE-2010-3067\", \"CVE-2010-3078\", \"CVE-2010-3086\", \"CVE-2010-3477\", \"CVE-2010-2963\");\n script_name(\"CentOS Update for kernel CESA-2010:0839 centos5 i386\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS5\");\n script_tag(name:\"affected\", value:\"kernel on CentOS 5\");\n script_tag(name:\"insight\", value:\"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n This update fixes the following security issues:\n\n * A NULL pointer dereference flaw was found in the io_submit_one() function\n in the Linux kernel asynchronous I/O implementation. A local, unprivileged\n user could use this flaw to cause a denial of service. (CVE-2010-3066,\n Moderate)\n\n * A flaw was found in the xfs_ioc_fsgetxattr() function in the Linux kernel\n XFS file system implementation. A data structure in xfs_ioc_fsgetxattr()\n was not initialized properly before being copied to user-space. A local,\n unprivileged user could use this flaw to cause an information leak.\n (CVE-2010-3078, Moderate)\n\n * The exception fixup code for the __futex_atomic_op1, __futex_atomic_op2,\n and futex_atomic_cmpxchg_inatomic() macros replaced the LOCK prefix with a\n NOP instruction. A local, unprivileged user could use this flaw to cause a\n denial of service. (CVE-2010-3086, Moderate)\n\n * A flaw was found in the tcf_act_police_dump() function in the Linux\n kernel network traffic policing implementation. A data structure in\n tcf_act_police_dump() was not initialized properly before being copied to\n user-space. A local, unprivileged user could use this flaw to cause an\n information leak. (CVE-2010-3477, Moderate)\n\n * A missing upper bound integer check was found in the sys_io_submit()\n function in the Linux kernel asynchronous I/O implementation. A local,\n unprivileged user could use this flaw to cause an information leak.\n (CVE-2010-3067, Low)\n\n Red Hat would like to thank Tavis Ormandy for reporting CVE-2010-3066,\n CVE-2010-3086, and CVE-2010-3067, and Dan Rosenberg for reporting\n CVE-2010-3078.\n\n This update also fixes several bugs. Documentation for these bug fixes will\n be available shortly from the Technical Notes document linked to in the\n References section.\n\n Users should upgrade to these updated packages, which contain backported\n patches to correct these issues. The system must be rebooted for this\n update to take effect.\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~194.26.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~194.26.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~194.26.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~194.26.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~194.26.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~194.26.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~194.26.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~194.26.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~194.26.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~194.26.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.2, "vector": "AV:L/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-25T10:55:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-3078", "CVE-2010-3477", "CVE-2010-3086", "CVE-2010-2963", "CVE-2010-3066", "CVE-2010-3067"], "description": "Check for the Version of kernel", "modified": "2017-07-10T00:00:00", "published": "2011-08-09T00:00:00", "id": "OPENVAS:880602", "href": "http://plugins.openvas.org/nasl.php?oid=880602", "type": "openvas", "title": "CentOS Update for kernel CESA-2010:0839 centos5 i386", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for kernel CESA-2010:0839 centos5 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n This update fixes the following security issues:\n \n * A NULL pointer dereference flaw was found in the io_submit_one() function\n in the Linux kernel asynchronous I/O implementation. A local, unprivileged\n user could use this flaw to cause a denial of service. (CVE-2010-3066,\n Moderate)\n \n * A flaw was found in the xfs_ioc_fsgetxattr() function in the Linux kernel\n XFS file system implementation. A data structure in xfs_ioc_fsgetxattr()\n was not initialized properly before being copied to user-space. A local,\n unprivileged user could use this flaw to cause an information leak.\n (CVE-2010-3078, Moderate)\n \n * The exception fixup code for the __futex_atomic_op1, __futex_atomic_op2,\n and futex_atomic_cmpxchg_inatomic() macros replaced the LOCK prefix with a\n NOP instruction. A local, unprivileged user could use this flaw to cause a\n denial of service. (CVE-2010-3086, Moderate)\n \n * A flaw was found in the tcf_act_police_dump() function in the Linux\n kernel network traffic policing implementation. A data structure in\n tcf_act_police_dump() was not initialized properly before being copied to\n user-space. A local, unprivileged user could use this flaw to cause an\n information leak. (CVE-2010-3477, Moderate)\n \n * A missing upper bound integer check was found in the sys_io_submit()\n function in the Linux kernel asynchronous I/O implementation. A local,\n unprivileged user could use this flaw to cause an information leak.\n (CVE-2010-3067, Low)\n \n Red Hat would like to thank Tavis Ormandy for reporting CVE-2010-3066,\n CVE-2010-3086, and CVE-2010-3067, and Dan Rosenberg for reporting\n CVE-2010-3078.\n \n This update also fixes several bugs. Documentation for these bug fixes will\n be available shortly from the Technical Notes document linked to in the\n References section.\n \n Users should upgrade to these updated packages, which contain backported\n patches to correct these issues. The system must be rebooted for this\n update to take effect.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"kernel on CentOS 5\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2010-November/017159.html\");\n script_id(880602);\n script_version(\"$Revision: 6653 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:46:53 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:H/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2010:0839\");\n script_cve_id(\"CVE-2010-3066\", \"CVE-2010-3067\", \"CVE-2010-3078\", \"CVE-2010-3086\", \"CVE-2010-3477\", \"CVE-2010-2963\");\n script_name(\"CentOS Update for kernel CESA-2010:0839 centos5 i386\");\n\n script_summary(\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~194.26.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~194.26.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~194.26.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~194.26.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~194.26.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~194.26.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~194.26.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~194.26.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~194.26.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~194.26.1.el5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.2, "vector": "AV:LOCAL/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-01-18T11:04:46", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-3078", "CVE-2010-3477", "CVE-2010-3086", "CVE-2010-2963", "CVE-2010-3066", "CVE-2010-3067"], "description": "Check for the Version of kernel", "modified": "2018-01-17T00:00:00", "published": "2010-11-16T00:00:00", "id": "OPENVAS:1361412562310870358", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870358", "type": "openvas", "title": "RedHat Update for kernel RHSA-2010:0839-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for kernel RHSA-2010:0839-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n This update fixes the following security issues:\n \n * A NULL pointer dereference flaw was found in the io_submit_one() function\n in the Linux kernel asynchronous I/O implementation. A local, unprivileged\n user could use this flaw to cause a denial of service. (CVE-2010-3066,\n Moderate)\n \n * A flaw was found in the xfs_ioc_fsgetxattr() function in the Linux kernel\n XFS file system implementation. A data structure in xfs_ioc_fsgetxattr()\n was not initialized properly before being copied to user-space. A local,\n unprivileged user could use this flaw to cause an information leak.\n (CVE-2010-3078, Moderate)\n \n * The exception fixup code for the __futex_atomic_op1, __futex_atomic_op2,\n and futex_atomic_cmpxchg_inatomic() macros replaced the LOCK prefix with a\n NOP instruction. A local, unprivileged user could use this flaw to cause a\n denial of service. (CVE-2010-3086, Moderate)\n \n * A flaw was found in the tcf_act_police_dump() function in the Linux\n kernel network traffic policing implementation. A data structure in\n tcf_act_police_dump() was not initialized properly before being copied to\n user-space. A local, unprivileged user could use this flaw to cause an\n information leak. (CVE-2010-3477, Moderate)\n \n * A missing upper bound integer check was found in the sys_io_submit()\n function in the Linux kernel asynchronous I/O implementation. A local,\n unprivileged user could use this flaw to cause an information leak.\n (CVE-2010-3067, Low)\n \n Red Hat would like to thank Tavis Ormandy for reporting CVE-2010-3066,\n CVE-2010-3086, and CVE-2010-3067, and Dan Rosenberg for reporting\n CVE-2010-3078.\n \n This update also fixes several bugs. Documentation for these bug fixes will\n be available shortly from the Technical Notes document linked to in the\n References section.\n \n Users should upgrade to these updated packages, which contain backported\n patches to correct these issues. The system must be rebooted for this\n update to take effect.\";\n\ntag_affected = \"kernel on Red Hat Enterprise Linux (v. 5 server)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2010-November/msg00008.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870358\");\n script_version(\"$Revision: 8447 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-17 17:12:19 +0100 (Wed, 17 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-11-16 14:49:48 +0100 (Tue, 16 Nov 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:H/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"RHSA\", value: \"2010:0839-01\");\n script_cve_id(\"CVE-2010-3066\", \"CVE-2010-3067\", \"CVE-2010-3078\", \"CVE-2010-3086\", \"CVE-2010-3477\", \"CVE-2010-2963\");\n script_name(\"RedHat Update for kernel RHSA-2010:0839-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-debuginfo\", rpm:\"kernel-PAE-debuginfo~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-debuginfo\", rpm:\"kernel-xen-debuginfo~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~194.26.1.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.2, "vector": "AV:LOCAL/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "redhat": [{"lastseen": "2019-08-13T18:45:13", "bulletinFamily": "unix", "cvelist": ["CVE-2010-2942", "CVE-2010-3067", "CVE-2010-3477"], "description": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* Information leak flaws were found in the Linux kernel Traffic Control\nUnit implementation. A local attacker could use these flaws to cause the\nkernel to leak kernel memory to user-space, possibly leading to the\ndisclosure of sensitive information. (CVE-2010-2942, Moderate)\n\n* A flaw was found in the tcf_act_police_dump() function in the Linux\nkernel network traffic policing implementation. A data structure in\ntcf_act_police_dump() was not initialized properly before being copied to\nuser-space. A local, unprivileged user could use this flaw to cause an\ninformation leak. (CVE-2010-3477, Moderate)\n\n* A missing upper bound integer check was found in the sys_io_submit()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3067, Low)\n\nRed Hat would like to thank Tavis Ormandy for reporting CVE-2010-3067.\n\nThis update also fixes the following bugs:\n\n* When two systems using bonding devices in the adaptive load balancing\n(ALB) mode communicated with each other, an endless loop of ARP replies\nstarted between these two systems due to a faulty MAC address update. With\nthis update, the MAC address update no longer creates unneeded ARP replies.\n(BZ#629239)\n\n* When running the Connectathon NFS Testsuite with certain clients and Red\nHat Enterprise Linux 4.8 as the server, nfsvers4, lock, and test2 failed\nthe Connectathon test. (BZ#625535)\n\n* For UDP/UNIX domain sockets, due to insufficient memory barriers in the\nnetwork code, a process sleeping in select() may have missed notifications\nabout new data. In rare cases, this bug may have caused a process to sleep\nforever. (BZ#640117)\n\n* In certain situations, a bug found in either the HTB or TBF network\npacket schedulers in the Linux kernel could have caused a kernel panic when\nusing Broadcom network cards with the bnx2 driver. (BZ#624363)\n\n* Previously, allocating fallback cqr for DASD reserve/release IOCTLs\nfailed because it used the memory pool of the respective device. This\nupdate preallocates sufficient memory for a single reserve/release request.\n(BZ#626828)\n\n* In some situations a bug prevented \"force online\" succeeding for a DASD\ndevice. (BZ#626827)\n\n* Using the \"fsstress\" utility may have caused a kernel panic. (BZ#633968)\n\n* This update introduces additional stack guard patches. (BZ#632515)\n\n* A bug was found in the way the megaraid_sas driver handled physical disks\nand management IOCTLs. All physical disks were exported to the disk layer,\nallowing an oops in megasas_complete_cmd_dpc() when completing the IOCTL\ncommand if a timeout occurred. (BZ#631903)\n\n* Previously, a warning message was returned when a large amount of\nmessages was passed through netconsole and a considerable amount of network\nload was added. With this update, the warning message is no longer\ndisplayed. (BZ#637729)\n\n* Executing a large \"dd\" command (1 to 5GB) on an iSCSI device with the\nqla3xxx driver caused a system crash due to the incorrect storing of a\nprivate data structure. With this update, the size of the stored data\nstructure is checked and the system crashes no longer occur. (BZ#624364)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.\n", "modified": "2017-09-08T12:09:03", "published": "2010-10-19T04:00:00", "id": "RHSA-2010:0779", "href": "https://access.redhat.com/errata/RHSA-2010:0779", "type": "redhat", "title": "(RHSA-2010:0779) Moderate: kernel security and bug fix update", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-12-11T13:33:32", "bulletinFamily": "unix", "cvelist": ["CVE-2010-3066", "CVE-2010-3067", "CVE-2010-3078", "CVE-2010-3086", "CVE-2010-3448", "CVE-2010-3477"], "description": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* A NULL pointer dereference flaw was found in the io_submit_one() function\nin the Linux kernel asynchronous I/O implementation. A local, unprivileged\nuser could use this flaw to cause a denial of service. (CVE-2010-3066,\nModerate)\n\n* A flaw was found in the xfs_ioc_fsgetxattr() function in the Linux kernel\nXFS file system implementation. A data structure in xfs_ioc_fsgetxattr()\nwas not initialized properly before being copied to user-space. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3078, Moderate)\n\n* The exception fixup code for the __futex_atomic_op1, __futex_atomic_op2,\nand futex_atomic_cmpxchg_inatomic() macros replaced the LOCK prefix with a\nNOP instruction. A local, unprivileged user could use this flaw to cause a\ndenial of service. (CVE-2010-3086, Moderate)\n\n* A flaw was found in the tcf_act_police_dump() function in the Linux\nkernel network traffic policing implementation. A data structure in\ntcf_act_police_dump() was not initialized properly before being copied to\nuser-space. A local, unprivileged user could use this flaw to cause an\ninformation leak. (CVE-2010-3477, Moderate)\n\n* A missing upper bound integer check was found in the sys_io_submit()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3067, Low)\n\nRed Hat would like to thank Tavis Ormandy for reporting CVE-2010-3066,\nCVE-2010-3086, and CVE-2010-3067, and Dan Rosenberg for reporting\nCVE-2010-3078.\n\nThis update also fixes several bugs. Documentation for these bug fixes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.\n", "modified": "2017-09-08T12:15:37", "published": "2010-11-09T05:00:00", "id": "RHSA-2010:0839", "href": "https://access.redhat.com/errata/RHSA-2010:0839", "type": "redhat", "title": "(RHSA-2010:0839) Moderate: kernel security and bug fix update", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:46:25", "bulletinFamily": "unix", "cvelist": ["CVE-2010-2240", "CVE-2010-3067", "CVE-2010-3081"], "description": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* The compat_alloc_user_space() function in the Linux kernel 32/64-bit\ncompatibility layer implementation was missing sanity checks. This function\ncould be abused in other areas of the Linux kernel if its length argument\ncan be controlled from user-space. On 64-bit systems, a local, unprivileged\nuser could use this flaw to escalate their privileges. (CVE-2010-3081,\nImportant)\n\n* A missing upper bound integer check was found in the sys_io_submit()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3067, Low)\n\nRed Hat would like to thank Ben Hawkes for reporting CVE-2010-3081, and\nTavis Ormandy for reporting CVE-2010-3067.\n\nThis update also fixes the following bugs:\n\n* The RHSA-2010:0631 kernel-rt update resolved an issue (CVE-2010-2240)\nwhere, when an application has a stack overflow, the stack could silently\noverwrite another memory mapped area instead of a segmentation fault\noccurring. This update implements the official upstream fixes for that\nissue. Note: This is not a security regression. The original fix was\ncomplete. (BZ#624604)\n\n* In certain circumstances, under heavy load, certain network interface\ncards using the bnx2 driver, and configured to use MSI-X, could stop\nprocessing interrupts and then network connectivity would cease.\n(BZ#622952)\n\n* This update upgrades the tg3 driver to version 3.110. (BZ#640334)\n\nUsers are advised to upgrade to these updated packages, which contain\nbackported patches to correct these issues. The system must be rebooted for\nthis update to take effect.\n", "modified": "2019-03-22T23:44:19", "published": "2010-10-07T04:00:00", "id": "RHSA-2010:0758", "href": "https://access.redhat.com/errata/RHSA-2010:0758", "type": "redhat", "title": "(RHSA-2010:0758) Important: kernel-rt security and bug fix update", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:45:12", "bulletinFamily": "unix", "cvelist": ["CVE-2010-0307", "CVE-2010-2942", "CVE-2010-2955", "CVE-2010-3297"], "description": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* On AMD64 systems, it was discovered that the kernel did not ensure the\nELF interpreter was available before making a call to the SET_PERSONALITY\nmacro. A local attacker could use this flaw to cause a denial of service by\nrunning a 32-bit application that attempts to execute a 64-bit application.\n(CVE-2010-0307, Moderate)\n\n* Information leak flaws were found in the Linux kernel Traffic Control\nUnit implementation. A local attacker could use these flaws to cause the\nkernel to leak kernel memory to user-space, possibly leading to the\ndisclosure of sensitive information. (CVE-2010-2942, Moderate)\n\n* It was found that wireless drivers might not always clear allocated\nbuffers when handling a driver-specific IOCTL information request. A local\nuser could trigger this flaw to cause kernel memory to leak from the heap\nto user-space, leading to an information leak. (CVE-2010-2955, Moderate)\n\n* A flaw was found in the eql_g_master_cfg() function in the Linux kernel\nequalizer load-balancer for serial network interfaces implementation. A\ndata structure in eql_g_master_cfg() was not initialized properly before\nbeing copied to user-space. A local, unprivileged user could use this flaw\nto cause an information leak. (CVE-2010-3297, Moderate)\n\nRed Hat would like to thank Mathias Krause for reporting CVE-2010-0307, and\nDan Rosenberg for reporting CVE-2010-3297.\n\nThis update also fixes the following bugs:\n\n* The mkinitrd utility reported the following warning message when creating\nan initial ramdisk:\n\nNo module dm-mem-cache found for kernel [version], aborting.\n\nThis was caused by an erroneous dependency on dmraid-related modules. This\nupdate removes these dependencies with the result that mkinitrd does not\nissue a spurious warning about the dm-mem-cache module not being found.\n(BZ#482753)\n\n* The ibm_rtl kernel module now performs more exhaustive checking to ensure\nit only loads on correct IBM hardware. (BZ#612275)\n\n* The realtime Linux kernel has been upgraded to upstream version\n2.6.33.7-rt29, which provides a number of bug fixes and enhancements for\nRed Hat Enterprise MRG 1.3. (BZ#638672)\n\nUsers should upgrade to these updated packages, which upgrade the kernel-rt\nkernel to version 2.6.33.7-rt29 to correct these issues. The system must be\nrebooted for this update to take effect.\n", "modified": "2019-03-22T23:44:54", "published": "2010-10-14T04:00:00", "id": "RHSA-2010:0771", "href": "https://access.redhat.com/errata/RHSA-2010:0771", "type": "redhat", "title": "(RHSA-2010:0771) Moderate: kernel-rt security and bug fix update", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-08-11T10:05:40", "bulletinFamily": "unix", "cvelist": ["CVE-2010-1083", "CVE-2010-2492", "CVE-2010-2798", "CVE-2010-2938", "CVE-2010-2942", "CVE-2010-2943", "CVE-2010-3015"], "description": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* A buffer overflow flaw was found in the ecryptfs_uid_hash() function in\nthe Linux kernel eCryptfs implementation. On systems that have the eCryptfs\nnetlink transport (Red Hat Enterprise Linux 5 does) or where the\n\"/dev/ecryptfs\" file has world writable permissions (which it does not, by\ndefault, on Red Hat Enterprise Linux 5), a local, unprivileged user could\nuse this flaw to cause a denial of service or possibly escalate their\nprivileges. (CVE-2010-2492, Important)\n\n* A miscalculation of the size of the free space of the initial directory\nentry in a directory leaf block was found in the Linux kernel Global File\nSystem 2 (GFS2) implementation. A local, unprivileged user with write\naccess to a GFS2-mounted file system could perform a rename operation on\nthat file system to trigger a NULL pointer dereference, possibly resulting\nin a denial of service or privilege escalation. (CVE-2010-2798, Important)\n\n* A flaw was found in the Xen hypervisor implementation when running a\nsystem that has an Intel CPU without Extended Page Tables (EPT) support.\nWhile attempting to dump information about a crashing fully-virtualized\nguest, the flaw could cause the hypervisor to crash the host as well. A\nuser with permissions to configure a fully-virtualized guest system could\nuse this flaw to crash the host. (CVE-2010-2938, Moderate)\n\n* Information leak flaws were found in the Linux kernel's Traffic Control\nUnit implementation. A local attacker could use these flaws to cause the\nkernel to leak kernel memory to user-space, possibly leading to the\ndisclosure of sensitive information. (CVE-2010-2942, Moderate)\n\n* A flaw was found in the Linux kernel's XFS file system implementation.\nThe file handle lookup could return an invalid inode as valid. If an XFS\nfile system was mounted via NFS (Network File System), a local attacker\ncould access stale data or overwrite existing data that reused the inodes.\n(CVE-2010-2943, Moderate)\n\n* An integer overflow flaw was found in the extent range checking code in\nthe Linux kernel's ext4 file system implementation. A local, unprivileged\nuser with write access to an ext4-mounted file system could trigger this\nflaw by writing to a file at a very large file offset, resulting in a local\ndenial of service. (CVE-2010-3015, Moderate)\n\n* An information leak flaw was found in the Linux kernel's USB\nimplementation. Certain USB errors could result in an uninitialized kernel\nbuffer being sent to user-space. An attacker with physical access to a\ntarget system could use this flaw to cause an information leak.\n(CVE-2010-1083, Low)\n\nRed Hat would like to thank Andre Osterhues for reporting CVE-2010-2492;\nGrant Diffey of CenITex for reporting CVE-2010-2798; Toshiyuki Okajima for\nreporting CVE-2010-3015; and Marcus Meissner for reporting CVE-2010-1083.\n\nThis update also fixes several bugs. Documentation for these bug fixes will\nbe available shortly from the Technical Notes document linked to in the\nReferences.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.\n", "modified": "2017-09-08T11:48:02", "published": "2010-09-29T04:00:00", "id": "RHSA-2010:0723", "href": "https://access.redhat.com/errata/RHSA-2010:0723", "type": "redhat", "title": "(RHSA-2010:0723) Important: kernel security and bug fix update", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-08T12:03:58", "bulletinFamily": "unix", "cvelist": ["CVE-2010-2492", "CVE-2010-3067", "CVE-2010-3078", "CVE-2010-3080", "CVE-2010-3298", "CVE-2010-3477", "CVE-2010-3861", "CVE-2010-3865", "CVE-2010-3874", "CVE-2010-3876", "CVE-2010-3880", "CVE-2010-4072", "CVE-2010-4073", "CVE-2010-4074", "CVE-2010-4075", "CVE-2010-4077", "CVE-2010-4079", "CVE-2010-4080", "CVE-2010-4081", "CVE-2010-4082", "CVE-2010-4083", "CVE-2010-4158", "CVE-2010-4160", "CVE-2010-4162", "CVE-2010-4163", "CVE-2010-4242", "CVE-2010-4248", "CVE-2010-4249", "CVE-2010-4263", "CVE-2010-4525", "CVE-2010-4668"], "description": "* Buffer overflow in eCryptfs. When /dev/ecryptfs has world writable\npermissions (which it does not, by default, on Red Hat Enterprise Linux 6),\na local, unprivileged user could use this flaw to cause a denial of service\nor possibly escalate their privileges. (CVE-2010-2492, Important)\n\n* Integer overflow in the RDS protocol implementation could allow a local,\nunprivileged user to cause a denial of service or escalate their\nprivileges. (CVE-2010-3865, Important)\n\n* Missing boundary checks in the PPP over L2TP sockets implementation could\nallow a local, unprivileged user to cause a denial of service or escalate\ntheir privileges. (CVE-2010-4160, Important)\n\n* NULL pointer dereference in the igb driver. If both Single Root I/O\nVirtualization (SR-IOV) and promiscuous mode were enabled on an interface\nusing igb, it could result in a denial of service when a tagged VLAN packet\nis received on that interface. (CVE-2010-4263, Important)\n\n* Missing initialization flaw in the XFS file system implementation, and in\nthe network traffic policing implementation, could allow a local,\nunprivileged user to cause an information leak. (CVE-2010-3078,\nCVE-2010-3477, Moderate)\n\n* NULL pointer dereference in the Open Sound System compatible sequencer\ndriver could allow a local, unprivileged user with access to /dev/sequencer\nto cause a denial of service. /dev/sequencer is only accessible to root and\nusers in the audio group by default. (CVE-2010-3080, Moderate)\n\n* Flaw in the ethtool IOCTL handler could allow a local user to cause an\ninformation leak. (CVE-2010-3861, Moderate)\n\n* Flaw in bcm_connect() in the Controller Area Network (CAN) Broadcast\nManager. On 64-bit systems, writing the socket address may overflow the\nprocname character array. (CVE-2010-3874, Moderate)\n\n* Flaw in the module for monitoring the sockets of INET transport\nprotocols could allow a local, unprivileged user to cause a denial of\nservice. (CVE-2010-3880, Moderate)\n\n* Missing boundary checks in the block layer implementation could allow a\nlocal, unprivileged user to cause a denial of service. (CVE-2010-4162,\nCVE-2010-4163, CVE-2010-4668, Moderate)\n\n* NULL pointer dereference in the Bluetooth HCI UART driver could allow a\nlocal, unprivileged user to cause a denial of service. (CVE-2010-4242,\nModerate)\n\n* Flaw in the Linux kernel CPU time clocks implementation for the POSIX\nclock interface could allow a local, unprivileged user to cause a denial of\nservice. (CVE-2010-4248, Moderate)\n\n* Flaw in the garbage collector for AF_UNIX sockets could allow a local,\nunprivileged user to trigger a denial of service. (CVE-2010-4249, Moderate)\n\n* Missing upper bound integer check in the AIO implementation could allow a\nlocal, unprivileged user to cause an information leak. (CVE-2010-3067, Low)\n\n* Missing initialization flaws could lead to information leaks.\n(CVE-2010-3298, CVE-2010-3876, CVE-2010-4072, CVE-2010-4073, CVE-2010-4074,\nCVE-2010-4075, CVE-2010-4077, CVE-2010-4079, CVE-2010-4080, CVE-2010-4081,\nCVE-2010-4082, CVE-2010-4083, CVE-2010-4158, Low)\n\n* Missing initialization flaw in KVM could allow a privileged host user\nwith access to /dev/kvm to cause an information leak. (CVE-2010-4525, Low)\n\nRed Hat would like to thank Andre Osterhues for reporting CVE-2010-2492;\nThomas Pollet for reporting CVE-2010-3865; Dan Rosenberg for reporting\nCVE-2010-4160, CVE-2010-3078, CVE-2010-3874, CVE-2010-4162, CVE-2010-4163,\nCVE-2010-3298, CVE-2010-4073, CVE-2010-4074, CVE-2010-4075, CVE-2010-4077,\nCVE-2010-4079, CVE-2010-4080, CVE-2010-4081, CVE-2010-4082, CVE-2010-4083,\nand CVE-2010-4158; Kosuke Tatsukawa for reporting CVE-2010-4263; Tavis\nOrmandy for reporting CVE-2010-3080 and CVE-2010-3067; Kees Cook for\nreporting CVE-2010-3861 and CVE-2010-4072; Nelson Elhage for reporting\nCVE-2010-3880; Alan Cox for reporting CVE-2010-4242; Vegard Nossum for\nreporting CVE-2010-4249; Vasiliy Kulikov for reporting CVE-2010-3876; and\nStephan Mueller of atsec information security for reporting CVE-2010-4525.\n", "modified": "2018-06-06T20:24:06", "published": "2011-01-11T05:00:00", "id": "RHSA-2011:0007", "href": "https://access.redhat.com/errata/RHSA-2011:0007", "type": "redhat", "title": "(RHSA-2011:0007) Important: kernel security and bug fix update", "cvss": {"score": 7.9, "vector": "AV:A/AC:M/Au:N/C:C/I:C/A:C"}}], "centos": [{"lastseen": "2019-12-20T18:26:27", "bulletinFamily": "unix", "cvelist": ["CVE-2010-2942", "CVE-2010-3477", "CVE-2010-3067"], "description": "**CentOS Errata and Security Advisory** CESA-2010:0779\n\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* Information leak flaws were found in the Linux kernel Traffic Control\nUnit implementation. A local attacker could use these flaws to cause the\nkernel to leak kernel memory to user-space, possibly leading to the\ndisclosure of sensitive information. (CVE-2010-2942, Moderate)\n\n* A flaw was found in the tcf_act_police_dump() function in the Linux\nkernel network traffic policing implementation. A data structure in\ntcf_act_police_dump() was not initialized properly before being copied to\nuser-space. A local, unprivileged user could use this flaw to cause an\ninformation leak. (CVE-2010-3477, Moderate)\n\n* A missing upper bound integer check was found in the sys_io_submit()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3067, Low)\n\nRed Hat would like to thank Tavis Ormandy for reporting CVE-2010-3067.\n\nThis update also fixes the following bugs:\n\n* When two systems using bonding devices in the adaptive load balancing\n(ALB) mode communicated with each other, an endless loop of ARP replies\nstarted between these two systems due to a faulty MAC address update. With\nthis update, the MAC address update no longer creates unneeded ARP replies.\n(BZ#629239)\n\n* When running the Connectathon NFS Testsuite with certain clients and Red\nHat Enterprise Linux 4.8 as the server, nfsvers4, lock, and test2 failed\nthe Connectathon test. (BZ#625535)\n\n* For UDP/UNIX domain sockets, due to insufficient memory barriers in the\nnetwork code, a process sleeping in select() may have missed notifications\nabout new data. In rare cases, this bug may have caused a process to sleep\nforever. (BZ#640117)\n\n* In certain situations, a bug found in either the HTB or TBF network\npacket schedulers in the Linux kernel could have caused a kernel panic when\nusing Broadcom network cards with the bnx2 driver. (BZ#624363)\n\n* Previously, allocating fallback cqr for DASD reserve/release IOCTLs\nfailed because it used the memory pool of the respective device. This\nupdate preallocates sufficient memory for a single reserve/release request.\n(BZ#626828)\n\n* In some situations a bug prevented \"force online\" succeeding for a DASD\ndevice. (BZ#626827)\n\n* Using the \"fsstress\" utility may have caused a kernel panic. (BZ#633968)\n\n* This update introduces additional stack guard patches. (BZ#632515)\n\n* A bug was found in the way the megaraid_sas driver handled physical disks\nand management IOCTLs. All physical disks were exported to the disk layer,\nallowing an oops in megasas_complete_cmd_dpc() when completing the IOCTL\ncommand if a timeout occurred. (BZ#631903)\n\n* Previously, a warning message was returned when a large amount of\nmessages was passed through netconsole and a considerable amount of network\nload was added. With this update, the warning message is no longer\ndisplayed. (BZ#637729)\n\n* Executing a large \"dd\" command (1 to 5GB) on an iSCSI device with the\nqla3xxx driver caused a system crash due to the incorrect storing of a\nprivate data structure. With this update, the size of the stored data\nstructure is checked and the system crashes no longer occur. (BZ#624364)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2010-October/029145.html\nhttp://lists.centos.org/pipermail/centos-announce/2010-October/029146.html\n\n**Affected packages:**\nkernel\nkernel-devel\nkernel-doc\nkernel-hugemem\nkernel-hugemem-devel\nkernel-largesmp\nkernel-largesmp-devel\nkernel-smp\nkernel-smp-devel\nkernel-xenU\nkernel-xenU-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2010-0779.html", "edition": 4, "modified": "2010-10-25T12:16:38", "published": "2010-10-25T12:15:54", "href": "http://lists.centos.org/pipermail/centos-announce/2010-October/029145.html", "id": "CESA-2010:0779", "title": "kernel security update", "type": "centos", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-12-20T18:27:00", "bulletinFamily": "unix", "cvelist": ["CVE-2010-3078", "CVE-2010-3477", "CVE-2010-3086", "CVE-2010-3066", "CVE-2010-3067", "CVE-2010-3448"], "description": "**CentOS Errata and Security Advisory** CESA-2010:0839\n\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* A NULL pointer dereference flaw was found in the io_submit_one() function\nin the Linux kernel asynchronous I/O implementation. A local, unprivileged\nuser could use this flaw to cause a denial of service. (CVE-2010-3066,\nModerate)\n\n* A flaw was found in the xfs_ioc_fsgetxattr() function in the Linux kernel\nXFS file system implementation. A data structure in xfs_ioc_fsgetxattr()\nwas not initialized properly before being copied to user-space. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3078, Moderate)\n\n* The exception fixup code for the __futex_atomic_op1, __futex_atomic_op2,\nand futex_atomic_cmpxchg_inatomic() macros replaced the LOCK prefix with a\nNOP instruction. A local, unprivileged user could use this flaw to cause a\ndenial of service. (CVE-2010-3086, Moderate)\n\n* A flaw was found in the tcf_act_police_dump() function in the Linux\nkernel network traffic policing implementation. A data structure in\ntcf_act_police_dump() was not initialized properly before being copied to\nuser-space. A local, unprivileged user could use this flaw to cause an\ninformation leak. (CVE-2010-3477, Moderate)\n\n* A missing upper bound integer check was found in the sys_io_submit()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3067, Low)\n\nRed Hat would like to thank Tavis Ormandy for reporting CVE-2010-3066,\nCVE-2010-3086, and CVE-2010-3067, and Dan Rosenberg for reporting\nCVE-2010-3078.\n\nThis update also fixes several bugs. Documentation for these bug fixes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2010-November/029197.html\nhttp://lists.centos.org/pipermail/centos-announce/2010-November/029198.html\n\n**Affected packages:**\nkernel\nkernel-PAE\nkernel-PAE-devel\nkernel-debug\nkernel-debug-devel\nkernel-devel\nkernel-doc\nkernel-headers\nkernel-xen\nkernel-xen-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2010-0839.html", "edition": 5, "modified": "2010-11-09T22:40:44", "published": "2010-11-09T22:40:43", "href": "http://lists.centos.org/pipermail/centos-announce/2010-November/029197.html", "id": "CESA-2010:0839", "title": "kernel security update", "type": "centos", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-08-11T13:40:59", "bulletinFamily": "unix", "cvelist": ["CVE-2010-2942", "CVE-2010-2492", "CVE-2010-2943", "CVE-2010-3015", "CVE-2010-2938", "CVE-2010-1083", "CVE-2010-2798"], "description": "**CentOS Errata and Security Advisory** CESA-2010:0723\n\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* A buffer overflow flaw was found in the ecryptfs_uid_hash() function in\nthe Linux kernel eCryptfs implementation. On systems that have the eCryptfs\nnetlink transport (Red Hat Enterprise Linux 5 does) or where the\n\"/dev/ecryptfs\" file has world writable permissions (which it does not, by\ndefault, on Red Hat Enterprise Linux 5), a local, unprivileged user could\nuse this flaw to cause a denial of service or possibly escalate their\nprivileges. (CVE-2010-2492, Important)\n\n* A miscalculation of the size of the free space of the initial directory\nentry in a directory leaf block was found in the Linux kernel Global File\nSystem 2 (GFS2) implementation. A local, unprivileged user with write\naccess to a GFS2-mounted file system could perform a rename operation on\nthat file system to trigger a NULL pointer dereference, possibly resulting\nin a denial of service or privilege escalation. (CVE-2010-2798, Important)\n\n* A flaw was found in the Xen hypervisor implementation when running a\nsystem that has an Intel CPU without Extended Page Tables (EPT) support.\nWhile attempting to dump information about a crashing fully-virtualized\nguest, the flaw could cause the hypervisor to crash the host as well. A\nuser with permissions to configure a fully-virtualized guest system could\nuse this flaw to crash the host. (CVE-2010-2938, Moderate)\n\n* Information leak flaws were found in the Linux kernel's Traffic Control\nUnit implementation. A local attacker could use these flaws to cause the\nkernel to leak kernel memory to user-space, possibly leading to the\ndisclosure of sensitive information. (CVE-2010-2942, Moderate)\n\n* A flaw was found in the Linux kernel's XFS file system implementation.\nThe file handle lookup could return an invalid inode as valid. If an XFS\nfile system was mounted via NFS (Network File System), a local attacker\ncould access stale data or overwrite existing data that reused the inodes.\n(CVE-2010-2943, Moderate)\n\n* An integer overflow flaw was found in the extent range checking code in\nthe Linux kernel's ext4 file system implementation. A local, unprivileged\nuser with write access to an ext4-mounted file system could trigger this\nflaw by writing to a file at a very large file offset, resulting in a local\ndenial of service. (CVE-2010-3015, Moderate)\n\n* An information leak flaw was found in the Linux kernel's USB\nimplementation. Certain USB errors could result in an uninitialized kernel\nbuffer being sent to user-space. An attacker with physical access to a\ntarget system could use this flaw to cause an information leak.\n(CVE-2010-1083, Low)\n\nRed Hat would like to thank Andre Osterhues for reporting CVE-2010-2492;\nGrant Diffey of CenITex for reporting CVE-2010-2798; Toshiyuki Okajima for\nreporting CVE-2010-3015; and Marcus Meissner for reporting CVE-2010-1083.\n\nThis update also fixes several bugs. Documentation for these bug fixes will\nbe available shortly from the Technical Notes document linked to in the\nReferences.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2010-September/029068.html\nhttp://lists.centos.org/pipermail/centos-announce/2010-September/029069.html\n\n**Affected packages:**\nkernel\nkernel-PAE\nkernel-PAE-devel\nkernel-debug\nkernel-debug-devel\nkernel-devel\nkernel-doc\nkernel-headers\nkernel-xen\nkernel-xen-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2010-0723.html", "edition": 8, "modified": "2010-09-30T15:36:09", "published": "2010-09-30T15:36:09", "href": "http://lists.centos.org/pipermail/centos-announce/2010-September/029068.html", "id": "CESA-2010:0723", "title": "kernel security update", "type": "centos", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-01-06T09:26:41", "description": "Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n* Information leak flaws were found in the Linux kernel Traffic\nControl Unit implementation. A local attacker could use these flaws to\ncause the kernel to leak kernel memory to user-space, possibly leading\nto the disclosure of sensitive information. (CVE-2010-2942, Moderate)\n\n* A flaw was found in the tcf_act_police_dump() function in the Linux\nkernel network traffic policing implementation. A data structure in\ntcf_act_police_dump() was not initialized properly before being copied\nto user-space. A local, unprivileged user could use this flaw to cause\nan information leak. (CVE-2010-3477, Moderate)\n\n* A missing upper bound integer check was found in the sys_io_submit()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3067, Low)\n\nRed Hat would like to thank Tavis Ormandy for reporting CVE-2010-3067.\n\nThis update also fixes the following bugs :\n\n* When two systems using bonding devices in the adaptive load\nbalancing (ALB) mode communicated with each other, an endless loop of\nARP replies started between these two systems due to a faulty MAC\naddress update. With this update, the MAC address update no longer\ncreates unneeded ARP replies. (BZ#629239)\n\n* When running the Connectathon NFS Testsuite with certain clients and\nRed Hat Enterprise Linux 4.8 as the server, nfsvers4, lock, and test2\nfailed the Connectathon test. (BZ#625535)\n\n* For UDP/UNIX domain sockets, due to insufficient memory barriers in\nthe network code, a process sleeping in select() may have missed\nnotifications about new data. In rare cases, this bug may have caused\na process to sleep forever. (BZ#640117)\n\n* In certain situations, a bug found in either the HTB or TBF network\npacket schedulers in the Linux kernel could have caused a kernel panic\nwhen using Broadcom network cards with the bnx2 driver. (BZ#624363)\n\n* Previously, allocating fallback cqr for DASD reserve/release IOCTLs\nfailed because it used the memory pool of the respective device. This\nupdate preallocates sufficient memory for a single reserve/release\nrequest. (BZ#626828)\n\n* In some situations a bug prevented 'force online' succeeding for a\nDASD device. (BZ#626827)\n\n* Using the 'fsstress' utility may have caused a kernel panic.\n(BZ#633968)\n\n* This update introduces additional stack guard patches. (BZ#632515)\n\n* A bug was found in the way the megaraid_sas driver handled physical\ndisks and management IOCTLs. All physical disks were exported to the\ndisk layer, allowing an oops in megasas_complete_cmd_dpc() when\ncompleting the IOCTL command if a timeout occurred. (BZ#631903)\n\n* Previously, a warning message was returned when a large amount of\nmessages was passed through netconsole and a considerable amount of\nnetwork load was added. With this update, the warning message is no\nlonger displayed. (BZ#637729)\n\n* Executing a large 'dd' command (1 to 5GB) on an iSCSI device with\nthe qla3xxx driver caused a system crash due to the incorrect storing\nof a private data structure. With this update, the size of the stored\ndata structure is checked and the system crashes no longer occur.\n(BZ#624364)\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues. The system must be\nrebooted for this update to take effect.", "edition": 27, "published": "2010-11-24T00:00:00", "title": "CentOS 4 : kernel (CESA-2010:0779)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-2942", "CVE-2010-3477", "CVE-2010-3067"], "modified": "2010-11-24T00:00:00", "cpe": ["p-cpe:/a:centos:centos:kernel-xenU-devel", "p-cpe:/a:centos:centos:kernel-largesmp", "p-cpe:/a:centos:centos:kernel-hugemem", "p-cpe:/a:centos:centos:kernel-doc", "cpe:/o:centos:centos:4", "p-cpe:/a:centos:centos:kernel-smp", "p-cpe:/a:centos:centos:kernel-devel", "p-cpe:/a:centos:centos:kernel", "p-cpe:/a:centos:centos:kernel-smp-devel", "p-cpe:/a:centos:centos:kernel-largesmp-devel", "p-cpe:/a:centos:centos:kernel-xenU", "p-cpe:/a:centos:centos:kernel-hugemem-devel"], "id": "CENTOS_RHSA-2010-0779.NASL", "href": "https://www.tenable.com/plugins/nessus/50790", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2010:0779 and \n# CentOS Errata and Security Advisory 2010:0779 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(50790);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2010-2942\", \"CVE-2010-3067\", \"CVE-2010-3477\");\n script_bugtraq_id(42529, 43353);\n script_xref(name:\"RHSA\", value:\"2010:0779\");\n\n script_name(english:\"CentOS 4 : kernel (CESA-2010:0779)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n* Information leak flaws were found in the Linux kernel Traffic\nControl Unit implementation. A local attacker could use these flaws to\ncause the kernel to leak kernel memory to user-space, possibly leading\nto the disclosure of sensitive information. (CVE-2010-2942, Moderate)\n\n* A flaw was found in the tcf_act_police_dump() function in the Linux\nkernel network traffic policing implementation. A data structure in\ntcf_act_police_dump() was not initialized properly before being copied\nto user-space. A local, unprivileged user could use this flaw to cause\nan information leak. (CVE-2010-3477, Moderate)\n\n* A missing upper bound integer check was found in the sys_io_submit()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3067, Low)\n\nRed Hat would like to thank Tavis Ormandy for reporting CVE-2010-3067.\n\nThis update also fixes the following bugs :\n\n* When two systems using bonding devices in the adaptive load\nbalancing (ALB) mode communicated with each other, an endless loop of\nARP replies started between these two systems due to a faulty MAC\naddress update. With this update, the MAC address update no longer\ncreates unneeded ARP replies. (BZ#629239)\n\n* When running the Connectathon NFS Testsuite with certain clients and\nRed Hat Enterprise Linux 4.8 as the server, nfsvers4, lock, and test2\nfailed the Connectathon test. (BZ#625535)\n\n* For UDP/UNIX domain sockets, due to insufficient memory barriers in\nthe network code, a process sleeping in select() may have missed\nnotifications about new data. In rare cases, this bug may have caused\na process to sleep forever. (BZ#640117)\n\n* In certain situations, a bug found in either the HTB or TBF network\npacket schedulers in the Linux kernel could have caused a kernel panic\nwhen using Broadcom network cards with the bnx2 driver. (BZ#624363)\n\n* Previously, allocating fallback cqr for DASD reserve/release IOCTLs\nfailed because it used the memory pool of the respective device. This\nupdate preallocates sufficient memory for a single reserve/release\nrequest. (BZ#626828)\n\n* In some situations a bug prevented 'force online' succeeding for a\nDASD device. (BZ#626827)\n\n* Using the 'fsstress' utility may have caused a kernel panic.\n(BZ#633968)\n\n* This update introduces additional stack guard patches. (BZ#632515)\n\n* A bug was found in the way the megaraid_sas driver handled physical\ndisks and management IOCTLs. All physical disks were exported to the\ndisk layer, allowing an oops in megasas_complete_cmd_dpc() when\ncompleting the IOCTL command if a timeout occurred. (BZ#631903)\n\n* Previously, a warning message was returned when a large amount of\nmessages was passed through netconsole and a considerable amount of\nnetwork load was added. With this update, the warning message is no\nlonger displayed. (BZ#637729)\n\n* Executing a large 'dd' command (1 to 5GB) on an iSCSI device with\nthe qla3xxx driver caused a system crash due to the incorrect storing\nof a private data structure. With this update, the size of the stored\ndata structure is checked and the system crashes no longer occur.\n(BZ#624364)\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues. The system must be\nrebooted for this update to take effect.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2010-October/017107.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?27a09959\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2010-October/017108.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f9de2136\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-hugemem-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-largesmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-largesmp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-smp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-xenU\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-xenU-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/09/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/10/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/11/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-devel-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-devel-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-doc-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-doc-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-hugemem-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-hugemem-devel-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-largesmp-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-largesmp-devel-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-smp-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-smp-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-smp-devel-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-smp-devel-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-xenU-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-xenU-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-xenU-devel-2.6.9-89.31.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-xenU-devel-2.6.9-89.31.1.EL\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-devel / kernel-doc / kernel-hugemem / etc\");\n}\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T12:45:24", "description": "From Red Hat Security Advisory 2010:0779 :\n\nUpdated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n* Information leak flaws were found in the Linux kernel Traffic\nControl Unit implementation. A local attacker could use these flaws to\ncause the kernel to leak kernel memory to user-space, possibly leading\nto the disclosure of sensitive information. (CVE-2010-2942, Moderate)\n\n* A flaw was found in the tcf_act_police_dump() function in the Linux\nkernel network traffic policing implementation. A data structure in\ntcf_act_police_dump() was not initialized properly before being copied\nto user-space. A local, unprivileged user could use this flaw to cause\nan information leak. (CVE-2010-3477, Moderate)\n\n* A missing upper bound integer check was found in the sys_io_submit()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3067, Low)\n\nRed Hat would like to thank Tavis Ormandy for reporting CVE-2010-3067.\n\nThis update also fixes the following bugs :\n\n* When two systems using bonding devices in the adaptive load\nbalancing (ALB) mode communicated with each other, an endless loop of\nARP replies started between these two systems due to a faulty MAC\naddress update. With this update, the MAC address update no longer\ncreates unneeded ARP replies. (BZ#629239)\n\n* When running the Connectathon NFS Testsuite with certain clients and\nRed Hat Enterprise Linux 4.8 as the server, nfsvers4, lock, and test2\nfailed the Connectathon test. (BZ#625535)\n\n* For UDP/UNIX domain sockets, due to insufficient memory barriers in\nthe network code, a process sleeping in select() may have missed\nnotifications about new data. In rare cases, this bug may have caused\na process to sleep forever. (BZ#640117)\n\n* In certain situations, a bug found in either the HTB or TBF network\npacket schedulers in the Linux kernel could have caused a kernel panic\nwhen using Broadcom network cards with the bnx2 driver. (BZ#624363)\n\n* Previously, allocating fallback cqr for DASD reserve/release IOCTLs\nfailed because it used the memory pool of the respective device. This\nupdate preallocates sufficient memory for a single reserve/release\nrequest. (BZ#626828)\n\n* In some situations a bug prevented 'force online' succeeding for a\nDASD device. (BZ#626827)\n\n* Using the 'fsstress' utility may have caused a kernel panic.\n(BZ#633968)\n\n* This update introduces additional stack guard patches. (BZ#632515)\n\n* A bug was found in the way the megaraid_sas driver handled physical\ndisks and management IOCTLs. All physical disks were exported to the\ndisk layer, allowing an oops in megasas_complete_cmd_dpc() when\ncompleting the IOCTL command if a timeout occurred. (BZ#631903)\n\n* Previously, a warning message was returned when a large amount of\nmessages was passed through netconsole and a considerable amount of\nnetwork load was added. With this update, the warning message is no\nlonger displayed. (BZ#637729)\n\n* Executing a large 'dd' command (1 to 5GB) on an iSCSI device with\nthe qla3xxx driver caused a system crash due to the incorrect storing\nof a private data structure. With this update, the size of the stored\ndata structure is checked and the system crashes no longer occur.\n(BZ#624364)\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues. The system must be\nrebooted for this update to take effect.", "edition": 25, "published": "2013-07-12T00:00:00", "title": "Oracle Linux 4 : kernel (ELSA-2010-0779)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-2942", "CVE-2010-3477", "CVE-2010-3067"], "modified": "2013-07-12T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:kernel-hugemem", "p-cpe:/a:oracle:linux:kernel-devel", "p-cpe:/a:oracle:linux:kernel-doc", "p-cpe:/a:oracle:linux:kernel-xenU-devel", "p-cpe:/a:oracle:linux:kernel-xenU", "p-cpe:/a:oracle:linux:kernel-smp-devel", "p-cpe:/a:oracle:linux:kernel-largesmp", "p-cpe:/a:oracle:linux:kernel-smp", "p-cpe:/a:oracle:linux:kernel-hugemem-devel", "cpe:/o:oracle:linux:4", "p-cpe:/a:oracle:linux:kernel", "p-cpe:/a:oracle:linux:kernel-largesmp-devel"], "id": "ORACLELINUX_ELSA-2010-0779.NASL", "href": "https://www.tenable.com/plugins/nessus/68118", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2010:0779 and \n# Oracle Linux Security Advisory ELSA-2010-0779 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(68118);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-2942\", \"CVE-2010-3067\", \"CVE-2010-3477\");\n script_bugtraq_id(42529, 43353);\n script_xref(name:\"RHSA\", value:\"2010:0779\");\n\n script_name(english:\"Oracle Linux 4 : kernel (ELSA-2010-0779)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2010:0779 :\n\nUpdated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n* Information leak flaws were found in the Linux kernel Traffic\nControl Unit implementation. A local attacker could use these flaws to\ncause the kernel to leak kernel memory to user-space, possibly leading\nto the disclosure of sensitive information. (CVE-2010-2942, Moderate)\n\n* A flaw was found in the tcf_act_police_dump() function in the Linux\nkernel network traffic policing implementation. A data structure in\ntcf_act_police_dump() was not initialized properly before being copied\nto user-space. A local, unprivileged user could use this flaw to cause\nan information leak. (CVE-2010-3477, Moderate)\n\n* A missing upper bound integer check was found in the sys_io_submit()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3067, Low)\n\nRed Hat would like to thank Tavis Ormandy for reporting CVE-2010-3067.\n\nThis update also fixes the following bugs :\n\n* When two systems using bonding devices in the adaptive load\nbalancing (ALB) mode communicated with each other, an endless loop of\nARP replies started between these two systems due to a faulty MAC\naddress update. With this update, the MAC address update no longer\ncreates unneeded ARP replies. (BZ#629239)\n\n* When running the Connectathon NFS Testsuite with certain clients and\nRed Hat Enterprise Linux 4.8 as the server, nfsvers4, lock, and test2\nfailed the Connectathon test. (BZ#625535)\n\n* For UDP/UNIX domain sockets, due to insufficient memory barriers in\nthe network code, a process sleeping in select() may have missed\nnotifications about new data. In rare cases, this bug may have caused\na process to sleep forever. (BZ#640117)\n\n* In certain situations, a bug found in either the HTB or TBF network\npacket schedulers in the Linux kernel could have caused a kernel panic\nwhen using Broadcom network cards with the bnx2 driver. (BZ#624363)\n\n* Previously, allocating fallback cqr for DASD reserve/release IOCTLs\nfailed because it used the memory pool of the respective device. This\nupdate preallocates sufficient memory for a single reserve/release\nrequest. (BZ#626828)\n\n* In some situations a bug prevented 'force online' succeeding for a\nDASD device. (BZ#626827)\n\n* Using the 'fsstress' utility may have caused a kernel panic.\n(BZ#633968)\n\n* This update introduces additional stack guard patches. (BZ#632515)\n\n* A bug was found in the way the megaraid_sas driver handled physical\ndisks and management IOCTLs. All physical disks were exported to the\ndisk layer, allowing an oops in megasas_complete_cmd_dpc() when\ncompleting the IOCTL command if a timeout occurred. (BZ#631903)\n\n* Previously, a warning message was returned when a large amount of\nmessages was passed through netconsole and a considerable amount of\nnetwork load was added. With this update, the warning message is no\nlonger displayed. (BZ#637729)\n\n* Executing a large 'dd' command (1 to 5GB) on an iSCSI device with\nthe qla3xxx driver caused a system crash due to the incorrect storing\nof a private data structure. With this update, the size of the stored\ndata structure is checked and the system crashes no longer occur.\n(BZ#624364)\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues. The system must be\nrebooted for this update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2010-October/001694.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-hugemem-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-largesmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-largesmp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-smp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-xenU\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-xenU-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/09/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/10/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 4\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2010-2942\", \"CVE-2010-3067\", \"CVE-2010-3477\"); \n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for ELSA-2010-0779\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nkernel_major_minor = get_kb_item(\"Host/uname/major_minor\");\nif (empty_or_null(kernel_major_minor)) exit(1, \"Unable to determine kernel major-minor level.\");\nexpected_kernel_major_minor = \"2.6\";\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, \"running kernel level \" + expected_kernel_major_minor + \", it is running kernel level \" + kernel_major_minor);\n\nflag = 0;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-2.6.9\") && rpm_check(release:\"EL4\", reference:\"kernel-2.6.9-89.31.1.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-devel-2.6.9\") && rpm_check(release:\"EL4\", reference:\"kernel-devel-2.6.9-89.31.1.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-doc-2.6.9\") && rpm_check(release:\"EL4\", reference:\"kernel-doc-2.6.9-89.31.1.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-hugemem-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"kernel-hugemem-2.6.9-89.31.1.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-hugemem-devel-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"kernel-hugemem-devel-2.6.9-89.31.1.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-largesmp-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"ia64\", reference:\"kernel-largesmp-2.6.9-89.31.1.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-largesmp-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"kernel-largesmp-2.6.9-89.31.1.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-largesmp-devel-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"ia64\", reference:\"kernel-largesmp-devel-2.6.9-89.31.1.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-largesmp-devel-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"kernel-largesmp-devel-2.6.9-89.31.1.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-smp-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"kernel-smp-2.6.9-89.31.1.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-smp-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"kernel-smp-2.6.9-89.31.1.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-smp-devel-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"kernel-smp-devel-2.6.9-89.31.1.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-smp-devel-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"kernel-smp-devel-2.6.9-89.31.1.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-xenU-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"kernel-xenU-2.6.9-89.31.1.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-xenU-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"kernel-xenU-2.6.9-89.31.1.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-xenU-devel-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"kernel-xenU-devel-2.6.9-89.31.1.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-xenU-devel-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"kernel-xenU-devel-2.6.9-89.31.1.0.1.EL\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"affected kernel\");\n}\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T13:08:18", "description": "Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n* Information leak flaws were found in the Linux kernel Traffic\nControl Unit implementation. A local attacker could use these flaws to\ncause the kernel to leak kernel memory to user-space, possibly leading\nto the disclosure of sensitive information. (CVE-2010-2942, Moderate)\n\n* A flaw was found in the tcf_act_police_dump() function in the Linux\nkernel network traffic policing implementation. A data structure in\ntcf_act_police_dump() was not initialized properly before being copied\nto user-space. A local, unprivileged user could use this flaw to cause\nan information leak. (CVE-2010-3477, Moderate)\n\n* A missing upper bound integer check was found in the sys_io_submit()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3067, Low)\n\nRed Hat would like to thank Tavis Ormandy for reporting CVE-2010-3067.\n\nThis update also fixes the following bugs :\n\n* When two systems using bonding devices in the adaptive load\nbalancing (ALB) mode communicated with each other, an endless loop of\nARP replies started between these two systems due to a faulty MAC\naddress update. With this update, the MAC address update no longer\ncreates unneeded ARP replies. (BZ#629239)\n\n* When running the Connectathon NFS Testsuite with certain clients and\nRed Hat Enterprise Linux 4.8 as the server, nfsvers4, lock, and test2\nfailed the Connectathon test. (BZ#625535)\n\n* For UDP/UNIX domain sockets, due to insufficient memory barriers in\nthe network code, a process sleeping in select() may have missed\nnotifications about new data. In rare cases, this bug may have caused\na process to sleep forever. (BZ#640117)\n\n* In certain situations, a bug found in either the HTB or TBF network\npacket schedulers in the Linux kernel could have caused a kernel panic\nwhen using Broadcom network cards with the bnx2 driver. (BZ#624363)\n\n* Previously, allocating fallback cqr for DASD reserve/release IOCTLs\nfailed because it used the memory pool of the respective device. This\nupdate preallocates sufficient memory for a single reserve/release\nrequest. (BZ#626828)\n\n* In some situations a bug prevented 'force online' succeeding for a\nDASD device. (BZ#626827)\n\n* Using the 'fsstress' utility may have caused a kernel panic.\n(BZ#633968)\n\n* This update introduces additional stack guard patches. (BZ#632515)\n\n* A bug was found in the way the megaraid_sas driver handled physical\ndisks and management IOCTLs. All physical disks were exported to the\ndisk layer, allowing an oops in megasas_complete_cmd_dpc() when\ncompleting the IOCTL command if a timeout occurred. (BZ#631903)\n\n* Previously, a warning message was returned when a large amount of\nmessages was passed through netconsole and a considerable amount of\nnetwork load was added. With this update, the warning message is no\nlonger displayed. (BZ#637729)\n\n* Executing a large 'dd' command (1 to 5GB) on an iSCSI device with\nthe qla3xxx driver caused a system crash due to the incorrect storing\nof a private data structure. With this update, the size of the stored\ndata structure is checked and the system crashes no longer occur.\n(BZ#624364)\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues. The system must be\nrebooted for this update to take effect.", "edition": 28, "published": "2010-10-20T00:00:00", "title": "RHEL 4 : kernel (RHSA-2010:0779)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-2942", "CVE-2010-3477", "CVE-2010-3067"], "modified": "2010-10-20T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:4", "p-cpe:/a:redhat:enterprise_linux:kernel-largesmp-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-smp-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-xenU", "cpe:/o:redhat:enterprise_linux:4.8", "p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-smp", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:kernel-hugemem", "p-cpe:/a:redhat:enterprise_linux:kernel-xenU-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-doc", "p-cpe:/a:redhat:enterprise_linux:kernel-largesmp"], "id": "REDHAT-RHSA-2010-0779.NASL", "href": "https://www.tenable.com/plugins/nessus/50037", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2010:0779. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(50037);\n script_version(\"1.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-2942\", \"CVE-2010-3067\", \"CVE-2010-3477\");\n script_bugtraq_id(42529, 43353);\n script_xref(name:\"RHSA\", value:\"2010:0779\");\n\n script_name(english:\"RHEL 4 : kernel (RHSA-2010:0779)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n* Information leak flaws were found in the Linux kernel Traffic\nControl Unit implementation. A local attacker could use these flaws to\ncause the kernel to leak kernel memory to user-space, possibly leading\nto the disclosure of sensitive information. (CVE-2010-2942, Moderate)\n\n* A flaw was found in the tcf_act_police_dump() function in the Linux\nkernel network traffic policing implementation. A data structure in\ntcf_act_police_dump() was not initialized properly before being copied\nto user-space. A local, unprivileged user could use this flaw to cause\nan information leak. (CVE-2010-3477, Moderate)\n\n* A missing upper bound integer check was found in the sys_io_submit()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3067, Low)\n\nRed Hat would like to thank Tavis Ormandy for reporting CVE-2010-3067.\n\nThis update also fixes the following bugs :\n\n* When two systems using bonding devices in the adaptive load\nbalancing (ALB) mode communicated with each other, an endless loop of\nARP replies started between these two systems due to a faulty MAC\naddress update. With this update, the MAC address update no longer\ncreates unneeded ARP replies. (BZ#629239)\n\n* When running the Connectathon NFS Testsuite with certain clients and\nRed Hat Enterprise Linux 4.8 as the server, nfsvers4, lock, and test2\nfailed the Connectathon test. (BZ#625535)\n\n* For UDP/UNIX domain sockets, due to insufficient memory barriers in\nthe network code, a process sleeping in select() may have missed\nnotifications about new data. In rare cases, this bug may have caused\na process to sleep forever. (BZ#640117)\n\n* In certain situations, a bug found in either the HTB or TBF network\npacket schedulers in the Linux kernel could have caused a kernel panic\nwhen using Broadcom network cards with the bnx2 driver. (BZ#624363)\n\n* Previously, allocating fallback cqr for DASD reserve/release IOCTLs\nfailed because it used the memory pool of the respective device. This\nupdate preallocates sufficient memory for a single reserve/release\nrequest. (BZ#626828)\n\n* In some situations a bug prevented 'force online' succeeding for a\nDASD device. (BZ#626827)\n\n* Using the 'fsstress' utility may have caused a kernel panic.\n(BZ#633968)\n\n* This update introduces additional stack guard patches. (BZ#632515)\n\n* A bug was found in the way the megaraid_sas driver handled physical\ndisks and management IOCTLs. All physical disks were exported to the\ndisk layer, allowing an oops in megasas_complete_cmd_dpc() when\ncompleting the IOCTL command if a timeout occurred. (BZ#631903)\n\n* Previously, a warning message was returned when a large amount of\nmessages was passed through netconsole and a considerable amount of\nnetwork load was added. With this update, the warning message is no\nlonger displayed. (BZ#637729)\n\n* Executing a large 'dd' command (1 to 5GB) on an iSCSI device with\nthe qla3xxx driver caused a system crash due to the incorrect storing\nof a private data structure. With this update, the size of the stored\ndata structure is checked and the system crashes no longer occur.\n(BZ#624364)\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues. The system must be\nrebooted for this update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-2942\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3067\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3477\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2010:0779\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-largesmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-largesmp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-xenU\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-xenU-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4.8\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/09/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/10/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/10/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 4.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2010-2942\", \"CVE-2010-3067\", \"CVE-2010-3477\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2010:0779\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2010:0779\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL4\", reference:\"kernel-2.6.9-89.31.1.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"kernel-devel-2.6.9-89.31.1.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"kernel-doc-2.6.9-89.31.1.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-hugemem-2.6.9-89.31.1.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-hugemem-devel-2.6.9-89.31.1.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-largesmp-2.6.9-89.31.1.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-largesmp-devel-2.6.9-89.31.1.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-smp-2.6.9-89.31.1.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-smp-2.6.9-89.31.1.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-smp-devel-2.6.9-89.31.1.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-smp-devel-2.6.9-89.31.1.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-xenU-2.6.9-89.31.1.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-xenU-2.6.9-89.31.1.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-xenU-devel-2.6.9-89.31.1.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-xenU-devel-2.6.9-89.31.1.EL\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-devel / kernel-doc / kernel-hugemem / etc\");\n }\n}\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T12:45:34", "description": "Description of changes:\n\nFollowing Security bug are fixed in this errata\n\nCVE-2010-3904\nWhen copying data to userspace, the RDS protocol failed to verify that \nthe user-provided address was a valid\nuserspace address. A local unprivileged user could issue specially \ncrafted socket calls to write arbitrary\nvalues into kernel memory and potentially escalate privileges to root.\n\nCVE-2010-3067\nInteger overflow in the do_io_submit function in fs/aio.c in the Linux \nkernel before 2.6.36-rc4-next-20100915\nallows local users to cause a denial of service or possibly have \nunspecified other impact via crafted use of\nthe io_submit system call.\n\nCVE-2010-3477\nThe tcf_act_police_dump function in net/sched/act_police.c in the \nactions implementation in the network queueing\nfunctionality in the Linux kernel before 2.6.36-rc4 does not properly \ninitialize certain structure members, which\nallows local users to obtain potentially sensitive information from \nkernel memory via vectors involving a dump\noperation. NOTE: this vulnerability exists because of an incomplete fix \nfor CVE-2010-2942.\n\nkernel:\n\n[2.6.32-100.21.1.el5]\n- [rds] fix access issue with rds (Chris Mason) {CVE-2010-3904}\n- [fuse] linux-2.6.32-fuse-return-EGAIN-if-not-connected-bug-10154489.patch\n- [net] linux-2.6.32-net-sched-fix-kernel-leak-in-act_police.patch\n- [aio] \nlinux-2.6.32-aio-check-for-multiplication-overflow-in-do_io_subm.patch\n\nofa:\n\n[1.5.1-4.0.23]\n- Fix rds permissions checks during copies\n\n[1.5.1-4.0.21]\n- Update to BXOFED 1.5.1-1.3.6-5", "edition": 24, "published": "2013-07-12T00:00:00", "title": "Oracle Linux 5 : Unbreakable Enterprise kernel (ELSA-2010-2009)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-2942", "CVE-2010-3904", "CVE-2010-3477", "CVE-2010-3067"], "modified": "2013-07-12T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:kernel-debug", "p-cpe:/a:oracle:linux:kernel-devel", "p-cpe:/a:oracle:linux:kernel-doc", "cpe:/o:oracle:linux:5", "p-cpe:/a:oracle:linux:ofa-2.6.32-100.21.1.el5", "p-cpe:/a:oracle:linux:kernel-debug-devel", "p-cpe:/a:oracle:linux:kernel-headers", "p-cpe:/a:oracle:linux:kernel", "p-cpe:/a:oracle:linux:kernel-firmware"], "id": "ORACLELINUX_ELSA-2010-2009.NASL", "href": "https://www.tenable.com/plugins/nessus/68173", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2010-2009.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(68173);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-2942\", \"CVE-2010-3067\", \"CVE-2010-3477\", \"CVE-2010-3904\");\n\n script_name(english:\"Oracle Linux 5 : Unbreakable Enterprise kernel (ELSA-2010-2009)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Description of changes:\n\nFollowing Security bug are fixed in this errata\n\nCVE-2010-3904\nWhen copying data to userspace, the RDS protocol failed to verify that \nthe user-provided address was a valid\nuserspace address. A local unprivileged user could issue specially \ncrafted socket calls to write arbitrary\nvalues into kernel memory and potentially escalate privileges to root.\n\nCVE-2010-3067\nInteger overflow in the do_io_submit function in fs/aio.c in the Linux \nkernel before 2.6.36-rc4-next-20100915\nallows local users to cause a denial of service or possibly have \nunspecified other impact via crafted use of\nthe io_submit system call.\n\nCVE-2010-3477\nThe tcf_act_police_dump function in net/sched/act_police.c in the \nactions implementation in the network queueing\nfunctionality in the Linux kernel before 2.6.36-rc4 does not properly \ninitialize certain structure members, which\nallows local users to obtain potentially sensitive information from \nkernel memory via vectors involving a dump\noperation. NOTE: this vulnerability exists because of an incomplete fix \nfor CVE-2010-2942.\n\nkernel:\n\n[2.6.32-100.21.1.el5]\n- [rds] fix access issue with rds (Chris Mason) {CVE-2010-3904}\n- [fuse] linux-2.6.32-fuse-return-EGAIN-if-not-connected-bug-10154489.patch\n- [net] linux-2.6.32-net-sched-fix-kernel-leak-in-act_police.patch\n- [aio] \nlinux-2.6.32-aio-check-for-multiplication-overflow-in-do_io_subm.patch\n\nofa:\n\n[1.5.1-4.0.23]\n- Fix rds permissions checks during copies\n\n[1.5.1-4.0.21]\n- Update to BXOFED 1.5.1-1.3.6-5\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2010-October/001707.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected unbreakable enterprise kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Reliable Datagram Sockets (RDS) Privilege Escalation');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:ofa-2.6.32-100.21.1.el5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/09/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/10/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 5\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2010-2942\", \"CVE-2010-3067\", \"CVE-2010-3477\", \"CVE-2010-3904\"); \n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for ELSA-2010-2009\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nkernel_major_minor = get_kb_item(\"Host/uname/major_minor\");\nif (empty_or_null(kernel_major_minor)) exit(1, \"Unable to determine kernel major-minor level.\");\nexpected_kernel_major_minor = \"2.6\";\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, \"running kernel level \" + expected_kernel_major_minor + \", it is running kernel level \" + kernel_major_minor);\n\nflag = 0;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-2.6.32\") && rpm_check(release:\"EL5\", cpu:\"x86_64\", reference:\"kernel-2.6.32-100.21.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-debug-2.6.32\") && rpm_check(release:\"EL5\", cpu:\"x86_64\", reference:\"kernel-debug-2.6.32-100.21.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-debug-devel-2.6.32\") && rpm_check(release:\"EL5\", cpu:\"x86_64\", reference:\"kernel-debug-devel-2.6.32-100.21.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-devel-2.6.32\") && rpm_check(release:\"EL5\", cpu:\"x86_64\", reference:\"kernel-devel-2.6.32-100.21.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-doc-2.6.32\") && rpm_check(release:\"EL5\", cpu:\"x86_64\", reference:\"kernel-doc-2.6.32-100.21.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-firmware-2.6.32\") && rpm_check(release:\"EL5\", cpu:\"x86_64\", reference:\"kernel-firmware-2.6.32-100.21.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-headers-2.6.32\") && rpm_check(release:\"EL5\", cpu:\"x86_64\", reference:\"kernel-headers-2.6.32-100.21.1.el5\")) flag++;\nif (rpm_check(release:\"EL5\", cpu:\"x86_64\", reference:\"ofa-2.6.32-100.21.1.el5-1.5.1-4.0.23\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"affected kernel\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:26:45", "description": "Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n* A NULL pointer dereference flaw was found in the io_submit_one()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause a denial of service.\n(CVE-2010-3066, Moderate)\n\n* A flaw was found in the xfs_ioc_fsgetxattr() function in the Linux\nkernel XFS file system implementation. A data structure in\nxfs_ioc_fsgetxattr() was not initialized properly before being copied\nto user-space. A local, unprivileged user could use this flaw to cause\nan information leak. (CVE-2010-3078, Moderate)\n\n* The exception fixup code for the __futex_atomic_op1,\n__futex_atomic_op2, and futex_atomic_cmpxchg_inatomic() macros\nreplaced the LOCK prefix with a NOP instruction. A local, unprivileged\nuser could use this flaw to cause a denial of service. (CVE-2010-3086,\nModerate)\n\n* A flaw was found in the tcf_act_police_dump() function in the Linux\nkernel network traffic policing implementation. A data structure in\ntcf_act_police_dump() was not initialized properly before being copied\nto user-space. A local, unprivileged user could use this flaw to cause\nan information leak. (CVE-2010-3477, Moderate)\n\n* A missing upper bound integer check was found in the sys_io_submit()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3067, Low)\n\nRed Hat would like to thank Tavis Ormandy for reporting CVE-2010-3066,\nCVE-2010-3086, and CVE-2010-3067, and Dan Rosenberg for reporting\nCVE-2010-3078.\n\nThis update also fixes several bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues. The system must be\nrebooted for this update to take effect.", "edition": 26, "published": "2010-11-24T00:00:00", "title": "CentOS 5 : kernel (CESA-2010:0839)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-3078", "CVE-2010-3477", "CVE-2010-3086", "CVE-2010-3066", "CVE-2010-3067"], "modified": "2010-11-24T00:00:00", "cpe": ["p-cpe:/a:centos:centos:kernel-PAE-devel", "p-cpe:/a:centos:centos:kernel-xen-devel", "p-cpe:/a:centos:centos:kernel-xen", "p-cpe:/a:centos:centos:kernel-doc", "p-cpe:/a:centos:centos:kernel-devel", "p-cpe:/a:centos:centos:kernel", "p-cpe:/a:centos:centos:kernel-debug", "p-cpe:/a:centos:centos:kernel-headers", "cpe:/o:centos:centos:5", "p-cpe:/a:centos:centos:kernel-PAE", "p-cpe:/a:centos:centos:kernel-debug-devel"], "id": "CENTOS_RHSA-2010-0839.NASL", "href": "https://www.tenable.com/plugins/nessus/50807", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2010:0839 and \n# CentOS Errata and Security Advisory 2010:0839 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(50807);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2010-3066\", \"CVE-2010-3067\", \"CVE-2010-3078\", \"CVE-2010-3086\", \"CVE-2010-3477\");\n script_bugtraq_id(42529, 43022, 43353, 44754);\n script_xref(name:\"RHSA\", value:\"2010:0839\");\n\n script_name(english:\"CentOS 5 : kernel (CESA-2010:0839)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n* A NULL pointer dereference flaw was found in the io_submit_one()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause a denial of service.\n(CVE-2010-3066, Moderate)\n\n* A flaw was found in the xfs_ioc_fsgetxattr() function in the Linux\nkernel XFS file system implementation. A data structure in\nxfs_ioc_fsgetxattr() was not initialized properly before being copied\nto user-space. A local, unprivileged user could use this flaw to cause\nan information leak. (CVE-2010-3078, Moderate)\n\n* The exception fixup code for the __futex_atomic_op1,\n__futex_atomic_op2, and futex_atomic_cmpxchg_inatomic() macros\nreplaced the LOCK prefix with a NOP instruction. A local, unprivileged\nuser could use this flaw to cause a denial of service. (CVE-2010-3086,\nModerate)\n\n* A flaw was found in the tcf_act_police_dump() function in the Linux\nkernel network traffic policing implementation. A data structure in\ntcf_act_police_dump() was not initialized properly before being copied\nto user-space. A local, unprivileged user could use this flaw to cause\nan information leak. (CVE-2010-3477, Moderate)\n\n* A missing upper bound integer check was found in the sys_io_submit()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3067, Low)\n\nRed Hat would like to thank Tavis Ormandy for reporting CVE-2010-3066,\nCVE-2010-3086, and CVE-2010-3067, and Dan Rosenberg for reporting\nCVE-2010-3078.\n\nThis update also fixes several bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues. The system must be\nrebooted for this update to take effect.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2010-November/017159.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?30dadedf\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2010-November/017160.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a4bafbeb\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-PAE\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-PAE-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/09/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/11/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/11/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 5.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-2.6.18-194.26.1.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", cpu:\"i386\", reference:\"kernel-PAE-2.6.18-194.26.1.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", cpu:\"i386\", reference:\"kernel-PAE-devel-2.6.18-194.26.1.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-debug-2.6.18-194.26.1.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-debug-devel-2.6.18-194.26.1.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-devel-2.6.18-194.26.1.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-doc-2.6.18-194.26.1.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-headers-2.6.18-194.26.1.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-xen-2.6.18-194.26.1.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-xen-devel-2.6.18-194.26.1.el5\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-PAE / kernel-PAE-devel / kernel-debug / etc\");\n}\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T12:45:28", "description": "From Red Hat Security Advisory 2010:0839 :\n\nUpdated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n* A NULL pointer dereference flaw was found in the io_submit_one()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause a denial of service.\n(CVE-2010-3066, Moderate)\n\n* A flaw was found in the xfs_ioc_fsgetxattr() function in the Linux\nkernel XFS file system implementation. A data structure in\nxfs_ioc_fsgetxattr() was not initialized properly before being copied\nto user-space. A local, unprivileged user could use this flaw to cause\nan information leak. (CVE-2010-3078, Moderate)\n\n* The exception fixup code for the __futex_atomic_op1,\n__futex_atomic_op2, and futex_atomic_cmpxchg_inatomic() macros\nreplaced the LOCK prefix with a NOP instruction. A local, unprivileged\nuser could use this flaw to cause a denial of service. (CVE-2010-3086,\nModerate)\n\n* A flaw was found in the tcf_act_police_dump() function in the Linux\nkernel network traffic policing implementation. A data structure in\ntcf_act_police_dump() was not initialized properly before being copied\nto user-space. A local, unprivileged user could use this flaw to cause\nan information leak. (CVE-2010-3477, Moderate)\n\n* A missing upper bound integer check was found in the sys_io_submit()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3067, Low)\n\nRed Hat would like to thank Tavis Ormandy for reporting CVE-2010-3066,\nCVE-2010-3086, and CVE-2010-3067, and Dan Rosenberg for reporting\nCVE-2010-3078.\n\nThis update also fixes several bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues. The system must be\nrebooted for this update to take effect.", "edition": 24, "published": "2013-07-12T00:00:00", "title": "Oracle Linux 5 : kernel (ELSA-2010-0839)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-3078", "CVE-2010-3477", "CVE-2010-3086", "CVE-2010-3066", "CVE-2010-3067"], "modified": "2013-07-12T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:kernel-debug", "p-cpe:/a:oracle:linux:kernel-devel", "p-cpe:/a:oracle:linux:kernel-doc", "p-cpe:/a:oracle:linux:kernel-PAE", "cpe:/o:oracle:linux:5", "p-cpe:/a:oracle:linux:kernel-xen-devel", "p-cpe:/a:oracle:linux:kernel-debug-devel", "p-cpe:/a:oracle:linux:kernel-headers", "p-cpe:/a:oracle:linux:kernel-PAE-devel", "p-cpe:/a:oracle:linux:kernel", "p-cpe:/a:oracle:linux:kernel-xen"], "id": "ORACLELINUX_ELSA-2010-0839.NASL", "href": "https://www.tenable.com/plugins/nessus/68135", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2010:0839 and \n# Oracle Linux Security Advisory ELSA-2010-0839 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(68135);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-3066\", \"CVE-2010-3067\", \"CVE-2010-3078\", \"CVE-2010-3086\", \"CVE-2010-3477\");\n script_bugtraq_id(42529, 43022, 43353, 44754);\n script_xref(name:\"RHSA\", value:\"2010:0839\");\n\n script_name(english:\"Oracle Linux 5 : kernel (ELSA-2010-0839)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2010:0839 :\n\nUpdated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n* A NULL pointer dereference flaw was found in the io_submit_one()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause a denial of service.\n(CVE-2010-3066, Moderate)\n\n* A flaw was found in the xfs_ioc_fsgetxattr() function in the Linux\nkernel XFS file system implementation. A data structure in\nxfs_ioc_fsgetxattr() was not initialized properly before being copied\nto user-space. A local, unprivileged user could use this flaw to cause\nan information leak. (CVE-2010-3078, Moderate)\n\n* The exception fixup code for the __futex_atomic_op1,\n__futex_atomic_op2, and futex_atomic_cmpxchg_inatomic() macros\nreplaced the LOCK prefix with a NOP instruction. A local, unprivileged\nuser could use this flaw to cause a denial of service. (CVE-2010-3086,\nModerate)\n\n* A flaw was found in the tcf_act_police_dump() function in the Linux\nkernel network traffic policing implementation. A data structure in\ntcf_act_police_dump() was not initialized properly before being copied\nto user-space. A local, unprivileged user could use this flaw to cause\nan information leak. (CVE-2010-3477, Moderate)\n\n* A missing upper bound integer check was found in the sys_io_submit()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3067, Low)\n\nRed Hat would like to thank Tavis Ormandy for reporting CVE-2010-3066,\nCVE-2010-3086, and CVE-2010-3067, and Dan Rosenberg for reporting\nCVE-2010-3078.\n\nThis update also fixes several bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues. The system must be\nrebooted for this update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2010-November/001729.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-PAE\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-PAE-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/09/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/11/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 5\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2010-3066\", \"CVE-2010-3067\", \"CVE-2010-3078\", \"CVE-2010-3086\", \"CVE-2010-3477\"); \n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for ELSA-2010-0839\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nkernel_major_minor = get_kb_item(\"Host/uname/major_minor\");\nif (empty_or_null(kernel_major_minor)) exit(1, \"Unable to determine kernel major-minor level.\");\nexpected_kernel_major_minor = \"2.6\";\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, \"running kernel level \" + expected_kernel_major_minor + \", it is running kernel level \" + kernel_major_minor);\n\nflag = 0;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-2.6.18-194.26.1.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-PAE-2.6.18\") && rpm_check(release:\"EL5\", cpu:\"i386\", reference:\"kernel-PAE-2.6.18-194.26.1.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-PAE-devel-2.6.18\") && rpm_check(release:\"EL5\", cpu:\"i386\", reference:\"kernel-PAE-devel-2.6.18-194.26.1.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-debug-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-debug-2.6.18-194.26.1.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-debug-devel-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-debug-devel-2.6.18-194.26.1.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-devel-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-devel-2.6.18-194.26.1.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-doc-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-doc-2.6.18-194.26.1.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-headers-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-headers-2.6.18-194.26.1.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-xen-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-xen-2.6.18-194.26.1.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-xen-devel-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-xen-devel-2.6.18-194.26.1.0.1.el5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"affected kernel\");\n}\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T13:08:27", "description": "Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n* A NULL pointer dereference flaw was found in the io_submit_one()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause a denial of service.\n(CVE-2010-3066, Moderate)\n\n* A flaw was found in the xfs_ioc_fsgetxattr() function in the Linux\nkernel XFS file system implementation. A data structure in\nxfs_ioc_fsgetxattr() was not initialized properly before being copied\nto user-space. A local, unprivileged user could use this flaw to cause\nan information leak. (CVE-2010-3078, Moderate)\n\n* The exception fixup code for the __futex_atomic_op1,\n__futex_atomic_op2, and futex_atomic_cmpxchg_inatomic() macros\nreplaced the LOCK prefix with a NOP instruction. A local, unprivileged\nuser could use this flaw to cause a denial of service. (CVE-2010-3086,\nModerate)\n\n* A flaw was found in the tcf_act_police_dump() function in the Linux\nkernel network traffic policing implementation. A data structure in\ntcf_act_police_dump() was not initialized properly before being copied\nto user-space. A local, unprivileged user could use this flaw to cause\nan information leak. (CVE-2010-3477, Moderate)\n\n* A missing upper bound integer check was found in the sys_io_submit()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3067, Low)\n\nRed Hat would like to thank Tavis Ormandy for reporting CVE-2010-3066,\nCVE-2010-3086, and CVE-2010-3067, and Dan Rosenberg for reporting\nCVE-2010-3078.\n\nThis update also fixes several bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues. The system must be\nrebooted for this update to take effect.", "edition": 27, "published": "2010-11-10T00:00:00", "title": "RHEL 5 : kernel (RHSA-2010:0839)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-3078", "CVE-2010-3477", "CVE-2010-3086", "CVE-2010-3066", "CVE-2010-3067"], "modified": "2010-11-10T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:kernel-kdump", "cpe:/o:redhat:enterprise_linux:5", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-PAE-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:kernel-xen", "p-cpe:/a:redhat:enterprise_linux:kernel-PAE", "p-cpe:/a:redhat:enterprise_linux:kernel-xen-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-doc"], "id": "REDHAT-RHSA-2010-0839.NASL", "href": "https://www.tenable.com/plugins/nessus/50537", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2010:0839. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(50537);\n script_version(\"1.21\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-3066\", \"CVE-2010-3067\", \"CVE-2010-3078\", \"CVE-2010-3086\", \"CVE-2010-3477\");\n script_bugtraq_id(42529, 43022, 43353, 44754);\n script_xref(name:\"RHSA\", value:\"2010:0839\");\n\n script_name(english:\"RHEL 5 : kernel (RHSA-2010:0839)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n* A NULL pointer dereference flaw was found in the io_submit_one()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause a denial of service.\n(CVE-2010-3066, Moderate)\n\n* A flaw was found in the xfs_ioc_fsgetxattr() function in the Linux\nkernel XFS file system implementation. A data structure in\nxfs_ioc_fsgetxattr() was not initialized properly before being copied\nto user-space. A local, unprivileged user could use this flaw to cause\nan information leak. (CVE-2010-3078, Moderate)\n\n* The exception fixup code for the __futex_atomic_op1,\n__futex_atomic_op2, and futex_atomic_cmpxchg_inatomic() macros\nreplaced the LOCK prefix with a NOP instruction. A local, unprivileged\nuser could use this flaw to cause a denial of service. (CVE-2010-3086,\nModerate)\n\n* A flaw was found in the tcf_act_police_dump() function in the Linux\nkernel network traffic policing implementation. A data structure in\ntcf_act_police_dump() was not initialized properly before being copied\nto user-space. A local, unprivileged user could use this flaw to cause\nan information leak. (CVE-2010-3477, Moderate)\n\n* A missing upper bound integer check was found in the sys_io_submit()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3067, Low)\n\nRed Hat would like to thank Tavis Ormandy for reporting CVE-2010-3066,\nCVE-2010-3086, and CVE-2010-3067, and Dan Rosenberg for reporting\nCVE-2010-3078.\n\nThis update also fixes several bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues. The system must be\nrebooted for this update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3066\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3067\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3078\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3086\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3477\"\n );\n # http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html-single/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9cbd95a0\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2010:0839\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-PAE\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-PAE-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/09/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/11/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/11/10\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 5.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2010-3066\", \"CVE-2010-3067\", \"CVE-2010-3078\", \"CVE-2010-3086\", \"CVE-2010-3477\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2010:0839\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2010:0839\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-2.6.18-194.26.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-2.6.18-194.26.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-2.6.18-194.26.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-PAE-2.6.18-194.26.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-PAE-devel-2.6.18-194.26.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-debug-2.6.18-194.26.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-debug-2.6.18-194.26.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-debug-2.6.18-194.26.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-debug-devel-2.6.18-194.26.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-debug-devel-2.6.18-194.26.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-debug-devel-2.6.18-194.26.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-devel-2.6.18-194.26.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-devel-2.6.18-194.26.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-devel-2.6.18-194.26.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", reference:\"kernel-doc-2.6.18-194.26.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"kernel-headers-2.6.18-194.26.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-headers-2.6.18-194.26.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-headers-2.6.18-194.26.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-kdump-2.6.18-194.26.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-kdump-devel-2.6.18-194.26.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-xen-2.6.18-194.26.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-xen-2.6.18-194.26.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-xen-devel-2.6.18-194.26.1.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-xen-devel-2.6.18-194.26.1.el5\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-PAE / kernel-PAE-devel / kernel-debug / etc\");\n }\n}\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T13:45:12", "description": "This update fixes the following security issues :\n\n - A NULL pointer dereference flaw was found in the\n io_submit_one() function in the Linux kernel\n asynchronous I/O implementation. A local, unprivileged\n user could use this flaw to cause a denial of service.\n (CVE-2010-3066, Moderate)\n\n - A flaw was found in the xfs_ioc_fsgetxattr() function in\n the Linux kernel XFS file system implementation. A data\n structure in xfs_ioc_fsgetxattr() was not initialized\n properly before being copied to user-space. A local,\n unprivileged user could use this flaw to cause an\n information leak. (CVE-2010-3078, Moderate)\n\n - The exception fixup code for the __futex_atomic_op1,\n __futex_atomic_op2, and futex_atomic_cmpxchg_inatomic()\n macros replaced the LOCK prefix with a NOP instruction.\n A local, unprivileged user could use this flaw to cause\n a denial of service. (CVE-2010-3086, Moderate)\n\n - A flaw was found in the tcf_act_police_dump() function\n in the Linux kernel network traffic policing\n implementation. A data structure in\n tcf_act_police_dump() was not initialized properly\n before being copied to user-space. A local, unprivileged\n user could use this flaw to cause an information leak.\n (CVE-2010-3477, Moderate)\n\n - A missing upper bound integer check was found in the\n sys_io_submit() function in the Linux kernel\n asynchronous I/O implementation. A local, unprivileged\n user could use this flaw to cause an information leak.\n (CVE-2010-3067, Low)\n\nThis update also fixes several bugs.\n\nThe system must be rebooted for this update to take effect.", "edition": 24, "published": "2012-08-01T00:00:00", "title": "Scientific Linux Security Update : kernel on SL5.x i386/x86_64", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-3078", "CVE-2010-3477", "CVE-2010-3086", "CVE-2010-3066", "CVE-2010-3067"], "modified": "2012-08-01T00:00:00", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20101109_KERNEL_ON_SL5_X.NASL", "href": "https://www.tenable.com/plugins/nessus/60886", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(60886);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-3066\", \"CVE-2010-3067\", \"CVE-2010-3078\", \"CVE-2010-3086\", \"CVE-2010-3477\");\n\n script_name(english:\"Scientific Linux Security Update : kernel on SL5.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes the following security issues :\n\n - A NULL pointer dereference flaw was found in the\n io_submit_one() function in the Linux kernel\n asynchronous I/O implementation. A local, unprivileged\n user could use this flaw to cause a denial of service.\n (CVE-2010-3066, Moderate)\n\n - A flaw was found in the xfs_ioc_fsgetxattr() function in\n the Linux kernel XFS file system implementation. A data\n structure in xfs_ioc_fsgetxattr() was not initialized\n properly before being copied to user-space. A local,\n unprivileged user could use this flaw to cause an\n information leak. (CVE-2010-3078, Moderate)\n\n - The exception fixup code for the __futex_atomic_op1,\n __futex_atomic_op2, and futex_atomic_cmpxchg_inatomic()\n macros replaced the LOCK prefix with a NOP instruction.\n A local, unprivileged user could use this flaw to cause\n a denial of service. (CVE-2010-3086, Moderate)\n\n - A flaw was found in the tcf_act_police_dump() function\n in the Linux kernel network traffic policing\n implementation. A data structure in\n tcf_act_police_dump() was not initialized properly\n before being copied to user-space. A local, unprivileged\n user could use this flaw to cause an information leak.\n (CVE-2010-3477, Moderate)\n\n - A missing upper bound integer check was found in the\n sys_io_submit() function in the Linux kernel\n asynchronous I/O implementation. A local, unprivileged\n user could use this flaw to cause an information leak.\n (CVE-2010-3067, Low)\n\nThis update also fixes several bugs.\n\nThe system must be rebooted for this update to take effect.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1011&L=scientific-linux-errata&T=0&P=533\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?23683d94\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/11/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL5\", reference:\"kernel-2.6.18-194.26.1.el5\")) flag++;\nif (rpm_check(release:\"SL5\", cpu:\"i386\", reference:\"kernel-PAE-2.6.18-194.26.1.el5\")) flag++;\nif (rpm_check(release:\"SL5\", cpu:\"i386\", reference:\"kernel-PAE-devel-2.6.18-194.26.1.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-debug-2.6.18-194.26.1.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-debug-devel-2.6.18-194.26.1.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-devel-2.6.18-194.26.1.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-doc-2.6.18-194.26.1.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-headers-2.6.18-194.26.1.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-xen-2.6.18-194.26.1.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-xen-devel-2.6.18-194.26.1.el5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T12:45:33", "description": "Description of changes:\n\nFollowing security fixes are included in this unbreakable enterprise \nkernel errata:\n\nCVE-2010-2942\nThe actions implementation in the network queueing functionality in the \nLinux kernel before 2.6.36-rc2 does not properly initialize certain \nstructure members when performing dump operations, which allows local \nusers to obtain potentially sensitive information from kernel memory via \nvectors related to (1) the tcf_gact_dump function in \nnet/sched/act_gact.c, (2) the tcf_mirred_dump function in \nnet/sched/act_mirred.c, (3) the tcf_nat_dump function in \nnet/sched/act_nat.c, (4) the tcf_simp_dump function in \nnet/sched/act_simple.c, and (5) the tcf_skbedit_dump function in \nnet/sched/act_skbedit.c.\n\nCVE-2010-2943\nThe xfs implementation in the Linux kernel before 2.6.35 does not look \nup inode allocation btrees before reading inode buffers, which allows \nremote authenticated users to read unlinked files, or read or overwrite \ndisk blocks that are currently assigned to an active file but were \npreviously assigned to an unlinked file, by accessing a stale NFS file \nhandle.\n\nOCFS2\nFix to prevent kernel panic caused by corrupted fast symlinks in ocfs2 \nfilesystem.\n\n[2.6.32-100.20.1.el5]\n- [fs] xfs: return inode fork offset in bulkstat for fsr (Dave Chinner)\n- [fs] xfs: always use iget in bulkstat (Dave Chinner) {CVE-2010-2943}\n- [fs] xfs: validate untrusted inode numbers during lookup (Dave \nChinner) {CVE-2010-2943}\n- [fs] xfs: rename XFS_IGET_BULKSTAT to XFS_IGET_UNTRUSTED (Dave \nChinner) {CVE-2010-2943}\n- [net] net sched: fix some kernel memory leaks (Eric Dumazet) \n{CVE-2010-2942}\n- [fs] ocfs2: Don't walk off the end of fast symlinks (Joel Becker)", "edition": 24, "published": "2013-07-12T00:00:00", "title": "Oracle Linux 5 : Unbreakable Enterprise kernel (ELSA-2010-2008)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-2942", "CVE-2010-2943"], "modified": "2013-07-12T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:kernel-debug", "p-cpe:/a:oracle:linux:kernel-devel", "p-cpe:/a:oracle:linux:kernel-doc", "cpe:/o:oracle:linux:5", "p-cpe:/a:oracle:linux:kernel-debug-devel", "p-cpe:/a:oracle:linux:kernel-headers", "p-cpe:/a:oracle:linux:kernel", "p-cpe:/a:oracle:linux:kernel-firmware"], "id": "ORACLELINUX_ELSA-2010-2008.NASL", "href": "https://www.tenable.com/plugins/nessus/68172", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2010-2008.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(68172);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-2942\", \"CVE-2010-2943\");\n\n script_name(english:\"Oracle Linux 5 : Unbreakable Enterprise kernel (ELSA-2010-2008)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Description of changes:\n\nFollowing security fixes are included in this unbreakable enterprise \nkernel errata:\n\nCVE-2010-2942\nThe actions implementation in the network queueing functionality in the \nLinux kernel before 2.6.36-rc2 does not properly initialize certain \nstructure members when performing dump operations, which allows local \nusers to obtain potentially sensitive information from kernel memory via \nvectors related to (1) the tcf_gact_dump function in \nnet/sched/act_gact.c, (2) the tcf_mirred_dump function in \nnet/sched/act_mirred.c, (3) the tcf_nat_dump function in \nnet/sched/act_nat.c, (4) the tcf_simp_dump function in \nnet/sched/act_simple.c, and (5) the tcf_skbedit_dump function in \nnet/sched/act_skbedit.c.\n\nCVE-2010-2943\nThe xfs implementation in the Linux kernel before 2.6.35 does not look \nup inode allocation btrees before reading inode buffers, which allows \nremote authenticated users to read unlinked files, or read or overwrite \ndisk blocks that are currently assigned to an active file but were \npreviously assigned to an unlinked file, by accessing a stale NFS file \nhandle.\n\nOCFS2\nFix to prevent kernel panic caused by corrupted fast symlinks in ocfs2 \nfilesystem.\n\n[2.6.32-100.20.1.el5]\n- [fs] xfs: return inode fork offset in bulkstat for fsr (Dave Chinner)\n- [fs] xfs: always use iget in bulkstat (Dave Chinner) {CVE-2010-2943}\n- [fs] xfs: validate untrusted inode numbers during lookup (Dave \nChinner) {CVE-2010-2943}\n- [fs] xfs: rename XFS_IGET_BULKSTAT to XFS_IGET_UNTRUSTED (Dave \nChinner) {CVE-2010-2943}\n- [net] net sched: fix some kernel memory leaks (Eric Dumazet) \n{CVE-2010-2942}\n- [fs] ocfs2: Don't walk off the end of fast symlinks (Joel Becker)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2010-October/001671.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected unbreakable enterprise kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/09/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/10/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 5\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2010-2942\", \"CVE-2010-2943\"); \n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for ELSA-2010-2008\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nkernel_major_minor = get_kb_item(\"Host/uname/major_minor\");\nif (empty_or_null(kernel_major_minor)) exit(1, \"Unable to determine kernel major-minor level.\");\nexpected_kernel_major_minor = \"2.6\";\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, \"running kernel level \" + expected_kernel_major_minor + \", it is running kernel level \" + kernel_major_minor);\n\nflag = 0;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-2.6.32\") && rpm_check(release:\"EL5\", cpu:\"x86_64\", reference:\"kernel-2.6.32-100.20.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-debug-2.6.32\") && rpm_check(release:\"EL5\", cpu:\"x86_64\", reference:\"kernel-debug-2.6.32-100.20.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-debug-devel-2.6.32\") && rpm_check(release:\"EL5\", cpu:\"x86_64\", reference:\"kernel-debug-devel-2.6.32-100.20.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-devel-2.6.32\") && rpm_check(release:\"EL5\", cpu:\"x86_64\", reference:\"kernel-devel-2.6.32-100.20.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-doc-2.6.32\") && rpm_check(release:\"EL5\", cpu:\"x86_64\", reference:\"kernel-doc-2.6.32-100.20.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-firmware-2.6.32\") && rpm_check(release:\"EL5\", cpu:\"x86_64\", reference:\"kernel-firmware-2.6.32-100.20.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-headers-2.6.32\") && rpm_check(release:\"EL5\", cpu:\"x86_64\", reference:\"kernel-headers-2.6.32-100.20.1.el5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"affected kernel\");\n}\n", "cvss": {"score": 7.9, "vector": "AV:N/AC:M/Au:S/C:C/I:C/A:N"}}, {"lastseen": "2021-01-17T14:07:24", "description": "The openSUSE 11.3 kernel was updated to versiuon 2.6.34.7. It fixes\nlots of bugs and security issues.\n\nA major regression in handling some USB Input devices (Mice and\nKeyboard) introduced by the previous update was fixed.\n\nFixed lots of bugs in the ATH5K wireless driver.\n\nFollowing security issues were fixed: CVE-2010-3078: A XFS stack\nmemory information disclosure was fixed.\n\nCVE-2010-2954: A NULL pointer dereference in the IRDA stack was fixed,\nwhich could lead to kernel crashes.\n\nCVE-2010-2959: A privilege escalation possibility in the CAN bus\nprotocol module can_bcm was fixed.\n\nCVE-2010-2942: Several memory leaks in the net scheduling code were\nfixed.\n\nCVE-2010-2803: Fixed kernel memory information leaks from DRM ioctls.", "edition": 24, "published": "2014-06-13T00:00:00", "title": "openSUSE Security Update : kernel (openSUSE-SU-2010:0634-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-2942", "CVE-2010-3078", "CVE-2010-2959", "CVE-2010-2954", "CVE-2010-2803"], "modified": "2014-06-13T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:kernel-vmi-base", "p-cpe:/a:novell:opensuse:kernel-vmi", "p-cpe:/a:novell:opensuse:kernel-trace", "p-cpe:/a:novell:opensuse:kernel-ec2-base", "p-cpe:/a:novell:opensuse:kernel-ec2", "p-cpe:/a:novell:opensuse:kernel-xen-devel", "p-cpe:/a:novell:opensuse:kernel-trace-base", "p-cpe:/a:novell:opensuse:kernel-vanilla-base", "p-cpe:/a:novell:opensuse:kernel-desktop-base", "p-cpe:/a:novell:opensuse:kernel-xen-base", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:preload-kmp-desktop", "p-cpe:/a:novell:opensuse:kernel-vmi-devel", "p-cpe:/a:novell:opensuse:kernel-pae", "p-cpe:/a:novell:opensuse:kernel-pae-devel", "p-cpe:/a:novell:opensuse:kernel-syms", "p-cpe:/a:novell:opensuse:preload-kmp-default", "p-cpe:/a:novell:opensuse:kernel-pae-base", "p-cpe:/a:novell:opensuse:kernel-vanilla", "p-cpe:/a:novell:opensuse:kernel-xen", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel", "p-cpe:/a:novell:opensuse:kernel-debug-base", "p-cpe:/a:novell:opensuse:kernel-trace-devel", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:kernel-ec2-devel", "p-cpe:/a:novell:opensuse:kernel-ec2-extra", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:kernel-desktop-devel", "p-cpe:/a:novell:opensuse:kernel-desktop", "p-cpe:/a:novell:opensuse:kernel-debug", "cpe:/o:novell:opensuse:11.3", "p-cpe:/a:novell:opensuse:kernel-default-base"], "id": "SUSE_11_3_KERNEL-100915.NASL", "href": "https://www.tenable.com/plugins/nessus/75549", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update kernel-3105.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(75549);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-2803\", \"CVE-2010-2942\", \"CVE-2010-2954\", \"CVE-2010-2959\", \"CVE-2010-3078\");\n\n script_name(english:\"openSUSE Security Update : kernel (openSUSE-SU-2010:0634-1)\");\n script_summary(english:\"Check for the kernel-3105 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The openSUSE 11.3 kernel was updated to versiuon 2.6.34.7. It fixes\nlots of bugs and security issues.\n\nA major regression in handling some USB Input devices (Mice and\nKeyboard) introduced by the previous update was fixed.\n\nFixed lots of bugs in the ATH5K wireless driver.\n\nFollowing security issues were fixed: CVE-2010-3078: A XFS stack\nmemory information disclosure was fixed.\n\nCVE-2010-2954: A NULL pointer dereference in the IRDA stack was fixed,\nwhich could lead to kernel crashes.\n\nCVE-2010-2959: A privilege escalation possibility in the CAN bus\nprotocol module can_bcm was fixed.\n\nCVE-2010-2942: Several memory leaks in the net scheduling code were\nfixed.\n\nCVE-2010-2803: Fixed kernel memory information leaks from DRM ioctls.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=600948\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=628604\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=632309\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=633543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=633581\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=635862\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=636112\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=637436\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2010-09/msg00030.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-desktop-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-desktop-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-ec2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-ec2-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-ec2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-ec2-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-pae-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-pae-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-trace\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-trace-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-trace-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vmi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vmi-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vmi-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-xen-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:preload-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:preload-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/09/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-debug-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-debug-base-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-debug-devel-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-default-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-default-base-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-default-devel-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-desktop-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-desktop-base-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-desktop-devel-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-devel-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-ec2-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-ec2-base-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-ec2-devel-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-ec2-extra-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-pae-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-pae-base-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-pae-devel-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-source-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-source-vanilla-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-syms-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-trace-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-trace-base-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-trace-devel-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-vanilla-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-vanilla-base-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-vanilla-devel-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-vmi-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-vmi-base-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-vmi-devel-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-xen-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-xen-base-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-xen-devel-2.6.34.7-0.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"preload-kmp-default-1.1_k2.6.34.7_0.2-19.1.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"preload-kmp-desktop-1.1_k2.6.34.7_0.2-19.1.2\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:36:54", "bulletinFamily": "unix", "cvelist": ["CVE-2010-2942", "CVE-2010-3477", "CVE-2010-3081", "CVE-2010-3067"], "description": "[2.6.9-89.31.1.0.1.EL]\n- [XEN] fix cpu hotplug crash (Joe Jin) [orabug 7521308]\n- [XEN] Bring up vcpus before khelper init (Joe Jin) [orabug 7521308]\n- [XEN] flush the tlb cache immediately (Dave McCracken, Scott Shi) [orabug 9138767]\n- fix skb alignment that was causing sendto() to fail with EFAULT\n (Olaf Kirch) [orabug 6845794] - fix enomem due to larger mtu size page alloc (Zach Brown) [orabug 5486128]\n- backout patch sysrq-b that queues upto keventd thread (Guru Anbalagane)\n [orabug 6125546]\n- netrx/netpoll race avoidance (Tina Yang) [orabug 6143381]\n- [XEN] Fix elf_core_dump (Tina Yang) [orabug 6995928]\n- use lfence instead of cpuid instruction to implement memory barriers\n (Herbert van den Bergh) [orabug 7452412]\n- add netpoll support to xen netfront (Tina Yang) [orabz 7261]\n- [xen] execshield: fix endless GPF fault loop (Stephen Tweedie)\n [orabug 7175395]\n- [xen]: port el5u2 patch that allows 64-bit PVHVM guest to boot with 32-bit\n dom0 [orabug 7452107] xenstore\n- [mm] update shrink_zone patch to allow 100% swap utilization (John Sobecki,\n Chris Mason, Chuck Anderson, Dave McCracken) [orabug 7566319,6086839]\n- [kernel] backport report_lost_ticks patch from EL5.2 (John Sobecki)\n [orabug 6110605]\n- [xen] fix for hung JVM thread after #GPF [orabug 7916406] (Chuck Anderson)\n- port EL5U3 patch to adjust totalhigh_pages in the balloon driver\n [orabug 8300888]\n- check to see if hypervisor supports memory reservation change (Chuck Anderson) [orabug7556514]\n- [XEN] use hypercall to fixmap pte updates (Mukesh Rathor) [orabug 8433329]\n- fix oops in nlmclnt_mark_reclaim (Trond Myklebust) [orabug 8568878]\n- [x86_64] Allowed machine_reboot running on boot_cpu (Joe Jin) [orabug 8425237]- FP register state is corrupted during the handling a SIGSEGV (Chuck Anderson)\n [orabug 7708133]\n- [x86_64]: fix x86_64 largesmp kernel reboot hang (Joe Jin) [orabug bug9126592]- [nfs]: fix file attribute caching (Chuck Lever, Herbert van den Bergh)\n [orabug 8449921]\n- [mm] revert patch #2042 (John Sobecki) [orabug 8895251]\n- [x86_64] Add compat32 support for readahead and fadvise64 (John Haxby)\n [orabug 9458826]\n- [XEN] free pte on hugetlb_prefault to avoid the clear_page race\n (Dave McCracken, Joe Jin) [orabug 9493665]\n- [XEN] Flush tlb cache immediately to avoid clear_page race (Dave McCracken,\n Joe Jin) [orabug 9488844]\n[2.6.9-89.31.1]\n-netpoll: fix more local_bh_enable() related badness warnings and infinite loop (Neil Horman) [637729 516076]\n-netpoll: fix badness warnings as bottom halves are enabled but interrupts are not (Neil Horman) [637729 516076]\n-aio: check for multiplication overflow in io_submit (Jeff Moyer) [629446 629447] {CVE-2010-3067}\n-fs: buffer.c: fix race in __block_prepare_write (Jeff Moyer) [633968 480404]\n-net: fix info leak in police code (Neil Horman) [636389 636390] {CVE-2010-3477}\n-udp: use memory barrier in datagram_poll (Flavio Leitner) [640117 546251]\n[2.6.9-89.30.1]\n-compat: make compat_alloc_user_space incorporate the access_ok (Xiaotian Feng) [634461 634462] {CVE-2010-3081}\n-mm: guard page for stacks that grow upwards (Johannes Weiner) [632515 630564]\n-s390x: dasd: allocate fallback cqr for reserve release (Hendrik Brueckner) [626828 619527]\n-net sched: fix tcf_gact_dump memory leak (Jiri Pirko) [624906 624907] {CVE-2010-2942}\n[2.6.9-89.0.30]\n-bonding: check if clients mac addr has changed (Flavio Leitner) [629239 610236]\n-net: fix corruption of net_device_wrapper structure (Jerome Marchand) [624364 620485]\n-net: qla3xxx: replace kmalloc() call with kzalloc() (Jerome Marchand) [624364 620485]\n-bnx2: fix panic in bnx2_poll_work() (John Feeney) [624363 623265]\n-megaraid_sas: fix physical disk handling and management ioctls (Tomas Henzl) [631903 577178]\n-nfsd4: set OPEN_RESULT_LOCKTYPE_POSIX in open() (Jeff Layton) [625535 575655]\n-s390x: dasd: force online does not work if another side has reserved the disk (Hendrik Brueckner) [626827 619449]", "edition": 4, "modified": "2010-10-20T00:00:00", "published": "2010-10-20T00:00:00", "id": "ELSA-2010-0779", "href": "http://linux.oracle.com/errata/ELSA-2010-0779.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:19", "bulletinFamily": "unix", "cvelist": ["CVE-2010-2942", "CVE-2010-3904", "CVE-2010-3477", "CVE-2010-3067"], "description": "Following security bugs are fixed in this errata\nCVE-2010-3904\nWhen copying data to userspace, the RDS protocol failed to verify that the user-provided address was a valid\nuserspace address. A local unprivileged user could issue specially crafted socket calls to write arbitrary\nvalues into kernel memory and potentially escalate privileges to root.\nCVE-2010-3067\nInteger overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows\nlocal users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit\nsystem call.\nCVE-2010-3477\nThe tcf_act_police_dump function in net/sched/act_police.c in the actions implementation in the network queueing\nfunctionality in the Linux kernel before 2.6.36-rc4 does not properly initialize certain structure members, which\nallows local users to obtain potentially sensitive information from kernel memory via vectors involving a dump\noperation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2942.\nkernel:\n[2.6.32-100.21.1.el5]\n- [rds] fix access issue with rds (Chris Mason) {CVE-2010-3904}\n- [fuse] linux-2.6.32-fuse-return-EGAIN-if-not-connected-bug-10154489.patch\n- [net] linux-2.6.32-net-sched-fix-kernel-leak-in-act_police.patch\n- [aio] linux-2.6.32-aio-check-for-multiplication-overflow-in-do_io_subm.patch\nofa:\n[1.5.1-4.0.23]\n- Fix rds permissions checks during copies\n[1.5.1-4.0.21]\n- Update to BXOFED 1.5.1-1.3.6-5 ", "edition": 4, "modified": "2010-10-22T00:00:00", "published": "2010-10-22T00:00:00", "id": "ELSA-2010-2009", "href": "http://linux.oracle.com/errata/ELSA-2010-2009.html", "title": "Oracle Linux 5 Unbreakable Enterprise kernel security fix update", "type": "oraclelinux", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:39:34", "bulletinFamily": "unix", "cvelist": ["CVE-2010-2942", "CVE-2010-2943"], "description": "[2.6.32-100.20.1.el5]\n- [fs] xfs: return inode fork offset in bulkstat for fsr (Dave Chinner)\n- [fs] xfs: always use iget in bulkstat (Dave Chinner) {CVE-2010-2943}\n- [fs] xfs: validate untrusted inode numbers during lookup (Dave Chinner) {CVE-2\n010-2943}\n- [fs] xfs: rename XFS_IGET_BULKSTAT to XFS_IGET_UNTRUSTED (Dave Chinner) {CVE-2\n010-2943}\n- [net] net sched: fix some kernel memory leaks (Eric Dumazet) {CVE-2010-2942}\n- [fs] ocfs2: Don't walk off the end of fast symlinks (Joel Becker) ", "edition": 4, "modified": "2010-10-04T00:00:00", "published": "2010-10-04T00:00:00", "id": "ELSA-2010-2008", "href": "http://linux.oracle.com/errata/ELSA-2010-2008.html", "title": "Unbreakable enterprise kernel security update", "type": "oraclelinux", "cvss": {"score": 7.9, "vector": "AV:N/AC:M/Au:S/C:C/I:C/A:N"}}, {"lastseen": "2019-05-29T18:38:02", "bulletinFamily": "unix", "cvelist": ["CVE-2010-3904", "CVE-2010-3078", "CVE-2010-3477", "CVE-2010-3086", "CVE-2010-2963", "CVE-2010-3066", "CVE-2010-3067", "CVE-2010-3448"], "description": "[2.6.18-194.26.1.0.1.el5]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- Add entropy support to igb (John Sobecki) [orabug 7607479]\n- [nfs] convert ENETUNREACH to ENOTCONN [orabug 7689332]\n- [NET] Add xen pv/bonding netconsole support (Tina Yang) [orabug 6993043]\n [bz 7258]\n- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [nfsd] fix failure of file creation from hpux client (Wen gang Wang)\n [orabug 7579314]\n- [qla] fix qla not to query hccr (Guru Anbalagane) [Orabug 8746702]\n- [net] bonding: fix xen+bonding+netconsole panic issue (Joe Jin) \n [orabug 9504524]\n- [rds] Patch rds to 1.4.2-14 (Andy Grover) [orabug 9471572, 9344105]\n RDS: Fix BUG_ONs to not fire when in a tasklet\n ipoib: Fix lockup of the tx queue\n RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)\n RDS: Properly unmap when getting a remote access error (Tina Yang)\n RDS: Fix locking in rds_send_drop_to()\n- [mm] Enhance shrink_zone patch allow full swap utilization, and also be\n NUMA-aware (John Sobecki, Chris Mason, Herbert van den Bergh)\n [orabug 9245919]\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n[2.6.18-194.26.1.el5]\n- [net] mlx4: bump max log_mtts_per_seg memory reservation (Jay Fenlason) [643806 636198]\n[2.6.18-194.25.1.el5]\n- [fs] nfs: fix regression in NFS Direct I/O path (Steve Dickson) [647601 647297]\n[2.6.18-194.24.1.el5]\n- Changelog fix\n[2.6.18-194.23.1.el5]\n- [net] bonding: correctly process non-linear skbs (Andy Gospodarek) [644822 619070]\n- Syncing following patch from branched build:\n- [net] rds: fix local privilege escalation (Eugene Teo) [642897 642898] {CVE-2010-3904}\n[2.6.18-194.22.1.el5]\n- [fs] xfs: fix speculative allocation beyond eof (Dave Chinner) [643571 638753]\n[2.6.18-194.21.1.el5]\n- [scsi] qla2xxx: Correct use-after-free issue in terminate_rport_io callback \n (Chad Dupuis) [643135 567428]\n- [misc] futex: replace LOCK_PREFIX in futex.h (Peter Zijlstra) [633175 633176]\n {CVE-2010-3086}\n- [v4l] remove compat code for VIDIOCSMICROCODE (Mauro Carvalho Chehab) [642470\n 642471] {CVE-2010-2963}\n- [xen] hvm: correct accuracy of pmtimer (Andrew Jones) [641915 633028]\n- [net] bonding: fix IGMP report on slave during failover (Flavio Leitner) [640973 \n 637764]\n- [fs] nfsv4: fix bug when server returns NFS4ERR_RESOURCE (Steve Dickson) [628889 \n 620502]\n- [fs] nfsv4: ensure lockowners are labelled correctly (Steve Dickson) [628889 \n 620502]\n- [fs] nfsv4: add support for RELEASE_LOCKOWNER operation (Steve Dickson) [628889 \n 620502]\n- [fs] nfsv4: clean up for lockowner XDR encoding (Steve Dickson) [628889 620502]\n- [fs] nfsv4: ensure we track lock state in r/w requests (Steve Dickson) [628889\n 620502]\n- [time] implement fine grained accounting for PM timer (Ulrich Obergfell) \n [637069 586285]\n- [time] initialize tick_nsec based on kernel parameters (Ulrich Obergfell) \n [637069 586285]\n- [time] introduce 'pmtimer_fine_grained' kernel parameter (Ulrich Obergfell) \n [637069 586285]\n- [fs] nfs: wait for close before silly-renaming (Jeff Layton) [642628 565974]\n[2.6.18-194.20.1.el5]\n- [scsi] megaraid_sas: fix physical disk handling (Tomas Henzl) [619365 564249]\n- [scsi] lpfc: fix ioctl crash in lpfc_nlp_put (Rob Evers) [637727 625841]\n- [net] sched: fix info leak in traffic policing (Neil Horman) [636391 636392] \n {CVE-2010-3477}\n- [md] dm: fix deadlock with fsync vs. resize in lvm (Mikulas Patocka) [632255 \n 624068]\n- [misc] fix race in pid generation causing immediate reuse (Dave Anderson) \n [638866 634850]\n- [scsi] fix disk spinup for shorter path restore times (Rob Evers) [634977 \n 608109]\n- [fs] aio: check for multiplication overflow in io_submit (Jeff Moyer) [629448 \n 629449] {CVE-2010-3067}\n- [fs] xfs: prevent reading uninitialized stack memory (Dave Chinner) [630806 \n 630807] {CVE-2010-3078}\n- [fs] aio: fix cleanup in io_submit_one (Jeff Moyer) [631720 631721] \n {CVE-2010-3066}\n- [net] ipv4: fix buffer overflow in icmpmsg_put (Frantisek Hrbata) [634976 \n 601391]\n- [xen] hvm: fix UP suspend/resume/migration w/PV drivers (Miroslav Rezanina) \n [630989 629773]\n- [fs] dlm: fix try 1cb failure, part 2 (Abhijith Das) [639073 504188]\n- [fs] dlm: no node callback when try 1cb lock req fails (David Teigland) \n [639073 504188]\n[2.6.18-194.19.1.el5]\n- [virt] xen: fix xennet driver to not corrupt data (Neil Horman) [637220 630129]\n- [pnp] ignore both UNSET and DISABLED ioresources (Prarit Bhargava) [629861 \n 560540]\n- [pnp] reserve system board iomem and ioport resources (Prarit Bhargava) \n [629861 560540]\n- [net] bonding: fix ALB mode to balance traffic on VLANs (Andy Gospodarek) \n [630540 578531]\n- [net] qla3xxx: fix oops on too-long netdev priv structure (Neil Horman) [637206 \n 620508]\n- [acpi] thinkpad-acpi: lock down video output state access (Don Howard) [629241\n 607037]\n[2.6.18-194.18.1.el5]\n- [s390] dasd: fix race between tasklet and dasd_sleep_on (Hendrik Brueckner) \n[638579 593756] ", "edition": 4, "modified": "2010-11-09T00:00:00", "published": "2010-11-09T00:00:00", "id": "ELSA-2010-0839", "href": "http://linux.oracle.com/errata/ELSA-2010-0839.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:38:21", "bulletinFamily": "unix", "cvelist": ["CVE-2010-4242", "CVE-2011-0521", "CVE-2010-4073", "CVE-2010-4072", "CVE-2010-4527", "CVE-2010-4083", "CVE-2010-3859", "CVE-2010-3477", "CVE-2010-4080", "CVE-2010-4158", "CVE-2010-3876", "CVE-2010-3296", "CVE-2010-4258", "CVE-2010-3442", "CVE-2010-4249", "CVE-2010-4157", "CVE-2010-3081", "CVE-2010-3067", "CVE-2010-3432", "CVE-2010-4075", "CVE-2010-4655"], "description": "[2.6.9-100]\n-cxgb3: prevent reading uninitialized stack memory to fix xgb_extension_ioctl infoleak (Eugene Teo) [633153] {CVE-2010-3296}\n-mlx4: disable MSI-X by default (Andy Gospodarek) [530596]\n-ext3: call fs invalidatepage instead of block_invalidatepage (Josef Bacik) [488611]\n-av7110: check for negative array offset (Mauro Carvalho Chehab) [672400] {CVE-2011-0521}\n-ext3: don not dirty unmapped data buffers (Josef Bacik) [488611]\n-net: clear heap allocations for privileged ethtool actions (Jiri Pirko) [672431] {CVE-2010-4655}\n[2.6.9-99]\n-bonding: fix active backup failover due to jiffie wrap (Andy Gospodarek) [641112]\n[2.6.9-98]\n-sound: fix a buffer overflow in the oss mixer (David Howells) [667619] {CVE-2010-4527}\n[2.6.9-97]\n-fs: fix filesystem corruption on ext2 (Alexander Viro) [662839]\n-sky2: fix oops in sky2_xmit_frame after tx timeout (Don Howard) [614559]\n-netdump: fix netdump failures on large memory systems (Neil Horman) [488557]\n[2.6.9-96]\n-usb: ehci amd periodic frame list table quirk (Don Zickus) [651334]\n-fs: truncate blocks outside i_size after O_DIRECT write error (Eric Sandeen) [665067]\n[2.6.9-95]\n-jbd: skip buffers that have a different jh (Josef Bacik) [488611]\n-unix: fix local socket dos (Neil Horman) [656758] {CVE-2010-4249}\n-s390x: qdio: fix zfcp stall with more than 63 active qdio devices (Hendrik Brueckner) [662130]\n-ehci-hcd: fix fatal error during bootup (Don Zickus) [656447]\n[2.6.9-94]\n-modules: sysctl to block module loading (Jerome Marchand) [645220]\n-redhat: added config_security_dmesg_restrict option (Frantisek Hrbata) [653252]\n-kernel: restrict unprivileged access to kernel syslog (Frantisek Hrbata) [653252]\n-sysctl: introduce ctl_unnumbered definition in sysctl.h (Frantisek Hrbata) [653252]\n-usb: allow usbstorage to have luns greater than 2TB (Don Zickus) [658824]\n-serial: clean data before filling it (Mauro Carvalho Chehab) [648809] {CVE-2010-4075}\n-sched: fix task starvation on Hyperthreaded cpus (Vitaly Mayatskikh) [488089]\n-s390: sclp: handle zero length event buffers (Hans-Joachim Picht) [487692]\n[2.6.9-93]\n-kernel: failure to revert address limit override in oops error path (Dave Anderson) [659569] {CVE-2010-4258}\n-nfsv4: fix oops in nfs4_kill_super (Jeff Layton) [660448]\n-net: filter: make sure filters dont read uninitialized memory (Jiri Pirko) [651701] {CVE-2010-4158}\n-net: limit sendto()/recvfrom()/iovec total length to INT_MAX (Jiri Pirko) [651924] {CVE-2010-3859}\n-bluetooth: fix missing null check (Jarod Wilson) [655663] {CVE-2010-4242}\n-ipc: initialize structure memory to zero for compat functions (Xiaotian Feng) [648811] {CVE-2010-4073}\n-ipc: shm: fix information leak to userland (Xiaotian Feng) [648817] {CVE-2010-4072}\n-netfront: default to copying instead of flipping (Laszlo Ersek) [653505]\n-net: packet: fix information leak to userland (Jiri Pirko) [649896] {CVE-2010-3876}\n-scsi: gdth: integer overflow in ioc_general (Frantisek Hrbata) [651174] {CVE-2010-4157}\n-sys_semctl: semctl fix kernel stack leakage (Xiaotian Feng) [648794] {CVE-2010-4083}\n-alsa: rme9652: prevent reading uninitialized stack memory (Stanislaw Gruszka) [648807] {CVE-2010-4080}\n-fs: only return EIO once on msync/fsync after IO failure (Rik van Riel) [645633]\n-xen: virtio_net: add get_drvinfo() to virtio_net (Laszlo Ersek) [647196]\n-xen: netfront: add get_drvinfo() to netfront (Laszlo Ersek) [647187]\n-kernel: fix possible integer overflow in mm/fremap.c (Larry Woodman) [637045]\n[2.6.9-92]\n-mm: revert patch to reduce large file latency during writebacks (Larry Woodman) [488070]\n[2.6.9-91]\n-mm: prevent panic when setting /proc/sys/vm/nr_hugepages (Larry Woodman) [647567]\n-net: sctp: do not reset the packet during sctp_packet_config() (Jiri Pirko) [637865] {CVE-2010-3432}\n-scsi: fix panic in sysfs_hash_and_remove() when scsi device is removed (Mark Goodwin) [533299]\n[2.6.9-90]\n-kernel: prevent heap corruption in snd_ctl_new() (Jerome Marchand) [638482] {CVE-2010-3442}\n-forcedeth: latest bugfixes from upstream (Ivan Vecera) [552953]\n-forcedeth: remove CONFIG_FORCEDETH_NAPI=y from config-generic (Ivan Vecera) [552953]\n[2.6.9-89.45]\n-scsi: scsi_do_req submitted commands (tape) never complete when device goes (Rob Evers) [636289]\n-scsi: log msg when getting unit attention (Mike Christie) [585430]\n-jbd: fix panic in jbd when running bashmemory (Josef Bacik) [488611]\n-qla2xxx: work around hypertransport sync flood error on sun x4200 with qla2xxx (Chad Dupuis) [621621]\n-aio: implement request batching for better merging and throughput (Jeff Moyer) [508377]\n-fs: a bunch of patches to fix various nfsd/iget() races (Alexander Viro) [189918]\n-net: bonding: add debug module option (Jiri Pirko) [247116]\n-fix fd leaks if pipe() is called with an invalid address (Amerigo Wang) [509627]\n[2.6.9-89.44]\n-ide-scsi: fix deadlock in ide-scsi error handler (Doug Ledford) [526966]\n-mlx4_core: allocate sufficient memory for interrupt table (Doug Ledford) [530596]\n-mptbase: panic with domain validation while rebuilding after the disk is replaced (Rob Evers) [476874]\n-fs: buffer: __block_write_full_page simplification by removing last_bh logic (Jeff Moyer) [472752]\n-fs: buffer: __block_write_full_page speedup by removing get_bh() and put_bh() (Jeff Moyer) [472752]\n-fs: buffer: __block_write_full_page race fix (Jeff Moyer) [472752]\n-kernel: fix integer overflow in groups_search (Jerome Marchand) [457519]\n-cifs: remove bogus check in ntlm session setup code (Jeff Layton) [604786]\n-cifs: when renaming don not try to unlink negative dentry (Jeff Layton) [500904]\n-autofs4: fix lookup deadlock when user space uses a signal (Ian Kent) [477017]\n-fs: make sure data stored into inode is properly seen before unlocking new inode (Eric Sandeen) [563920]\n-ipc: hard_msgmax should be higher not lower on 64bit (Amerigo Wang) [525815]\n-fs: fix file truncations when both suid and write permissions set (Amerigo Wang) [525398]\n-block: fix rcu accesses in partition statistics (Jerome Marchand) [517523]\n-kernel headers: fix missing defintion that causes build break (Neil Horman) [504593]\n[2.6.9-89.43]\n-aacraid: fix file system going into read only mode (Rob Evers) [624713]\n-blkfront: xen domu, raid1, lvm, iscsi target export with blockio bug (Paolo Bonzini) [490148]\n-cciss: change version from 2.6.20.RH2 to 2.6.20.RH3 (Tomas Henzl) [594086]\n-cciss: added printk in do_cciss_request before BUG() (Tomas Henzl) [594086]\n-cciss: fix a nulll pointer dereference in complete_command() (Tomas Henzl) [594086]\n-cciss: fix an issue when sending command with no data (Tomas Henzl) [594086]\n-mm: honor __GFP_NOFAIL flag in __alloc_pages() (Lachlan McIlroy) [605455]\n-xen: fix crashing of x86 hvm guest on x86_64 (Radim Krcmar) [637658]\n-xen: hide xenbus warnings on hvm guest shutdown (Radim Krcmar) [505081]\n-powernow-k8: fix errant print statement during voltage transitions (Bhavna Sarathy) [217829]\n-fusion: add sleep before subsequent tur in scan function (Tomas Henzl) [495236]\n-bonding: fix a race condition in calls to slave mii ioctls (Flavio Leitner) [621209]\n-s390x: cio: vary off on chpid 00 causes unexpected recovery actions (Hendrik Brueckner) [619855]\n-netfilter: arp_tables: fix unaligned accesses caused by casting strings to long (Jiri Pirko) [591638]\n-net: neigh: fix state transition incomplete->failed via netlink request (Jiri Pirko) [485904]\n-x86_64: floating point state corruption after handling the signal (Oleg Nesterov) [564381]\n-pidhashing: enforce pid_max_limit in sysctls and lower pid_max_limit on 32bit systems (Jiri Pirko) [525941]\n-s390: cio: linux does not boot through xautolog with conmode 3270 (Hans-Joachim Picht) [526282]\n-net: fix proc net ip_conntrack seq_file operations (Danny Feng) [524884]\n-ia64: swiotlb: fix swiotlb pci_map_sg error handling (Tomas Henzl) [525427]\n-xen: try harder to balloon up under memory pressure (Andrew Jones) [507847]\n-mm: fix bogus memory node assumption in huge page allocation (AMEET M. PARANJAPE) [506827]\n-kernel: binfmt_misc c: avoid potential kernel stack overflow (Vitaly Mayatskikh) [459466]\n-net: fix ipvs wrr scheduler bug of updating current weight (Vitaly Mayatskikh) [462717]\n[2.6.9-89.42]\n-net: actually copy input_dev to new sk_buff in skb_clone (Andy Gospodarek) [616710]\n-net: fix reception of completely page backed sk_buffs (Andy Gospodarek) [500921]\n-net: fix various snmp counter issues (Thomas Graf) [500889]\n-xen: can enter tickless mode with rcu pending and hang (Paolo Bonzini) [427998]\n-xen: fix occasional deadlocks in xen netfront (Paolo Bonzini) [480937]\n-xen: xenbus suspend_mutex remains locked on trans fail (Paolo Bonzini) [456649]\n-ext2: put explicit checks to not divide by zero (Josef Bacik) [500181]\n-usb: ehci split iso fixes, full speed audio etc (Don Zickus) [624117]\n-xenbus: implement O_NONBLOCK for /proc/xen/xenbus (Paolo Bonzini) [607261]\n-nfs: initialize nfs_open_context list member at allocation time (Jeff Layton) [634632]\n-cifs: fix dentry hash calculation for case insensitive mounts (Jeff Layton) [562949]\n-cifs: fix length calculation for converted unicode readdir names (Jeff Layton) [562949]\n[2.6.9-89.41]\n-bonding: fix ALB mode to balance traffic on vlans (Flavio Leitner) [640803]\n[2.6.9-89.40]\n-bonding: interface doesn t issue igmp report on slave interface during failover (Flavio Leitner) [637556]\n[2.6.9-89.39]\n-net: fix info leak in police code (Neil Horman) [636390] {CVE-2010-3477}\n-aio: check for multiplication overflow in io_submit (Jeff Moyer) [629447] {CVE-2010-3067}\n-fs: buffer.c: fix race in __block_prepare_write (Jeff Moyer) [480404]\n-3c59x: fix deadlock in irq handler tx path when netconsole in use (Neil Horman) [557380]\n-udp: use memory barrier in datagram_poll (Flavio Leitner) [546251]\n[2.6.9-89.38]\n-compat: make compat_alloc_user_space incorporate the access_ok (Xiaotian Feng) [634462] {CVE-2010-3081}\n-ext3: ensure inode is deleted from orphan list in ext3_direct_io() (Lachlan McIlroy) [629143]\n-sb800: add quirk for iso on amd sb800 (Pete Zaitcev) [537447]\n[2.6.9-89.37]\n-virtio_net: Fix MAX_PACKET_LEN to support 802.1Q VLANs (Michael S. Tsirkin) [607533]\n-do_generic_mapping_read: clear page errors when issuing a fresh read of the page (Rik van Riel) [481371]\n-ide: backport VIA PCI chipset ids to via82cxxx driver (Mauro Carvalho Chehab) [504778]\n-nfsd4: relax new lock seqid check (Jeff Layton) [577369]\n-igb: fix transmission of jumbo frames with mtu>=2100 (Stefan Assmann) [494597]\n-net: fix tcp conntrack to handle the half opened connection correctly (Jiri Pirko) [531914]\n-net: fix promisc refcounting for interfaces listening for multicast traffic (Neil Horman) [481292]\n-sctp: assign tsns earlier to avoid reordering (Neil Horman) [532045]\n-cciss: switch to using hlist to fix panic (Tomas Henzl) [479090]\n-nfs: statfs error handling and error message fix (Jeff Layton) [520018]\n-kthreads: fix kthread_create vs kthread_stop race (Oleg Nesterov) [519006]\n[2.6.9-89.36]\n-nfsd4: fix share conflict tests in nfs_check_open() (Jeff Layton) [510184]\n-nfsd4: move open owner checks from nfsd4_process_open2 into new function (Jeff Layton) [510184]\n-nfsd4: renew lease on seqid modifying operations (Jeff Layton) [508752]\n-ahci: add SATA GEN3 related messages (David Milburn) [512715]\n-igmp: fix ip_mc_sf_allow() race due to a lock problem (Flavio Leitner) [562904]\n-xen: don not recreate xenfb thread on every restore (Chris Lalancette) [543823]\n-bcm5709: update firmware for bcm5709 from version 4.4.23 to 4.6.15 (John Feeney) [532858]\n-net: apply broken_stats workaround to 5706 and 5708 (Flavio Leitner) [515274]\n-nfsd: fix races when cleaning up after last nfsd thread exits (Jeff Layton) [501500]\n-nfs: nfsd returns nfs4_ok when the owner opens a file with permission set to 000 (Peter Staubach) [507527]\n-nfsv4: send the delegation stateid for setattr calls (Jeff Layton) [502884]\n-nfsv4: fix up races in nfs4_proc_setattr (Jeff Layton) [502884]\n-nfsv4: don t reuse expired nfs4_state_owner structs (Jeff Layton) [502884]\n-nfsv4: fix a credential reference leak in nfs4_get_state_owner (Jeff Layton) [502884]\n-nfsv4: poll more aggressively when handling nfs4err_delay (Jeff Layton) [502884]\n-nfsv4: flush nfsv4 work workqueue before killing superblock (Jeff Layton) [501335]\n-nfsv4: only queue nfs4_close_state job when called by rpciod (Jeff Layton) [501335]\n-nfsv4: switch nfs4 workqueue to a per client queue (Jeff Layton) [501335]\n-nfs: mounted nfsv4/krb5 export inaccessible following an nfs server reboot (Harshula) [514684] ", "edition": 72, "modified": "2011-02-23T00:00:00", "published": "2011-02-23T00:00:00", "id": "ELSA-2011-0263", "href": "http://linux.oracle.com/errata/ELSA-2011-0263.html", "title": "Oracle Linux 4.9 kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:37:21", "bulletinFamily": "unix", "cvelist": ["CVE-2010-2942", "CVE-2010-2492", "CVE-2010-2943", "CVE-2010-3015", "CVE-2010-2938", "CVE-2010-2240", "CVE-2010-1083", "CVE-2010-3081", "CVE-2010-2798"], "description": "[2.6.18-194.17.1.0.1.el5]\r\n- [xen] check to see if hypervisor supports memory reservation change\r\n (Chuck Anderson) [orabug 7556514]\r\n- Add entropy support to igb (John Sobecki) [orabug 7607479]\r\n- [nfs] convert ENETUNREACH to ENOTCONN [orabug 7689332]\r\n- [NET] Add xen pv/bonding netconsole support (Tina Yang) [orabug 6993043]\r\n [bz 7258]\r\n- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]\r\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\r\n- [nfsd] fix failure of file creation from hpux client (Wen gang Wang)\r\n [orabug 7579314]\r\n- [qla] fix qla not to query hccr (Guru Anbalagane) [Orabug 8746702]\r\n- [net] bonding: fix xen+bonding+netconsole panic issue (Joe Jin) \r\n [orabug 9504524]\r\n- [rds] Patch rds to 1.4.2-14 (Andy Grover) [orabug 9471572, 9344105]\r\n RDS: Fix BUG_ONs to not fire when in a tasklet\r\n ipoib: Fix lockup of the tx queue\r\n RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)\r\n RDS: Properly unmap when getting a remote access error (Tina Yang)\r\n RDS: Fix locking in rds_send_drop_to()\r\n- [mm] Enhance shrink_zone patch allow full swap utilization, and also be\r\n NUMA-aware (John Sobecki, Chris Mason, Herbert van den Bergh)\r\n [orabug 9245919]\r\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\r\n [orabug 9107465]\r\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\r\n [orabug 9764220]\r\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\r\n- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,\r\n Guru Anbalagane) [orabug 6124033]\r\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\r\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\r\n \n[2.6.18-194.17.1.el5]\r\n- Syncing following patch from branched build:\r\n- [misc] make compat_alloc_user_space() incorporate the access_ok() \r\n (Don Howard) [634463 634464] {CVE-2010-3081}\r\n \n[2.6.18-194.16.1.el5]\r\n- [fs] xfs: fix missing untrusted inode lookup tag (Dave Chinner) \r\n [624366 607032] {CVE-2010-2943}\r\n \n[2.6.18-194.15.1.el5]\r\n- [net] cxgb3: don't flush workqueue if called from wq (Doug Ledford) \r\n [630978 630124]\r\n- [net] cxgb3: get fatal parity error status on interrupt (Doug Ledford) \r\n [630978 630124]\r\n- [net] cxgb3: clear fatal parity error register on init (Doug Ledford) \r\n [630978 630124]\r\n- [net] cxgb3: add define for fatal parity error bit (Doug Ledford) \r\n [630978 630124]\r\n \n[2.6.18-194.14.1.el5]\r\n- [s390] dasd: force online does not work (Hendrik Brueckner) [627194 619466]\r\n- [s390] dasd: allocate fallback cqr for reserve/release (Hendrik Brueckner) \r\n [627195 619465]\r\n- [fs] xfs: fix untrusted inode number lookup (Dave Chinner) [629219 624862]\r\n- [net] sched: fix some kernel memory leaks (Jiri Pirko) [624904 624638] \r\n {CVE-2010-2942}\r\n- [usb] fix usbfs information leak (Eugene Teo) [566628 566629] {CVE-2010-1083}\r\n- [fs] xfs: rename XFS_IGET_BULKSTAT to XFS_IGET_UNTRUSTED (Dave Chinner)\r\n [624366 607032] {CVE-2010-2943}\r\n- [fs] xfs: validate untrusted inode numbers during lookup (Dave Chinner) \r\n [624366 607032] {CVE-2010-2943}\r\n- [fs] xfs: always use iget in bulkstat (Dave Chinner) [624366 607032] \r\n {CVE-2010-2943}\r\n \n[2.6.18-194.13.1.el5]\r\n- [xen] fix guest crash on non-EPT machine may crash host (Paolo Bonzini) \r\n [621429 621430] {CVE-2010-2938}\r\n- [fs] ext4: consolidate in_range definitions (Eric Sandeen) [624331 624332] \r\n {CVE-2010-3015}\r\n- [mm] add option to skip ZERO_PAGE mmap of /dev/zero (Larry Woodman) \r\n [623141 619541]\r\n- [net] bonding: check if clients MAC addr has changed (Flavio Leitner) \r\n [623143 610234]\r\n- [net] sctp: fix length checks (Neil Horman) [624369 605305]\r\n- [xen] bring back VMXE/SVME flags (Andrew Jones) [624365 570091]\r\n- Syncing following patches from branched builds:\r\n- [mm] accept an abutting stack segment (Jiri Pirko) [607857 607858] \r\n {CVE-2010-2240}\r\n- [mm] pass correct mm when growing stack (Jiri Pirko) [607857 607858] \r\n {CVE-2010-2240}\r\n- [mm] fix up some user-visible effects of stack guard page (Jiri Pirko) \r\n [607857 607858] {CVE-2010-2240}\r\n- [mm] fix page table unmap for stack guard page properly (Jiri Pirko) \r\n [607857 607858] {CVE-2010-2240}\r\n- [mm] fix missing unmap for stack guard page failure case (Jiri Pirko)\r\n [607857 607858] {CVE-2010-2240}\r\n- [mm] keep a guard page below a grow-down stack segment (Jiri Pirko) \r\n [607857 607858] {CVE-2010-2240} ", "edition": 4, "modified": "2010-09-29T00:00:00", "published": "2010-09-29T00:00:00", "id": "ELSA-2010-0723", "href": "http://linux.oracle.com/errata/ELSA-2010-0723.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 7.9, "vector": "AV:N/AC:M/Au:S/C:C/I:C/A:N"}}], "seebug": [{"lastseen": "2017-11-19T18:12:16", "description": "BUGTRAQ ID: 42529\r\nCVE(CAN) ID: CVE-2010-3477,CVE-2010-2942\r\n\r\nLinux Kernel\u662f\u5f00\u653e\u6e90\u7801\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux Kernel\u7684\u7f51\u7edc\u961f\u5217\u529f\u80fd\u4e2dnet/sched/act_police.c\u4e0b\u7684tcf_act_police_dump\u51fd\u6570\u6ca1\u6709\u6b63\u786e\u5730\u521d\u59cb\u5316\u67d0\u4e9b\u7ed3\u6784\u6210\u5458\uff0c\u8fd9\u5141\u8bb8\u672c\u5730\u7528\u6237\u901a\u8fc7dump\u64cd\u4f5c\u4ece\u5185\u6838\u5185\u5b58\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002\n\nLinux kernel 2.6.x\n\u5382\u5546\u8865\u4e01\uff1a\r\n\r\nLinux\r\n-----\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\nhttp://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git;a=commit;h=0f04cfd098fb81fded74e78ea1a1b86cc6c6c31e", "published": "2010-09-30T00:00:00", "type": "seebug", "title": "Linux kernel 2.6.x\u7f51\u7edc\u961f\u5217\u529f\u80fd\u5185\u5b58\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e", "bulletinFamily": "exploit", "cvelist": ["CVE-2010-2942", "CVE-2010-3477"], "modified": "2010-09-30T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-20134", "id": "SSV:20134", "sourceData": "", "sourceHref": "", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2017-11-19T18:07:58", "description": "BUGTRAQ ID: 43353\r\nCVE(CAN) ID: CVE-2010-3067\r\n\r\nLinux Kernel\u662f\u5f00\u653e\u6e90\u7801\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux Kernel\u7684fs/aio.c\u6587\u4ef6\u4e2d\u7684do_io_submit\u51fd\u6570\u5b58\u5728\u6574\u6570\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u672c\u5730\u7528\u6237\u53ef\u4ee5\u901a\u8fc7io_submit\u8c03\u7528\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002\r\n\r\nio_submit\u7cfb\u7edf\u8c03\u7528\u76f4\u63a5\u8c03\u7528\u4e86do_io_submit()\u51fd\u6570\uff1a\r\n\r\nSYSCALL_DEFINE3(io_submit, aio_context_t, ctx_id, long, nr,\r\n struct iocb __user * __user *, iocbpp)\r\n{\r\n return do_io_submit(ctx_id, nr, iocbpp, 0);\r\n}\r\n\r\ndo_io_submit\u4ec5\u68c0\u67e5\u4e86nr\u662f\u5426\u5c0f\u4e8e0\uff0c\u4f46\u6ca1\u6709\u68c0\u67e5access_ok\u4e58\u79ef\u662f\u5426\u4f1a\u6ea2\u51fa\uff1a\r\n\r\nlong do_io_submit(aio_context_t ctx_id, long nr,\r\n struct iocb __user *__user *iocbpp, bool compat)\r\n{\r\n...\r\n if (unlikely(!access_ok(VERIFY_READ, iocbpp, (nr*sizeof(*iocbpp)))))\r\n return -EFAULT;\r\n...\r\n\r\n\u4e4b\u540e\u5bf9__get_user_nocheck()\u4f7f\u7528\u4e86\u8fd9\u4e2a\u5faa\u73af\uff0c\u8fd9\u5e76\u4e0d\u5b89\u5168\uff1a\r\n\r\n...\r\n for (i=0; i<nr; i++) {\r\n struct iocb __user *user_iocb;\r\n struct iocb tmp;\r\n\r\n if (unlikely(__get_user(user_iocb, iocbpp + i))) {\r\n ret = -EFAULT;\r\n break;\r\n }\r\n...\r\n\n\nLinux kernel 2.6.x\n\u5382\u5546\u8865\u4e01\uff1a\r\n\r\nLinux\r\n-----\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\nhttp://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=75e1c70fc31490ef8a373ea2a4bea2524099b478", "published": "2010-09-30T00:00:00", "type": "seebug", "title": "Linux kernel 2.6.x do_io_submit()\u51fd\u6570\u6574\u6570\u6ea2\u51fa\u6f0f\u6d1e", "bulletinFamily": "exploit", "cvelist": ["CVE-2010-3067"], "modified": "2010-09-30T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-20133", "id": "SSV:20133", "sourceData": "", "sourceHref": "", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "fedora": [{"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-2954", "CVE-2010-2960", "CVE-2010-3067", "CVE-2010-3080", "CVE-2010-3081", "CVE-2010-3301"], "description": "The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc. ", "modified": "2010-09-22T04:10:26", "published": "2010-09-22T04:10:26", "id": "FEDORA:25A5910FA53", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 14 Update: kernel-2.6.35.4-28.fc14", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-2071", "CVE-2010-2478", "CVE-2010-2524", "CVE-2010-2954", "CVE-2010-2955", "CVE-2010-2960", "CVE-2010-3067", "CVE-2010-3079", "CVE-2010-3080", "CVE-2010-3081", "CVE-2010-3301"], "description": "The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc. ", "modified": "2010-09-21T01:30:38", "published": "2010-09-21T01:30:38", "id": "FEDORA:3E64B10F9E5", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 13 Update: kernel-2.6.34.7-56.fc13", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2009-4131", "CVE-2009-4537", "CVE-2010-0623", "CVE-2010-1146", "CVE-2010-1437", "CVE-2010-2066", "CVE-2010-2071", "CVE-2010-2266", "CVE-2010-2478", "CVE-2010-2524", "CVE-2010-2954", "CVE-2010-2960", "CVE-2010-3067", "CVE-2010-3079", "CVE-2010-3080", "CVE-2010-3081", "CVE-2010-3301"], "description": "The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc. ", "modified": "2010-09-21T01:38:22", "published": "2010-09-21T01:38:22", "id": "FEDORA:E07AD11061A", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 12 Update: kernel-2.6.32.21-168.fc12", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "ubuntu": [{"lastseen": "2020-07-18T01:42:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-2942", "CVE-2010-3904", "CVE-2010-3078", "CVE-2010-2066", "CVE-2010-2248", "CVE-2010-2226", "CVE-2010-2960", "CVE-2010-2955", "CVE-2010-2946", "CVE-2009-4895", "CVE-2010-3437", "CVE-2010-2521", "CVE-2010-3477", "CVE-2010-3310", "CVE-2010-2963", "CVE-2010-2524", "CVE-2010-2478", "CVE-2010-3015", "CVE-2010-2495", "CVE-2010-3442", "CVE-2010-3705", "CVE-2010-2954", "CVE-2010-3067", "CVE-2010-2525", "CVE-2010-3084", "CVE-2010-2798", "CVE-2010-3080", "CVE-2010-3432"], "description": "Dan Rosenberg discovered that the RDS network protocol did not correctly \ncheck certain parameters. A local attacker could exploit this gain root \nprivileges. (CVE-2010-3904)\n\nAl Viro discovered a race condition in the TTY driver. A local attacker \ncould exploit this to crash the system, leading to a denial of service. \n(CVE-2009-4895)\n\nDan Rosenberg discovered that the MOVE_EXT ext4 ioctl did not correctly \ncheck file permissions. A local attacker could overwrite append-only files, \nleading to potential data loss. (CVE-2010-2066)\n\nDan Rosenberg discovered that the swapexit xfs ioctl did not correctly \ncheck file permissions. A local attacker could exploit this to read from \nwrite-only files, leading to a loss of privacy. (CVE-2010-2226)\n\nSuresh Jayaraman discovered that CIFS did not correctly validate certain \nresponse packats. A remote attacker could send specially crafted traffic \nthat would crash the system, leading to a denial of service. \n(CVE-2010-2248)\n\nBen Hutchings discovered that the ethtool interface did not correctly check \ncertain sizes. A local attacker could perform malicious ioctl calls that \ncould crash the system, leading to a denial of service. (CVE-2010-2478, \nCVE-2010-3084)\n\nJames Chapman discovered that L2TP did not correctly evaluate checksum \ncapabilities. If an attacker could make malicious routing changes, they \ncould crash the system, leading to a denial of service. (CVE-2010-2495)\n\nNeil Brown discovered that NFSv4 did not correctly check certain write \nrequests. A remote attacker could send specially crafted traffic that could \ncrash the system or possibly gain root privileges. (CVE-2010-2521)\n\nDavid Howells discovered that DNS resolution in CIFS could be spoofed. A \nlocal attacker could exploit this to control DNS replies, leading to a loss \nof privacy and possible privilege escalation. (CVE-2010-2524)\n\nDan Rosenberg discovered a flaw in gfs2 file system's handling of acls \n(access control lists). An unprivileged local attacker could exploit this \nflaw to gain access or execute any file stored in the gfs2 file system. \n(CVE-2010-2525)\n\nBob Peterson discovered that GFS2 rename operations did not correctly \nvalidate certain sizes. A local attacker could exploit this to crash the \nsystem, leading to a denial of service. (CVE-2010-2798)\n\nEric Dumazet discovered that many network functions could leak kernel stack \ncontents. A local attacker could exploit this to read portions of kernel \nmemory, leading to a loss of privacy. (CVE-2010-2942, CVE-2010-3477)\n\nSergey Vlasov discovered that JFS did not correctly handle certain extended \nattributes. A local attacker could bypass namespace access rules, leading \nto a loss of privacy. (CVE-2010-2946)\n\nTavis Ormandy discovered that the IRDA subsystem did not correctly shut \ndown. A local attacker could exploit this to cause the system to crash or \npossibly gain root privileges. (CVE-2010-2954)\n\nTavis Ormandy discovered that the session keyring did not correctly check \nfor its parent. On systems without a default session keyring, a local \nattacker could exploit this to crash the system, leading to a denial of \nservice. (CVE-2010-2960)\n\nKees Cook discovered that the V4L1 32bit compat interface did not correctly \nvalidate certain parameters. A local attacker on a 64bit system with access \nto a video device could exploit this to gain root privileges. \n(CVE-2010-2963)\n\nToshiyuki Okajima discovered that ext4 did not correctly check certain \nparameters. A local attacker could exploit this to crash the system or \noverwrite the last block of large files. (CVE-2010-3015)\n\nTavis Ormandy discovered that the AIO subsystem did not correctly validate \ncertain parameters. A local attacker could exploit this to crash the system \nor possibly gain root privileges. (CVE-2010-3067)\n\nDan Rosenberg discovered that certain XFS ioctls leaked kernel stack \ncontents. A local attacker could exploit this to read portions of kernel \nmemory, leading to a loss of privacy. (CVE-2010-3078)\n\nTavis Ormandy discovered that the OSS sequencer device did not correctly \nshut down. A local attacker could exploit this to crash the system or \npossibly gain root privileges. (CVE-2010-3080)\n\nDan Rosenberg discovered that the ROSE driver did not correctly check \nparameters. A local attacker with access to a ROSE network device could \nexploit this to crash the system or possibly gain root privileges. \n(CVE-2010-3310)\n\nThomas Dreibholz discovered that SCTP did not correctly handle appending \npacket chunks. A remote attacker could send specially crafted traffic to \ncrash the system, leading to a denial of service. (CVE-2010-3432)\n\nDan Rosenberg discovered that the CD driver did not correctly check \nparameters. A local attacker could exploit this to read arbitrary kernel \nmemory, leading to a loss of privacy. (CVE-2010-3437)\n\nDan Rosenberg discovered that the Sound subsystem did not correctly \nvalidate parameters. A local attacker could exploit this to crash the \nsystem, leading to a denial of service. (CVE-2010-3442)\n\nDan Rosenberg discovered that SCTP did not correctly handle HMAC \ncalculations. A remote attacker could send specially crafted traffic that \nwould crash the system, leading to a denial of service. (CVE-2010-3705)\n\nJoel Becker discovered that OCFS2 did not correctly validate on-disk \nsymlink structures. If an attacker were able to trick a user or automated \nsystem into mounting a specially crafted filesystem, it could crash the \nsystem or expose kernel memory, leading to a loss of privacy. \n(CVE-2010-NNN2)", "edition": 15, "modified": "2010-10-19T00:00:00", "published": "2010-10-19T00:00:00", "id": "USN-1000-1", "href": "https://ubuntu.com/security/notices/USN-1000-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-18T01:44:44", "bulletinFamily": "unix", "cvelist": ["CVE-2010-2942", "CVE-2010-3904", "CVE-2010-3078", "CVE-2010-2066", "CVE-2010-3297", "CVE-2010-2248", "CVE-2010-4073", "CVE-2010-2226", "CVE-2010-4165", "CVE-2010-4072", "CVE-2010-2955", "CVE-2010-2946", "CVE-2009-4895", "CVE-2010-3437", "CVE-2010-4074", "CVE-2010-2521", "CVE-2010-2943", "CVE-2010-3477", "CVE-2010-4169", "CVE-2010-3310", "CVE-2010-2963", "CVE-2010-2524", "CVE-2010-3296", "CVE-2010-2478", "CVE-2010-3698", "CVE-2010-3850", "CVE-2010-3015", "CVE-2010-2495", "CVE-2010-3442", "CVE-2010-3705", "CVE-2010-3848", "CVE-2010-2954", "CVE-2010-4079", "CVE-2010-4249", "CVE-2010-3081", "CVE-2010-3858", "CVE-2010-3067", "CVE-2010-3084", "CVE-2010-2798", "CVE-2010-2962", "CVE-2010-3448", "CVE-2010-3080", "CVE-2010-3432", "CVE-2010-3298", "CVE-2010-4078", "CVE-2010-3849", "CVE-2010-3079", "CVE-2010-2538", "CVE-2010-3861", "CVE-2010-3301"], "description": "Dan Rosenberg discovered that the RDS network protocol did not correctly \ncheck certain parameters. A local attacker could exploit this gain root \nprivileges. (CVE-2010-3904)\n\nNelson Elhage discovered several problems with the Acorn Econet protocol \ndriver. A local user could cause a denial of service via a NULL pointer \ndereference, escalate privileges by overflowing the kernel stack, and \nassign Econet addresses to arbitrary interfaces. (CVE-2010-3848, \nCVE-2010-3849, CVE-2010-3850)\n\nBen Hawkes discovered that the Linux kernel did not correctly filter \nregisters on 64bit kernels when performing 32bit system calls. On a 64bit \nsystem, a local attacker could manipulate 32bit system calls to gain root \nprivileges. (CVE-2010-3301)\n\nBen Hawkes discovered that the Linux kernel did not correctly validate \nmemory ranges on 64bit kernels when allocating memory on behalf of 32bit \nsystem calls. On a 64bit system, a local attacker could perform malicious \nmulticast getsockopt calls to gain root privileges. (CVE-2010-3081)\n\nAl Viro discovered a race condition in the TTY driver. A local attacker \ncould exploit this to crash the system, leading to a denial of service. \n(CVE-2009-4895)\n\nDan Rosenberg discovered that the MOVE_EXT ext4 ioctl did not correctly \ncheck file permissions. A local attacker could overwrite append-only files, \nleading to potential data loss. (CVE-2010-2066)\n\nDan Rosenberg discovered that the swapexit xfs ioctl did not correctly \ncheck file permissions. A local attacker could exploit this to read from \nwrite-only files, leading to a loss of privacy. (CVE-2010-2226)\n\nSuresh Jayaraman discovered that CIFS did not correctly validate certain \nresponse packats. A remote attacker could send specially crafted traffic \nthat would crash the system, leading to a denial of service. \n(CVE-2010-2248)\n\nBen Hutchings discovered that the ethtool interface did not correctly check \ncertain sizes. A local attacker could perform malicious ioctl calls that \ncould crash the system, leading to a denial of service. (CVE-2010-2478, \nCVE-2010-3084)\n\nJames Chapman discovered that L2TP did not correctly evaluate checksum \ncapabilities. If an attacker could make malicious routing changes, they \ncould crash the system, leading to a denial of service. (CVE-2010-2495)\n\nNeil Brown discovered that NFSv4 did not correctly check certain write \nrequests. A remote attacker could send specially crafted traffic that could \ncrash the system or possibly gain root privileges. (CVE-2010-2521)\n\nDavid Howells discovered that DNS resolution in CIFS could be spoofed. A \nlocal attacker could exploit this to control DNS replies, leading to a loss \nof privacy and possible privilege escalation. (CVE-2010-2524)\n\nDan Rosenberg discovered that the btrfs filesystem did not correctly \nvalidate permissions when using the clone function. A local attacker could \noverwrite the contents of file handles that were opened for append-only, or \npotentially read arbitrary contents, leading to a loss of privacy. \n(CVE-2010-2538)\n\nBob Peterson discovered that GFS2 rename operations did not correctly \nvalidate certain sizes. A local attacker could exploit this to crash the \nsystem, leading to a denial of service. (CVE-2010-2798)\n\nEric Dumazet discovered that many network functions could leak kernel stack \ncontents. A local attacker could exploit this to read portions of kernel \nmemory, leading to a loss of privacy. (CVE-2010-2942, CVE-2010-3477)\n\nDave Chinner discovered that the XFS filesystem did not correctly order \ninode lookups when exported by NFS. A remote attacker could exploit this to \nread or write disk blocks that had changed file assignment or had become \nunlinked, leading to a loss of privacy. (CVE-2010-2943)\n\nSergey Vlasov discovered that JFS did not correctly handle certain extended \nattributes. A local attacker could bypass namespace access rules, leading \nto a loss of privacy. (CVE-2010-2946)\n\nTavis Ormandy discovered that the IRDA subsystem did not correctly shut \ndown. A local attacker could exploit this to cause the system to crash or \npossibly gain root privileges. (CVE-2010-2954)\n\nBrad Spengler discovered that the wireless extensions did not correctly \nvalidate certain request sizes. A local attacker could exploit this to read \nportions of kernel memory, leading to a loss of privacy. (CVE-2010-2955)\n\nKees Cook discovered that the Intel i915 graphics driver did not correctly \nvalidate memory regions. A local attacker with access to the video card \ncould read and write arbitrary kernel memory to gain root privileges. \n(CVE-2010-2962)\n\nKees Cook discovered that the V4L1 32bit compat interface did not correctly \nvalidate certain parameters. A local attacker on a 64bit system with access \nto a video device could exploit this to gain root privileges. \n(CVE-2010-2963)\n\nToshiyuki Okajima discovered that ext4 did not correctly check certain \nparameters. A local attacker could exploit this to crash the system or \noverwrite the last block of large files. (CVE-2010-3015)\n\nTavis Ormandy discovered that the AIO subsystem did not correctly validate \ncertain parameters. A local attacker could exploit this to crash the system \nor possibly gain root privileges. (CVE-2010-3067)\n\nDan Rosenberg discovered that certain XFS ioctls leaked kernel stack \ncontents. A local attacker could exploit this to read portions of kernel \nmemory, leading to a loss of privacy. (CVE-2010-3078)\n\nRobert Swiecki discovered that ftrace did not correctly handle mutexes. A \nlocal attacker could exploit this to crash the kernel, leading to a denial \nof service. (CVE-2010-3079)\n\nTavis Ormandy discovered that the OSS sequencer device did not correctly \nshut down. A local attacker could exploit this to crash the system or \npossibly gain root privileges. (CVE-2010-3080)\n\nDan Rosenberg discovered that several network ioctls did not clear kernel \nmemory correctly. A local user could exploit this to read kernel stack \nmemory, leading to a loss of privacy. (CVE-2010-3296, CVE-2010-3297, \nCVE-2010-3298)\n\nDan Rosenberg discovered that the ROSE driver did not correctly check \nparameters. A local attacker with access to a ROSE network device could \nexploit this to crash the system or possibly gain root privileges. \n(CVE-2010-3310)\n\nThomas Dreibholz discovered that SCTP did not correctly handle appending \npacket chunks. A remote attacker could send specially crafted traffic to \ncrash the system, leading to a denial of service. (CVE-2010-3432)\n\nDan Rosenberg discovered that the CD driver did not correctly check \nparameters. A local attacker could exploit this to read arbitrary kernel \nmemory, leading to a loss of privacy. (CVE-2010-3437)\n\nDan Rosenberg discovered that the Sound subsystem did not correctly \nvalidate parameters. A local attacker could exploit this to crash the \nsystem, leading to a denial of service. (CVE-2010-3442)\n\nDan Jacobson discovered that ThinkPad video output was not correctly access \ncontrolled. A local attacker could exploit this to hang the system, leading \nto a denial of service. (CVE-2010-3448)\n\nIt was discovered that KVM did not correctly initialize certain CPU \nregisters. A local attacker could exploit this to crash the system, leading \nto a denial of service. (CVE-2010-3698)\n\nDan Rosenberg discovered that SCTP did not correctly handle HMAC \ncalculations. A remote attacker could send specially crafted traffic that \nwould crash the system, leading to a denial of service. (CVE-2010-3705)\n\nBrad Spengler discovered that stack memory for new a process was not \ncorrectly calculated. A local attacker could exploit this to crash the \nsystem, leading to a denial of service. (CVE-2010-3858)\n\nKees Cook discovered that the ethtool interface did not correctly clear \nkernel memory. A local attacker could read kernel heap memory, leading to a \nloss of privacy. (CVE-2010-3861)\n\nKees Cook and Vasiliy Kulikov discovered that the shm interface did not \nclear kernel memory correctly. A local attacker could exploit this to read \nkernel stack memory, leading to a loss of privacy. (CVE-2010-4072)\n\nDan Rosenberg discovered that IPC structures were not correctly initialized \non 64bit systems. A local attacker could exploit this to read kernel stack \nmemory, leading to a loss of privacy. (CVE-2010-4073)\n\nDan Rosenberg discovered that the USB subsystem did not correctly \ninitialize certian structures. A local attacker could exploit this to read \nkernel stack memory, leading to a loss of privacy. (CVE-2010-4074)\n\nDan Rosenberg discovered that the SiS video driver did not correctly clear \nkernel memory. A local attacker could exploit this to read kernel stack \nmemory, leading to a loss of privacy. (CVE-2010-4078)\n\nDan Rosenberg discovered that the ivtv V4L driver did not correctly \ninitialize certian structures. A local attacker could exploit this to read \nkernel stack memory, leading to a loss of privacy. (CVE-2010-4079)\n\nSteve Chen discovered that setsockopt did not correctly check MSS values. A \nlocal attacker could make a specially crafted socket call to crash the \nsystem, leading to a denial of service. (CVE-2010-4165)\n\nDave Jones discovered that the mprotect system call did not correctly \nhandle merged VMAs. A local attacker could exploit this to crash the \nsystem, leading to a denial of service. (CVE-2010-4169)\n\nVegard Nossum discovered that memory garbage collection was not handled \ncorrectly for active sockets. A local attacker could exploit this to \nallocate all available kernel memory, leading to a denial of service. \n(CVE-2010-4249)\n\nJoel Becker discovered that OCFS2 did not correctly validate on-disk \nsymlink structures. If an attacker were able to trick a user or automated \nsystem into mounting a specially crafted filesystem, it could crash the \nsystem or expose kernel memory, leading to a loss of privacy. \n(CVE-2010-NNN2)", "edition": 5, "modified": "2011-02-28T00:00:00", "published": "2011-02-28T00:00:00", "id": "USN-1074-2", "href": "https://ubuntu.com/security/notices/USN-1074-2", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-09T00:22:53", "bulletinFamily": "unix", "cvelist": ["CVE-2010-2942", "CVE-2010-3904", "CVE-2010-3078", "CVE-2010-2066", "CVE-2010-3297", "CVE-2010-2248", "CVE-2010-4073", "CVE-2010-2226", "CVE-2010-4165", "CVE-2010-4072", "CVE-2010-2955", "CVE-2010-2946", "CVE-2009-4895", "CVE-2010-3437", "CVE-2010-4074", "CVE-2010-2521", "CVE-2010-2943", "CVE-2010-3477", "CVE-2010-4169", "CVE-2010-3310", "CVE-2010-2963", "CVE-2010-2959", "CVE-2010-2524", "CVE-2010-3296", "CVE-2010-2478", "CVE-2010-3698", "CVE-2010-3850", "CVE-2010-3015", "CVE-2010-2495", "CVE-2010-3442", "CVE-2010-3705", "CVE-2010-3848", "CVE-2010-2954", "CVE-2010-2240", "CVE-2010-4079", "CVE-2010-4249", "CVE-2010-3081", "CVE-2010-3858", "CVE-2010-3067", "CVE-2010-2803", "CVE-2010-3084", "CVE-2010-2798", "CVE-2010-2962", "CVE-2010-3448", "CVE-2010-3080", "CVE-2010-3432", "CVE-2010-3298", "CVE-2010-4078", "CVE-2010-3849", "CVE-2010-3079", "CVE-2010-2538", "CVE-2010-3861", "CVE-2010-3301"], "description": "Al Viro discovered a race condition in the TTY driver. A local attacker \ncould exploit this to crash the system, leading to a denial of service. \n(CVE-2009-4895)\n\nDan Rosenberg discovered that the MOVE_EXT ext4 ioctl did not correctly \ncheck file permissions. A local attacker could overwrite append-only files, \nleading to potential data loss. (CVE-2010-2066)\n\nDan Rosenberg discovered that the swapexit xfs ioctl did not correctly \ncheck file permissions. A local attacker could exploit this to read from \nwrite-only files, leading to a loss of privacy. (CVE-2010-2226)\n\nGael Delalleu, Rafal Wojtczuk, and Brad Spengler discovered that the memory \nmanager did not properly handle when applications grow stacks into adjacent \nmemory regions. A local attacker could exploit this to gain control of \ncertain applications, potentially leading to privilege escalation, as \ndemonstrated in attacks against the X server. (CVE-2010-2240)\n\nSuresh Jayaraman discovered that CIFS did not correctly validate certain \nresponse packats. A remote attacker could send specially crafted traffic \nthat would crash the system, leading to a denial of service. \n(CVE-2010-2248)\n\nBen Hutchings discovered that the ethtool interface did not correctly check \ncertain sizes. A local attacker could perform malicious ioctl calls that \ncould crash the system, leading to a denial of service. (CVE-2010-2478, \nCVE-2010-3084)\n\nJames Chapman discovered that L2TP did not correctly evaluate checksum \ncapabilities. If an attacker could make malicious routing changes, they \ncould crash the system, leading to a denial of service. (CVE-2010-2495)\n\nNeil Brown discovered that NFSv4 did not correctly check certain write \nrequests. A remote attacker could send specially crafted traffic that could \ncrash the system or possibly gain root privileges. (CVE-2010-2521)\n\nDavid Howells discovered that DNS resolution in CIFS could be spoofed. A \nlocal attacker could exploit this to control DNS replies, leading to a loss \nof privacy and possible privilege escalation. (CVE-2010-2524)\n\nDan Rosenberg discovered that the btrfs filesystem did not correctly \nvalidate permissions when using the clone function. A local attacker could \noverwrite the contents of file handles that were opened for append-only, or \npotentially read arbitrary contents, leading to a loss of privacy. Only \nUbuntu 9.10 was affected. (CVE-2010-2538)\n\nBob Peterson discovered that GFS2 rename operations did not correctly \nvalidate certain sizes. A local attacker could exploit this to crash the \nsystem, leading to a denial of service. (CVE-2010-2798)\n\nKees Cook discovered that under certain situations the ioctl subsystem for \nDRM did not properly sanitize its arguments. A local attacker could exploit \nthis to read previously freed kernel memory, leading to a loss of privacy. \n(CVE-2010-2803)\n\nEric Dumazet discovered that many network functions could leak kernel stack \ncontents. A local attacker could exploit this to read portions of kernel \nmemory, leading to a loss of privacy. (CVE-2010-2942, CVE-2010-3477)\n\nDave Chinner discovered that the XFS filesystem did not correctly order \ninode lookups when exported by NFS. A remote attacker could exploit this to \nread or write disk blocks that had changed file assignment or had become \nunlinked, leading to a loss of privacy. (CVE-2010-2943)\n\nSergey Vlasov discovered that JFS did not correctly handle certain extended \nattributes. A local attacker could bypass namespace access rules, leading \nto a loss of privacy. (CVE-2010-2946)\n\nTavis Ormandy discovered that the IRDA subsystem did not correctly shut \ndown. A local attacker could exploit this to cause the system to crash or \npossibly gain root privileges. (CVE-2010-2954)\n\nBrad Spengler discovered that the wireless extensions did not correctly \nvalidate certain request sizes. A local attacker could exploit this to read \nportions of kernel memory, leading to a loss of privacy. (CVE-2010-2955)\n\nBen Hawkes discovered an integer overflow in the Controller Area Network \n(CVE-2010-2959)\n\nKees Cook discovered that the Intel i915 graphics driver did not correctly \nvalidate memory regions. A local attacker with access to the video card \ncould read and write arbitrary kernel memory to gain root privileges. \nUbuntu 10.10 was not affected. (CVE-2010-2962)\n\nKees Cook discovered that the V4L1 32bit compat interface did not correctly \nvalidate certain parameters. A local attacker on a 64bit system with access \nto a video device could exploit this to gain root privileges. \n(CVE-2010-2963)\n\nToshiyuki Okajima discovered that ext4 did not correctly check certain \nparameters. A local attacker could exploit this to crash the system or \noverwrite the last block of large files. (CVE-2010-3015)\n\nTavis Ormandy discovered that the AIO subsystem did not correctly validate \ncertain parameters. A local attacker could exploit this to crash the system \nor possibly gain root privileges. (CVE-2010-3067)\n\nDan Rosenberg discovered that certain XFS ioctls leaked kernel stack \ncontents. A local attacker could exploit this to read portions of kernel \nmemory, leading to a loss of privacy. (CVE-2010-3078)\n\nRobert Swiecki discovered that ftrace did not correctly handle mutexes. A \nlocal attacker could exploit this to crash the kernel, leading to a denial \nof service. (CVE-2010-3079)\n\nTavis Ormandy discovered that the OSS sequencer device did not correctly \nshut down. A local attacker could exploit this to crash the system or \npossibly gain root privileges. (CVE-2010-3080)\n\nBen Hawkes discovered that the Linux kernel did not correctly validate \nmemory ranges on 64bit kernels when allocating memory on behalf of 32bit \nsystem calls. On a 64bit system, a local attacker could perform malicious \nmulticast getsockopt calls to gain root privileges. (CVE-2010-3081)\n\nDan Rosenberg discovered that several network ioctls did not clear kernel \nmemory correctly. A local user could exploit this to read kernel stack \nmemory, leading to a loss of privacy. (CVE-2010-3296, CVE-2010-3297, \nCVE-2010-3298)\n\nBen Hawkes discovered that the Linux kernel did not correctly filter \nregisters on 64bit kernels when performing 32bit system calls. On a 64bit \nsystem, a local attacker could manipulate 32bit system calls to gain root \nprivileges. (CVE-2010-3301)\n\nDan Rosenberg discovered that the ROSE driver did not correctly check \nparameters. A local attacker with access to a ROSE network device could \nexploit this to crash the system or possibly gain root privileges. \n(CVE-2010-3310)\n\nThomas Dreibholz discovered that SCTP did not correctly handle appending \npacket chunks. A remote attacker could send specially crafted traffic to \ncrash the system, leading to a denial of service. (CVE-2010-3432)\n\nDan Rosenberg discovered that the CD driver did not correctly check \nparameters. A local attacker could exploit this to read arbitrary kernel \nmemory, leading to a loss of privacy. (CVE-2010-3437)\n\nDan Rosenberg discovered that the Sound subsystem did not correctly \nvalidate parameters. A local attacker could exploit this to crash the \nsystem, leading to a denial of service. (CVE-2010-3442)\n\nDan Jacobson discovered that ThinkPad video output was not correctly access \ncontrolled. A local attacker could exploit this to hang the system, leading \nto a denial of service. (CVE-2010-3448)\n\nIt was discovered that KVM did not correctly initialize certain CPU \nregisters. A local attacker could exploit this to crash the system, leading \nto a denial of service. (CVE-2010-3698)\n\nDan Rosenberg discovered that SCTP did not correctly handle HMAC \ncalculations. A remote attacker could send specially crafted traffic that \nwould crash the system, leading to a denial of service. (CVE-2010-3705)\n\nNelson Elhage discovered several problems with the Acorn Econet protocol \ndriver. A local user could cause a denial of service via a NULL pointer \ndereference, escalate privileges by overflowing the kernel stack, and \nassign Econet addresses to arbitrary interfaces. (CVE-2010-3848, \nCVE-2010-3849, CVE-2010-3850)\n\nBrad Spengler discovered that stack memory for new a process was not \ncorrectly calculated. A local attacker could exploit this to crash the \nsystem, leading to a denial of service. (CVE-2010-3858)\n\nKees Cook discovered that the ethtool interface did not correctly clear \nkernel memory. A local attacker could read kernel heap memory, leading to a \nloss of privacy. (CVE-2010-3861)\n\nDan Rosenberg discovered that the RDS network protocol did not correctly \ncheck certain parameters. A local attacker could exploit this gain root \nprivileges. (CVE-2010-3904)\n\nKees Cook and Vasiliy Kulikov discovered that the shm interface did not \nclear kernel memory correctly. A local attacker could exploit this to read \nkernel stack memory, leading to a loss of privacy. (CVE-2010-4072)\n\nDan Rosenberg discovered that IPC structures were not correctly initialized \non 64bit systems. A local attacker could exploit this to read kernel stack \nmemory, leading to a loss of privacy. (CVE-2010-4073)\n\nDan Rosenberg discovered that the USB subsystem did not correctly \ninitialize certian structures. A local attacker could exploit this to read \nkernel stack memory, leading to a loss of privacy. (CVE-2010-4074)\n\nDan Rosenberg discovered that the SiS video driver did not correctly clear \nkernel memory. A local attacker could exploit this to read kernel stack \nmemory, leading to a loss of privacy. (CVE-2010-4078)\n\nDan Rosenberg discovered that the ivtv V4L driver did not correctly \ninitialize certian structures. A local attacker could exploit this to read \nkernel stack memory, leading to a loss of privacy. (CVE-2010-4079)\n\nSteve Chen discovered that setsockopt did not correctly check MSS values. A \nlocal attacker could make a specially crafted socket call to crash the \nsystem, leading to a denial of service. (CVE-2010-4165)\n\nDave Jones discovered that the mprotect system call did not correctly \nhandle merged VMAs. A local attacker could exploit this to crash the \nsystem, leading to a denial of service. (CVE-2010-4169)\n\nVegard Nossum discovered that memory garbage collection was not handled \ncorrectly for active sockets. A local attacker could exploit this to \nallocate all available kernel memory, leading to a denial of service. \n(CVE-2010-4249)", "edition": 5, "modified": "2011-02-25T00:00:00", "published": "2011-02-25T00:00:00", "id": "USN-1074-1", "href": "https://ubuntu.com/security/notices/USN-1074-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "suse": [{"lastseen": "2016-09-04T12:07:46", "bulletinFamily": "unix", "cvelist": ["CVE-2010-2942", "CVE-2010-3078", "CVE-2010-2959", "CVE-2010-2954", "CVE-2010-3081", "CVE-2010-2803", "CVE-2010-3301"], "description": "The openSUSE 11.3 kernel was updated to version 2.6.34.7. The update fixes lots of bugs and security issues.\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2010-09-17T16:49:15", "published": "2010-09-17T16:49:15", "id": "SUSE-SA:2010:041", "href": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html", "type": "suse", "title": "local privilege escalation in kernel", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:14:17", "bulletinFamily": "unix", "cvelist": ["CVE-2010-2942", "CVE-2010-4081", "CVE-2010-2248", "CVE-2010-4073", "CVE-2010-2226", "CVE-2010-4072", "CVE-2010-2946", "CVE-2010-3437", "CVE-2010-4083", "CVE-2010-3086", "CVE-2010-4080", "CVE-2010-3310", "CVE-2010-4158", "CVE-2010-4162", "CVE-2010-3442", "CVE-2010-4157", "CVE-2010-3067", "CVE-2010-4164", "CVE-2010-4078"], "description": "This kernel update for the SUSE Linux Enterprise 10 SP3 kernel fixes several security issues and bugs.\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2010-12-14T13:42:46", "published": "2010-12-14T13:42:46", "id": "SUSE-SA:2010:060", "href": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html", "title": "remote denial of service in kernel", "type": "suse", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:45:49", "bulletinFamily": "unix", "cvelist": ["CVE-2010-2942", "CVE-2010-2946", "CVE-2010-2521", "CVE-2010-2959", "CVE-2010-2524", "CVE-2010-2478", "CVE-2010-3015", "CVE-2010-2803", "CVE-2010-2537", "CVE-2010-2798", "CVE-2010-2538"], "description": "This SUSE Linux Enterprise 11 Service Pack 1 kernel update contains various security fixes and lots of other bugfixes.\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2010-09-13T17:57:23", "published": "2010-09-13T17:57:23", "id": "SUSE-SA:2010:040", "href": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html", "title": "remote denial of service in kernel", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:32:26", "bulletinFamily": "unix", "cvelist": ["CVE-2010-2942", "CVE-2010-3078", "CVE-2010-3297", "CVE-2010-2955", "CVE-2010-2946", "CVE-2010-3310", "CVE-2010-3296", "CVE-2010-3015", "CVE-2010-2954", "CVE-2010-2803", "CVE-2010-2798", "CVE-2010-3080"], "description": "This security update of the SUSE Linux Enterprise 11 GA and openSUSE 11.1 kernel updates the kernel to 2.6.27.54 and fixes various security issues and other bugs.\n#### Solution\nThere is no workaround, please install the fixed packages.", "edition": 1, "modified": "2010-11-03T13:13:23", "published": "2010-11-03T13:13:23", "id": "SUSE-SA:2010:054", "href": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html", "type": "suse", "title": "local privilege escalation in kernel", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "debian": [{"lastseen": "2020-11-11T13:24:31", "bulletinFamily": "unix", "cvelist": ["CVE-2010-4081", "CVE-2010-3297", "CVE-2010-4073", "CVE-2010-4072", "CVE-2010-3437", "CVE-2010-4074", "CVE-2010-4083", "CVE-2010-3859", "CVE-2010-3477", "CVE-2010-4080", "CVE-2010-3310", "CVE-2010-2963", "CVE-2010-3877", "CVE-2010-3875", "CVE-2010-3876", "CVE-2010-3296", "CVE-2010-3850", "CVE-2010-3442", "CVE-2010-3705", "CVE-2010-3848", "CVE-2010-4079", "CVE-2010-3880", "CVE-2010-3874", "CVE-2010-3858", "CVE-2010-3067", "CVE-2010-4164", "CVE-2010-3873", "CVE-2010-3448", "CVE-2010-3432", "CVE-2010-4078", "CVE-2010-3849"], "description": "- ----------------------------------------------------------------------\nDebian Security Advisory DSA-2126-1 security@debian.org\nhttp://www.debian.org/security/ dann frazier\nNovember 26, 2010 http://www.debian.org/security/faq\n- ----------------------------------------------------------------------\n\nPackage : linux-2.6\nVulnerability : privilege escalation/denial of service/information leak\nProblem type : local/remote\nDebian-specific: no\nCVE Id(s) : CVE-2010-2963 CVE-2010-3067 CVE-2010-3296 CVE-2010-3297\n CVE-2010-3310 CVE-2010-3432 CVE-2010-3437 CVE-2010-3442\n CVE-2010-3448 CVE-2010-3477 CVE-2010-3705 CVE-2010-3848\n CVE-2010-3849 CVE-2010-3850 CVE-2010-3858 CVE-2010-3859\n CVE-2010-3873 CVE-2010-3874 CVE-2010-3875 CVE-2010-3876\n CVE-2010-3877 CVE-2010-3880 CVE-2010-4072 CVE-2010-4073\n CVE-2010-4074 CVE-2010-4078 CVE-2010-4079 CVE-2010-4080\n CVE-2010-4081 CVE-2010-4083 CVE-2010-4164\nDebian Bug(s) :\n \nSeveral vulnerabilities have been discovered in the Linux kernel that may lead\nto a privilege escalation, denial of service or information leak. The Common\nVulnerabilities and Exposures project identifies the following problems:\n\nCVE-2010-2963\n\n Kees Cook discovered an issue in the v4l 32-bit compatibility layer for\n 64-bit systems that allows local users with /dev/video write permission to\n overwrite arbitrary kernel memory, potentially leading to a privilege\n escalation. On Debian systems, access to /dev/video devices is restricted to\n members of the 'video' group by default.\n\nCVE-2010-3067\n\n Tavis Ormandy discovered an issue in the io_submit system call. Local users\n can cause an integer overflow resulting in a denial of service.\n\nCVE-2010-3296\n\n Dan Rosenberg discovered an issue in the cxgb network driver that allows\n unprivileged users to obtain the contents of sensitive kernel memory.\n\nCVE-2010-3297\n\n Dan Rosenberg discovered an issue in the eql network driver that allows\n local users to obtain the contents of sensitive kernel memory.\n\nCVE-2010-3310\n\n Dan Rosenberg discovered an issue in the ROSE socket implementation. On\n systems with a rose device, local users can cause a denial of service\n (kernel memory corruption).\n\nCVE-2010-3432\n\n Thomas Dreibholz discovered an issue in the SCTP protocol that permits a\n remote user to cause a denial of service (kernel panic).\n\nCVE-2010-3437\n\n Dan Rosenberg discovered an issue in the pktcdvd driver. Local users with\n permission to open /dev/pktcdvd/control can obtain the contents of sensitive\n kernel memory or cause a denial of service. By default on Debian systems,\n this access is restricted to members of the group 'cdrom'.\n\nCVE-2010-3442\n\n Dan Rosenberg discovered an issue in the ALSA sound system. Local users with\n permission to open /dev/snd/controlC0 can create an integer overflow\n condition that causes a denial of service. By default on Debian systems,\n this access is restricted to members of the group 'audio'.\n\nCVE-2010-3448\n\n Dan Jacobson reported an issue in the thinkpad-acpi driver. On certain\n Thinkpad systems, local users can cause a denial of service (X.org crash) by\n reading /proc/acpi/ibm/video.\n\nCVE-2010-3477\n\n Jeff Mahoney discovered an issue in the Traffic Policing (act_police) module\n that allows local users to obtain the contents of sensitive kernel memory.\n\nCVE-2010-3705\n\n Dan Rosenberg reported an issue in the HMAC processing code in the SCTP\n protocol that allows remote users to create a denial of service (memory\n corruption).\n\nCVE-2010-3848\n\n Nelson Elhage discovered an issue in the Econet protocol. Local users can\n cause a stack overflow condition with large msg->msgiovlen values that can\n result in a denial of service or privilege escalation.\n\nCVE-2010-3849\n\n Nelson Elhage discovered an issue in the Econet protocol. Local users can\n cause a denial of service (oops) if a NULL remote addr value is passed as a\n parameter to sendmsg().\n\nCVE-2010-3850\n\n Nelson Elhage discovered an issue in the Econet protocol. Local users can\n assign econet addresses to arbitrary interfaces due to a missing\n capabilities check.\n\nCVE-2010-3858\n\n Brad Spengler reported an issue in the setup_arg_pages() function. Due to a\n bounds-checking failure, local users can create a denial of service (kernel\n oops).\n\nCVE-2010-3859\n\n Dan Rosenberg reported an issue in the TIPC protocol. When the tipc module\n is loaded, local users can gain elevated privileges via the sendmsg() system\n call.\n\nCVE-2010-3873\n\n Dan Rosenberg reported an issue in the X.25 network protocol. Local users\n can cause heap corruption, resulting in a denial of service (kernel panic).\n\nCVE-2010-3874\n\n Dan Rosenberg discovered an issue in the Control Area Network (CAN)\n subsystem on 64-bit systems. Local users may be able to cause a denial of\n service (heap corruption).\n\nCVE-2010-3875\n\n Vasiliy Kulikov discovered an issue in the AX.25 protocol. Local users can\n obtain the contents of sensitive kernel memory.\n\nCVE-2010-3876\n\n Vasiliy Kulikov discovered an issue in the Packet protocol. Local users can\n obtain the contents of sensitive kernel memory.\n\nCVE-2010-3877\n\n Vasiliy Kulikov discovered an issue in the TIPC protocol. Local users can\n obtain the contents of sensitive kernel memory.\n\nCVE-2010-3880\n\n Nelson Elhage discovered an issue in the INET_DIAG subsystem. Local users\n can cause the kernel to execute unaudited INET_DIAG bytecode, resulting in a\n denial of service.\n\nCVE-2010-4072\n\n Kees Cook discovered an issue in the System V shared memory subsystem.\n Local users can obtain the contents of sensitive kernel memory.\n\nCVE-2010-4073\n\n Dan Rosenberg discovered an issue in the System V shared memory subsystem.\n Local users on 64-bit system can obtain the contents of sensitive kernel\n memory via the 32-bit compatible semctl() system call.\n\nCVE-2010-4074\n\n Dan Rosenberg reported issues in the mos7720 and mos7840 drivers for USB\n serial converter devices. Local users with access to these devices can\n obtain the contents of sensitive kernel memory.\n\nCVE-2010-4078\n\n Dan Rosenberg reported an issue in the framebuffer driver for SiS graphics\n chipesets (sisfb). Local users with access to the framebuffer device can\n obtain the contents of sensitive kernel memory via the FBIOGET_VBLANK ioctl.\n\nCVE-2010-4079\n\n Dan Rosenberg reported an issue in the ivtvfb driver used for the Hauppauge\n PVR-350 card. Local users with access to the framebuffer device can obtain\n the contents of sensitive kernel memory via the FBIOGET_VBLANK ioctl.\n \nCVE-2010-4080\n\n Dan Rosenberg discovered an issue in the ALSA driver for RME Hammerfall DSP\n audio devices. Local users with access to the audio device can obtain the\n contents of sensitive kernel memory via the SNDRV_HDSP_IOCTL_GET_CONFIG_INFO\n ioctl.\n\nCVE-2010-4081\n\n Dan Rosenberg discovered an issue in the ALSA driver for RME Hammerfall DSP\n MADI audio devices. Local users with access to the audio device can obtain\n the contents of sensitive kernel memory via the\n SNDRV_HDSP_IOCTL_GET_CONFIG_INFO ioctl.\n\nCVE-2010-4083\n\n Dan Rosenberg discovered an issue in the semctl system call. Local users can\n obtain the contents of sensitive kernel memory through usage of the semid_ds\n structure.\n\nCVE-2010-4164\n\n Dan Rosenberg discovered an issue in the X.25 network protocol. Remote users\n can achieve a denial of service (infinite loop) by taking advantage of an\n integer underflow in the facility parsing code.\n\nFor the stable distribution (lenny), this problem has been fixed in version\n2.6.26-26lenny1.\n\nWe recommend that you upgrade your linux-2.6 and user-mode-linux packages.\n\nThe following matrix lists additional source packages that were rebuilt for\ncompatibility with or to take advantage of this update:\n\n Debian 5.0 (lenny)\n user-mode-linux 2.6.26-1um-2+26lenny1\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\nDebian GNU/Linux 5.0 alias lenny\n- --------------------------------\n\nStable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64,\nmipsel, powerpc, s390 and sparc. The update for mips will be released once it\nbecomes available.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-26lenny1.dsc\n Size/MD5 checksum: 6426 25d46333cc7f2b28b4312df096d875a8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26.orig.tar.gz\n Size/MD5 checksum: 61818969 85e039c2588d5bf3cb781d1c9218bbcb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-26lenny1.diff.gz\n Size/MD5 checksum: 8002336 26391b13d5a39afdb2591dc888a568b8\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.26_2.6.26-26lenny1_all.deb\n Size/MD5 checksum: 4850414 de2ec8da8f7dab48ce65014401ae52e7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.26_2.6.26-26lenny1_all.deb\n Size/MD5 checksum: 113254 e8f1973916d469640345a1c21421dfdf\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.26_2.6.26-26lenny1_all.deb\n Size/MD5 checksum: 1808942 ee7d18519868ee02f56fef2341c527ea\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.26-2_2.6.26-26lenny1_all.deb\n Size/MD5 checksum: 128506 065f966fa5f38283d8c5add43a952d0e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.26_2.6.26-26lenny1_all.deb\n Size/MD5 checksum: 3006772 e94a5e6a2f144c31d88db997c2db8e1f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.26_2.6.26-26lenny1_all.deb\n Size/MD5 checksum: 49471548 0ec635ad97a262914262a7812e9e2ce6\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-26lenny1_alpha.deb\n Size/MD5 checksum: 747090 97fac497384d4e23463efd91f4cc6e0d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-generic_2.6.26-26lenny1_alpha.deb\n Size/MD5 checksum: 368956 4f6d2e6c5535f0b64836b094178b259e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-26lenny1_alpha.deb\n Size/MD5 checksum: 3551142 ed27877320f4ab66757cad34462b4df1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-legacy_2.6.26-26lenny1_alpha.deb\n Size/MD5 checksum: 28539060 62095485cb584ea9775c038247c8453e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-smp_2.6.26-26lenny1_alpha.deb\n Size/MD5 checksum: 29258774 36a1eccda8a1a6f330ad0707a07695b4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-26lenny1_alpha.deb\n Size/MD5 checksum: 112660 9eadae84e38579f69ac8415995aff91d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-generic_2.6.26-26lenny1_alpha.deb\n Size/MD5 checksum: 28560146 6f671d59c6761eb6a91b667d8859ebf4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-legacy_2.6.26-26lenny1_alpha.deb\n Size/MD5 checksum: 369490 1b21492f700e66406ddf902b4cfd1fff\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-alpha_2.6.26-26lenny1_alpha.deb\n Size/MD5 checksum: 112682 5669ed2b63dfd7e25f1bed3f3c557e8b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-smp_2.6.26-26lenny1_alpha.deb\n Size/MD5 checksum: 370732 744a8a3bb0751181a11b909b7f2c8741\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-26lenny1_amd64.deb\n Size/MD5 checksum: 755464 a76803db0471a09013fcc410e2bd1a7c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-amd64_2.6.26-26lenny1_amd64.deb\n Size/MD5 checksum: 391070 2af9113ceb56dd2a79a448ec1eb74452\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-amd64_2.6.26-26lenny1_amd64.deb\n Size/MD5 checksum: 1812222 800310a26af8edc580fc57d8da9b14ae\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-26lenny1_amd64.deb\n Size/MD5 checksum: 3727512 5cadd7b974521b7c5ccc278968631e57\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-26lenny1_amd64.deb\n Size/MD5 checksum: 3859380 6fd2da7ef7a274fd0aed9701374533a5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-26lenny1_amd64.deb\n Size/MD5 checksum: 112652 ceed8afd8da64b6cb39f4619b7faa310\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-amd64_2.6.26-26lenny1_amd64.deb\n Size/MD5 checksum: 112640 ff01f002d79cc143476afa6d907127a4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-26lenny1_amd64.deb\n Size/MD5 checksum: 3783174 1822a9f0434abafe5e2dd84718c7e6bc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-26lenny1_amd64.deb\n Size/MD5 checksum: 20937036 2a5fa1622b4747705e74348ce23baa5b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-amd64_2.6.26-26lenny1_amd64.deb\n Size/MD5 checksum: 401434 9288349bcf9919e8be6fbb21ff3a8f66\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-amd64_2.6.26-26lenny1_amd64.deb\n Size/MD5 checksum: 21104766 7719bc85bb26d356f24620924a8c4283\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-26lenny1_amd64.deb\n Size/MD5 checksum: 393366 91d81407ad8be69d8f65b4f850ba5b1a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-amd64_2.6.26-26lenny1_amd64.deb\n Size/MD5 checksum: 20956050 f9e8825e29f45d42627cfa1dd62569ea\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-amd64_2.6.26-26lenny1_amd64.deb\n Size/MD5 checksum: 112686 c5110416ee580c5cfe71c58eadef2a22\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-26lenny1_amd64.deb\n Size/MD5 checksum: 3759946 08746b9bc1d832b52f245269440b2bd6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-amd64_2.6.26-26lenny1_amd64.deb\n Size/MD5 checksum: 19322068 48031c2d9ce732ed6bf79103050166dd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-amd64_2.6.26-26lenny1_amd64.deb\n Size/MD5 checksum: 394064 ddaa87681b7f3e9c0d155ead5302de4a\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-arm_2.6.26-26lenny1_arm.deb\n Size/MD5 checksum: 112776 769f5204e3edc4a3dd501f0254e97e5b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-26lenny1_arm.deb\n Size/MD5 checksum: 752794 6b11a353eddc1de6463615f0c5f69701\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-26lenny1_arm.deb\n Size/MD5 checksum: 371914 5eece356f6b47bab5afdbd0d3c724240\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-26lenny1_arm.deb\n Size/MD5 checksum: 12487514 b6a0886ca511e0dd2b7cd61319923edd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-footbridge_2.6.26-26lenny1_arm.deb\n Size/MD5 checksum: 356688 d62c6595ced0b11b0c2dc906254a5bd2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-26lenny1_arm.deb\n Size/MD5 checksum: 11722022 82ee74470a3bfd7448da7ea9a092cf80\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-26lenny1_arm.deb\n Size/MD5 checksum: 4146542 0b20edfd5914b550d21c035dab0146b4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-26lenny1_arm.deb\n Size/MD5 checksum: 11434794 d8e4c25a2b94a7dc1c43226f80572203\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-26lenny1_arm.deb\n Size/MD5 checksum: 366896 69fc71b9d4a6d1926975f22160a6ca95\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-26lenny1_arm.deb\n Size/MD5 checksum: 112736 78f106b38803939df3cacdebf280b5e1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-26lenny1_arm.deb\n Size/MD5 checksum: 369740 61f68bbd18a0ac4f23e4d9aeb649a4a9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-footbridge_2.6.26-26lenny1_arm.deb\n Size/MD5 checksum: 10288198 15384b7d3708de3ffa1e9c17849db12f\n\narmel architecture (ARM EABI)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-26lenny1_armel.deb\n Size/MD5 checksum: 11684250 7d6165f32980b4bdf9174d0603a4e914\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-26lenny1_armel.deb\n Size/MD5 checksum: 367986 0fa930045394fa7bf2f1660edea036a8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-26lenny1_armel.deb\n Size/MD5 checksum: 112734 3291126b417654ea56968e2369a54879\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-26lenny1_armel.deb\n Size/MD5 checksum: 366188 d58ece9a482933c133e6a31fffbdaf4b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-versatile_2.6.26-26lenny1_armel.deb\n Size/MD5 checksum: 339524 728cced0ac92768f5fe216d23a2cc223\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-26lenny1_armel.deb\n Size/MD5 checksum: 11396252 9bf2717abad67374cc197d25956f0c11\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-26lenny1_armel.deb\n Size/MD5 checksum: 369858 736c45757463cc47d12daa64d13627fa\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-26lenny1_armel.deb\n Size/MD5 checksum: 4145910 5f10aec830d3c114d1d600cc4ed25ef8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-26lenny1_armel.deb\n Size/MD5 checksum: 754724 8da96ea4780a69374788ac140e85298c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-armel_2.6.26-26lenny1_armel.deb\n Size/MD5 checksum: 112772 f158d96c80dd4c903be325d11a1a2704\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-versatile_2.6.26-26lenny1_armel.deb\n Size/MD5 checksum: 9609544 c1a690b822e8a9d94336aa9146df21b2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-26lenny1_armel.deb\n Size/MD5 checksum: 12448536 2bc10e5d383940aff2f7b54e5ca84267\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc-smp_2.6.26-26lenny1_hppa.deb\n Size/MD5 checksum: 16390762 49ae803109f72ecc5f65cc0ab2a274d2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64_2.6.26-26lenny1_hppa.deb\n Size/MD5 checksum: 305004 4447819b9e77572ea89388395dc328c8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc_2.6.26-26lenny1_hppa.deb\n Size/MD5 checksum: 303956 c54d283e4148b3eb1aed0e9e2f9b4135\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64-smp_2.6.26-26lenny1_hppa.deb\n Size/MD5 checksum: 307006 92fe6b41bd11a836c273ed0736396a18\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-hppa_2.6.26-26lenny1_hppa.deb\n Size/MD5 checksum: 112760 10bdcd03154924f5afb34dc670886eb8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc_2.6.26-26lenny1_hppa.deb\n Size/MD5 checksum: 15796706 c530209aab49e2068f14e484b6db59fd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-26lenny1_hppa.deb\n Size/MD5 checksum: 3601768 e804a1671f76f3b35bfac3bbecc4b1a8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-26lenny1_hppa.deb\n Size/MD5 checksum: 112728 d95be16830e352fbdf8f4250f762003b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64-smp_2.6.26-26lenny1_hppa.deb\n Size/MD5 checksum: 17689704 2ce0de928b0de084a5ee21da0a58407e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64_2.6.26-26lenny1_hppa.deb\n Size/MD5 checksum: 17137918 750e28de7bb1e261f636ccba8fcab308\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-26lenny1_hppa.deb\n Size/MD5 checksum: 764742 dbc6af80dc674736661b498edfc3a5e4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc-smp_2.6.26-26lenny1_hppa.deb\n Size/MD5 checksum: 305576 58916c39063873b84cf419379053b5e2\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-686_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 1598590 dc693b0a5fd1594615de4c5bfb51e3a2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 401634 19b303053ef842f9dbcb05fbf9079c86\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 412706 9a6dc9914b57224d41697dd85251ad74\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686-bigmem_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 414016 fbd71b61ce54978f4df2b3e851fa7c28\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 414584 2ebea5008b5a724ecdb19079e8f86e9d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-686_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 18216302 86ea992d0efbd38a88f5b7fc9465f38d\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-686_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 112640 68e5cb0e49e3b0e2beb8075edf84a357\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 770174 317eaad69bb2d30be37fffe2ba516ebc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 3870582 20d8147847c2ee48b5b8e186c5aa2dd8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 20407918 b98e78be196bcfdd8395341c517d68a4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 3811776 d2e42bd89a509d9a3f9cd57ba7699195\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686-bigmem_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 20528204 19e4258f60a0fd94691f21dd3bef8804\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686-bigmem_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 20546188 e9dc6af2f445e672b6d80e8391402cc6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686-bigmem_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 413080 5a5160ce3a4308aa477d091a1fe8127a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-i386_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 112706 9ada4ab06b22be004eee1160b21d1f2a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 3950190 ca68b70d434125f799c5208161e105b9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-686_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 418434 28870494c0609b93b67808c043a62dfb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 20428344 2137508d1b187b0b364bedbaf46e1ea9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 3846426 73b6b13e86bac670f3073c5a8b2943f7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-686_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 399948 ba847a3f96345613a25f839972e6f0ed\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 21049612 7af7a78a4c5964620a476ad5c6066887\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-486_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 20369056 721ee6c463d845e9d6f8013ac38ba1d7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-686_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 20705350 fc2fc201e24a62fd2574d51999195182\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 112654 80a1bd5e7cf38414cc184ac3645ce5da\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-486_2.6.26-26lenny1_i386.deb\n Size/MD5 checksum: 412120 2f95a4695398f1e4ce933b0fb018e6f5\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-ia64_2.6.26-26lenny1_ia64.deb\n Size/MD5 checksum: 112688 0951a8f0fcf20010b4fd72e8794454ea\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-mckinley_2.6.26-26lenny1_ia64.deb\n Size/MD5 checksum: 361828 fa942ddabe46359a026caee5ff78cf94\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-itanium_2.6.26-26lenny1_ia64.deb\n Size/MD5 checksum: 34255886 885360588d0a9d8519164b605b884384\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-itanium_2.6.26-26lenny1_ia64.deb\n Size/MD5 checksum: 361400 17899521a5c8690a0d316797d15b9a5d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-26lenny1_ia64.deb\n Size/MD5 checksum: 3694882 3f8c27edf54fa2af2593b786138d5aa6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-mckinley_2.6.26-26lenny1_ia64.deb\n Size/MD5 checksum: 34440396 f8f45a9dd6e8d05bb29ba21f4100b271\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-26lenny1_ia64.deb\n Size/MD5 checksum: 3662038 7e20eabb6a01ceafb2b934e09743209b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-mckinley_2.6.26-26lenny1_ia64.deb\n Size/MD5 checksum: 34380728 c245751f72228c02f40706c0754dc4bc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-26lenny1_ia64.deb\n Size/MD5 checksum: 112654 0dda61d2b3dc3529995059957ba8d523\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-itanium_2.6.26-26lenny1_ia64.deb\n Size/MD5 checksum: 34192832 89c734c816323509cb81a8c06d503775\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-mckinley_2.6.26-26lenny1_ia64.deb\n Size/MD5 checksum: 362186 3de48033c683c0b0723845ba52d97311\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-26lenny1_ia64.deb\n Size/MD5 checksum: 754152 8f457306ee6f9f6a0dde6a85b60ba28e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-itanium_2.6.26-26lenny1_ia64.deb\n Size/MD5 checksum: 361772 ab078e4b7347c34373294d7bd48f5f77\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r5k-cobalt_2.6.26-26lenny1_mipsel.deb\n Size/MD5 checksum: 15061864 c0c33ea0339f836d537deea40041ebbf\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-5kc-malta_2.6.26-26lenny1_mipsel.deb\n Size/MD5 checksum: 362194 4307fcc7be5e03bf84e65542ee773896\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-5kc-malta_2.6.26-26lenny1_mipsel.deb\n Size/MD5 checksum: 28579670 e8f6dbeb2b27ecaa64a7648102068197\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1-bcm91250a_2.6.26-26lenny1_mipsel.deb\n Size/MD5 checksum: 305764 5f9c8534fd78687ee198c3c9575423ac\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-26lenny1_mipsel.deb\n Size/MD5 checksum: 112730 62463422f9e70ee2f54d09ebc429c47d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-mipsel_2.6.26-26lenny1_mipsel.deb\n Size/MD5 checksum: 112784 22de96fa5ed52cfaba506f0f4c7c085c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-26lenny1_mipsel.deb\n Size/MD5 checksum: 3970148 e494271e4f18315b4c5e3f8692bedadd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1-bcm91250a_2.6.26-26lenny1_mipsel.deb\n Size/MD5 checksum: 19686560 5a1734bb17cfd9ee65a411c3801ccf6d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-4kc-malta_2.6.26-26lenny1_mipsel.deb\n Size/MD5 checksum: 362326 f79daf88f7b6813c7c005b8b9dd87460\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r5k-cobalt_2.6.26-26lenny1_mipsel.deb\n Size/MD5 checksum: 300858 3775978c2a2c713ac1b15b9fb62dc021\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1a-bcm91480b_2.6.26-26lenny1_mipsel.deb\n Size/MD5 checksum: 306226 c23551d6d68208c7adebb3acf2523ca6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-4kc-malta_2.6.26-26lenny1_mipsel.deb\n Size/MD5 checksum: 23078776 0d0cf1ded5d13ab9ab1b7563ded158a3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1a-bcm91480b_2.6.26-26lenny1_mipsel.deb\n Size/MD5 checksum: 19681376 5a4951e8708a86af494f4038d9a32eca\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-26lenny1_mipsel.deb\n Size/MD5 checksum: 763218 a434c9b6829adb49282e1f50edbc8024\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-26lenny1_powerpc.deb\n Size/MD5 checksum: 3785444 6e5a16d27250c50d7db3bb10e0fb0254\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc_2.6.26-26lenny1_powerpc.deb\n Size/MD5 checksum: 23590652 148679b5cb6bfed70c84dc3f1128f77b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc_2.6.26-26lenny1_powerpc.deb\n Size/MD5 checksum: 366624 253c73347bea4dfb6867aceeb66a758b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc-smp_2.6.26-26lenny1_powerpc.deb\n Size/MD5 checksum: 367926 4c79229ecaf6ec2f64a79842101313c2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc_2.6.26-26lenny1_powerpc.deb\n Size/MD5 checksum: 367420 e98a64747b70a7fc4b96dc5c3a984d9c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-26lenny1_powerpc.deb\n Size/MD5 checksum: 749102 0398a006ed76f440b23c9e6f31274756\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc64_2.6.26-26lenny1_powerpc.deb\n Size/MD5 checksum: 373602 d35a94e121b4835db9c8935269966669\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc_2.6.26-26lenny1_powerpc.deb\n Size/MD5 checksum: 23160128 24bc9e9bb6ad333636effdab5d34288c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc-smp_2.6.26-26lenny1_powerpc.deb\n Size/MD5 checksum: 23564700 0f2a1dda40f8c7de0e82f5f6de29f9a1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-26lenny1_powerpc.deb\n Size/MD5 checksum: 112660 629d68ca03f2477c95da86870aa023e2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-26lenny1_powerpc.deb\n Size/MD5 checksum: 3817674 565cee7c648e4f13df99144664bf190f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc64_2.6.26-26lenny1_powerpc.deb\n Size/MD5 checksum: 375258 291bf04c8df940c91a46662980ac6465\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc64_2.6.26-26lenny1_powerpc.deb\n Size/MD5 checksum: 23425562 36274877b4bd887a757def9494cc7adc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc64_2.6.26-26lenny1_powerpc.deb\n Size/MD5 checksum: 23482334 a467fd6e79497aacc73e59334c59b6a6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-powerpc_2.6.26-26lenny1_powerpc.deb\n Size/MD5 checksum: 112700 665500b5f7af3e53f23a703198f855d7\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-26lenny1_s390.deb\n Size/MD5 checksum: 3570228 561ea2d62add917cb1e60678e2f17c61\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-26lenny1_s390.deb\n Size/MD5 checksum: 3537872 78fb9e63d73e11bd712a33f97bca0944\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390x_2.6.26-26lenny1_s390.deb\n Size/MD5 checksum: 235500 e229f77bbb800763ce13f19d7a2a4d11\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390x_2.6.26-26lenny1_s390.deb\n Size/MD5 checksum: 7785146 534a269198bc118b178d26c164fc8293\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390-tape_2.6.26-26lenny1_s390.deb\n Size/MD5 checksum: 1635456 c2d7e85eb8a011fc9234ab6a70001575\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-26lenny1_s390.deb\n Size/MD5 checksum: 747430 9c445557fac2df3194cb798eb71d1bee\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390_2.6.26-26lenny1_s390.deb\n Size/MD5 checksum: 234894 2178ac16ec7024918552f6ebd85aedd3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-26lenny1_s390.deb\n Size/MD5 checksum: 112654 1610747370c332f27faae88f0a1ec939\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390_2.6.26-26lenny1_s390.deb\n Size/MD5 checksum: 7495176 816fcfd7bc444538d77c2c3f6c12157e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-s390x_2.6.26-26lenny1_s390.deb\n Size/MD5 checksum: 7846266 40b261d1b256db145d7040e1909d915c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-s390x_2.6.26-26lenny1_s390.deb\n Size/MD5 checksum: 236538 cb7f28a2a97f7d9ff3538bb4bcc87698\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-s390_2.6.26-26lenny1_s390.deb\n Size/MD5 checksum: 112670 7455f2dcbb8ca1b9dfacf7c16436b34b\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-sparc_2.6.26-26lenny1_sparc.deb\n Size/MD5 checksum: 112678 65a66260c80f6159a91baf145d247e73\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-sparc64_2.6.26-26lenny1_sparc.deb\n Size/MD5 checksum: 14635110 c06723fccef45d3a020ca459ceb9f563\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64_2.6.26-26lenny1_sparc.deb\n Size/MD5 checksum: 305254 4a86ed1ca9373e7039fb5c2721080024\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-sparc64_2.6.26-26lenny1_sparc.deb\n Size/MD5 checksum: 306952 8290985574053c62b656c105ef31d4ec\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-26lenny1_sparc.deb\n Size/MD5 checksum: 803152 7945838b907ff50d35b0695640c3e387\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-26lenny1_sparc.deb\n Size/MD5 checksum: 3823362 d8828a0ae77cdd0c37548d503dd53359\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64-smp_2.6.26-26lenny1_sparc.deb\n Size/MD5 checksum: 306648 dad43f6b5944e37931ea645be76ad560\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64_2.6.26-26lenny1_sparc.deb\n Size/MD5 checksum: 14295956 0441024e85b3bf3a402d18004be74f6a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64-smp_2.6.26-26lenny1_sparc.deb\n Size/MD5 checksum: 14616366 45a1f5c59b0376b3fa77e07d8058e0e7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-26lenny1_sparc.deb\n Size/MD5 checksum: 3788552 c2aa5e3bf20bb154f2876bdd3a5211f0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-26lenny1_sparc.deb\n Size/MD5 checksum: 112660 953336bb8af079d2e42fdbc9141b6d4b\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 3, "modified": "2010-11-27T04:52:28", "published": "2010-11-27T04:52:28", "id": "DEBIAN:DSA-2126-1:370B4", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2010/msg00177.html", "title": "[SECURITY] [DSA 2126-1] New Linux 2.6.26 packages fix several issues", "type": "debian", "cvss": {"score": 8.3, "vector": "AV:A/AC:L/Au:N/C:C/I:C/A:C"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:38", "bulletinFamily": "software", "cvelist": ["CVE-2010-4081", "CVE-2010-3297", "CVE-2010-4073", "CVE-2010-4072", "CVE-2010-3437", "CVE-2010-4074", "CVE-2010-4083", "CVE-2010-3859", "CVE-2010-3477", "CVE-2010-4080", "CVE-2010-3310", "CVE-2010-2963", "CVE-2010-3877", "CVE-2010-3875", "CVE-2010-3876", "CVE-2010-3296", "CVE-2010-3850", "CVE-2010-3442", "CVE-2010-3705", "CVE-2010-3848", "CVE-2010-4079", "CVE-2010-3880", "CVE-2010-3874", "CVE-2010-3858", "CVE-2010-3067", "CVE-2010-4164", "CVE-2010-3873", "CVE-2010-3448", "CVE-2010-3432", "CVE-2010-4078", "CVE-2010-3849"], "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA256\r\n\r\n- ----------------------------------------------------------------------\r\nDebian Security Advisory DSA-2126-1 security@debian.org\r\nhttp://www.debian.org/security/ dann frazier\r\nNovember 26, 2010 http://www.debian.org/security/faq\r\n- ----------------------------------------------------------------------\r\n\r\nPackage : linux-2.6\r\nVulnerability : privilege escalation/denial of service/information leak\r\nProblem type : local/remote\r\nDebian-specific: no\r\nCVE Id(s) : CVE-2010-2963 CVE-2010-3067 CVE-2010-3296 CVE-2010-3297\r\n CVE-2010-3310 CVE-2010-3432 CVE-2010-3437 CVE-2010-3442\r\n CVE-2010-3448 CVE-2010-3477 CVE-2010-3705 CVE-2010-3848\r\n CVE-2010-3849 CVE-2010-3850 CVE-2010-3858 CVE-2010-3859\r\n CVE-2010-3873 CVE-2010-3874 CVE-2010-3875 CVE-2010-3876\r\n CVE-2010-3877 CVE-2010-3880 CVE-2010-4072 CVE-2010-4073\r\n CVE-2010-4074 CVE-2010-4078 CVE-2010-4079 CVE-2010-4080\r\n CVE-2010-4081 CVE-2010-4083 CVE-2010-4164\r\nDebian Bug(s) :\r\n \r\nSeveral vulnerabilities have been discovered in the Linux kernel that may lead\r\nto a privilege escalation, denial of service or information leak. The Common\r\nVulnerabilities and Exposures project identifies the following problems:\r\n\r\nCVE-2010-2963\r\n\r\n Kees Cook discovered an issue in the v4l 32-bit compatibility layer for\r\n 64-bit systems that allows local users with /dev/video write permission to\r\n overwrite arbitrary kernel memory, potentially leading to a privilege\r\n escalation. On Debian systems, access to /dev/video devices is restricted to\r\n members of the 'video' group by default.\r\n\r\nCVE-2010-3067\r\n\r\n Tavis Ormandy discovered an issue in the io_submit system call. Local users\r\n can cause an integer overflow resulting in a denial of service.\r\n\r\nCVE-2010-3296\r\n\r\n Dan Rosenberg discovered an issue in the cxgb network driver that allows\r\n unprivileged users to obtain the contents of sensitive kernel memory.\r\n\r\nCVE-2010-3297\r\n\r\n Dan Rosenberg discovered an issue in the eql network driver that allows\r\n local users to obtain the contents of sensitive kernel memory.\r\n\r\nCVE-2010-3310\r\n\r\n Dan Rosenberg discovered an issue in the ROSE socket implementation. On\r\n systems with a rose device, local users can cause a denial of service\r\n (kernel memory corruption).\r\n\r\nCVE-2010-3432\r\n\r\n Thomas Dreibholz discovered an issue in the SCTP protocol that permits a\r\n remote user to cause a denial of service (kernel panic).\r\n\r\nCVE-2010-3437\r\n\r\n Dan Rosenberg discovered an issue in the pktcdvd driver. Local users with\r\n permission to open /dev/pktcdvd/control can obtain the contents of sensitive\r\n kernel memory or cause a denial of service. By default on Debian systems,\r\n this access is restricted to members of the group 'cdrom'.\r\n\r\nCVE-2010-3442\r\n\r\n Dan Rosenberg discovered an issue in the ALSA sound system. Local users with\r\n permission to open /dev/snd/controlC0 can create an integer overflow\r\n condition that causes a denial of service. By default on Debian systems,\r\n this access is restricted to members of the group 'audio'.\r\n\r\nCVE-2010-3448\r\n\r\n Dan Jacobson reported an issue in the thinkpad-acpi driver. On certain\r\n Thinkpad systems, local users can cause a denial of service (X.org crash) by\r\n reading /proc/acpi/ibm/video.\r\n\r\nCVE-2010-3477\r\n\r\n Jeff Mahoney discovered an issue in the Traffic Policing (act_police) module\r\n that allows local users to obtain the contents of sensitive kernel memory.\r\n\r\nCVE-2010-3705\r\n\r\n Dan Rosenberg reported an issue in the HMAC processing code in the SCTP\r\n protocol that allows remote users to create a denial of service (memory\r\n corruption).\r\n\r\nCVE-2010-3848\r\n\r\n Nelson Elhage discovered an issue in the Econet protocol. Local users can\r\n cause a stack overflow condition with large msg->msgiovlen values that can\r\n result in a denial of service or privilege escalation.\r\n\r\nCVE-2010-3849\r\n\r\n Nelson Elhage discovered an issue in the Econet protocol. Local users can\r\n cause a denial of service (oops) if a NULL remote addr value is passed as a\r\n parameter to sendmsg().\r\n\r\nCVE-2010-3850\r\n\r\n Nelson Elhage discovered an issue in the Econet protocol. Local users can\r\n assign econet addresses to arbitrary interfaces due to a missing\r\n capabilities check.\r\n\r\nCVE-2010-3858\r\n\r\n Brad Spengler reported an issue in the setup_arg_pages() function. Due to a\r\n bounds-checking failure, local users can create a denial of service (kernel\r\n oops).\r\n\r\nCVE-2010-3859\r\n\r\n Dan Rosenberg reported an issue in the TIPC protocol. When the tipc module\r\n is loaded, local users can gain elevated privileges via the sendmsg() system\r\n call.\r\n\r\nCVE-2010-3873\r\n\r\n Dan Rosenberg reported an issue in the X.25 network protocol. Local users\r\n can cause heap corruption, resulting in a denial of service (kernel panic).\r\n\r\nCVE-2010-3874\r\n\r\n Dan Rosenberg discovered an issue in the Control Area Network (CAN)\r\n subsystem on 64-bit systems. Local users may be able to cause a denial of\r\n service (heap corruption).\r\n\r\nCVE-2010-3875\r\n\r\n Vasiliy Kulikov discovered an issue in the AX.25 protocol. Local users can\r\n obtain the contents of sensitive kernel memory.\r\n\r\nCVE-2010-3876\r\n\r\n Vasiliy Kulikov discovered an issue in the Packet protocol. Local users can\r\n obtain the contents of sensitive kernel memory.\r\n\r\nCVE-2010-3877\r\n\r\n Vasiliy Kulikov discovered an issue in the TIPC protocol. Local users can\r\n obtain the contents of sensitive kernel memory.\r\n\r\nCVE-2010-3880\r\n\r\n Nelson Elhage discovered an issue in the INET_DIAG subsystem. Local users\r\n can cause the kernel to execute unaudited INET_DIAG bytecode, resulting in a\r\n denial of service.\r\n\r\nCVE-2010-4072\r\n\r\n Kees Cook discovered an issue in the System V shared memory subsystem.\r\n Local users can obtain the contents of sensitive kernel memory.\r\n\r\nCVE-2010-4073\r\n\r\n Dan Rosenberg discovered an issue in the System V shared memory subsystem.\r\n Local users on 64-bit system can obtain the contents of sensitive kernel\r\n memory via the 32-bit compatible semctl() system call.\r\n\r\nCVE-2010-4074\r\n\r\n Dan Rosenberg reported issues in the mos7720 and mos7840 drivers for USB\r\n serial converter devices. Local users with access to these devices can\r\n obtain the contents of sensitive kernel memory.\r\n\r\nCVE-2010-4078\r\n\r\n Dan Rosenberg reported an issue in the framebuffer driver for SiS graphics\r\n chipesets (sisfb). Local users with access to the framebuffer device can\r\n obtain the contents of sensitive kernel memory via the FBIOGET_VBLANK ioctl.\r\n\r\nCVE-2010-4079\r\n\r\n Dan Rosenberg reported an issue in the ivtvfb driver used for the Hauppauge\r\n PVR-350 card. Local users with access to the framebuffer device can obtain\r\n the contents of sensitive kernel memory via the FBIOGET_VBLANK ioctl.\r\n \r\nCVE-2010-4080\r\n\r\n Dan Rosenberg discovered an issue in the ALSA driver for RME Hammerfall DSP\r\n audio devices. Local users with access to the audio device can obtain the\r\n contents of sensitive kernel memory via the SNDRV_HDSP_IOCTL_GET_CONFIG_INFO\r\n ioctl.\r\n\r\nCVE-2010-4081\r\n\r\n Dan Rosenberg discovered an issue in the ALSA driver for RME Hammerfall DSP\r\n MADI audio devices. Local users with access to the audio device can obtain\r\n the contents of sensitive kernel memory via the\r\n SNDRV_HDSP_IOCTL_GET_CONFIG_INFO ioctl.\r\n\r\nCVE-2010-4083\r\n\r\n Dan Rosenberg discovered an issue in the semctl system call. Local users can\r\n obtain the contents of sensitive kernel memory through usage of the semid_ds\r\n structure.\r\n\r\nCVE-2010-4164\r\n\r\n Dan Rosenberg discovered an issue in the X.25 network protocol. Remote users\r\n can achieve a denial of service (infinite loop) by taking advantage of an\r\n integer underflow in the facility parsing code.\r\n\r\nFor the stable distribution (lenny), this problem has been fixed in version\r\n2.6.26-26lenny1.\r\n\r\nWe recommend that you upgrade your linux-2.6 and user-mode-linux packages.\r\n\r\nThe following matrix lists additional source packages that were rebuilt for\r\ncompatibility with or to take advantage of this update:\r\n\r\n Debian 5.0 (lenny)\r\n user-mode-linux 2.6.26-1um-2+26lenny1\r\n\r\nUpgrade instructions\r\n- --------------------\r\n\r\nwget url\r\n will fetch the file for you\r\ndpkg -i file.deb\r\n will install the referenced file.\r\n\r\nIf you are using the apt-get package manager, use the line for\r\nsources.list as given below:\r\n\r\napt-get update\r\n will update the internal database\r\napt-get upgrade\r\n will install corrected packages\r\n\r\nYou may use an automated update by adding the resources from the\r\nfooter to the proper configuration.\r\n\r\nDebian GNU/Linux 5.0 alias lenny\r\n- --------------------------------\r\n\r\nStable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64,\r\nmipsel, powerpc, s390 and sparc. The update for mips will be released once it\r\nbecomes available.\r\n\r\nSource archives:\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-26lenny1.dsc\r\n Size/MD5 checksum: 6426 25d46333cc7f2b28b4312df096d875a8\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26.orig.tar.gz\r\n Size/MD5 checksum: 61818969 85e039c2588d5bf3cb781d1c9218bbcb\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-26lenny1.diff.gz\r\n Size/MD5 checksum: 8002336 26391b13d5a39afdb2591dc888a568b8\r\n\r\nArchitecture independent packages:\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.26_2.6.26-26lenny1_all.deb\r\n Size/MD5 checksum: 4850414 de2ec8da8f7dab48ce65014401ae52e7\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.26_2.6.26-26lenny1_all.deb\r\n Size/MD5 checksum: 113254 e8f1973916d469640345a1c21421dfdf\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.26_2.6.26-26lenny1_all.deb\r\n Size/MD5 checksum: 1808942 ee7d18519868ee02f56fef2341c527ea\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.26-2_2.6.26-26lenny1_all.deb\r\n Size/MD5 checksum: 128506 065f966fa5f38283d8c5add43a952d0e\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.26_2.6.26-26lenny1_all.deb\r\n Size/MD5 checksum: 3006772 e94a5e6a2f144c31d88db997c2db8e1f\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.26_2.6.26-26lenny1_all.deb\r\n Size/MD5 checksum: 49471548 0ec635ad97a262914262a7812e9e2ce6\r\n\r\nalpha architecture (DEC Alpha)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-26lenny1_alpha.deb\r\n Size/MD5 checksum: 747090 97fac497384d4e23463efd91f4cc6e0d\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-generic_2.6.26-26lenny1_alpha.deb\r\n Size/MD5 checksum: 368956 4f6d2e6c5535f0b64836b094178b259e\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-26lenny1_alpha.deb\r\n Size/MD5 checksum: 3551142 ed27877320f4ab66757cad34462b4df1\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-legacy_2.6.26-26lenny1_alpha.deb\r\n Size/MD5 checksum: 28539060 62095485cb584ea9775c038247c8453e\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-smp_2.6.26-26lenny1_alpha.deb\r\n Size/MD5 checksum: 29258774 36a1eccda8a1a6f330ad0707a07695b4\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-26lenny1_alpha.deb\r\n Size/MD5 checksum: 112660 9eadae84e38579f69ac8415995aff91d\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-generic_2.6.26-26lenny1_alpha.deb\r\n Size/MD5 checksum: 28560146 6f671d59c6761eb6a91b667d8859ebf4\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-legacy_2.6.26-26lenny1_alpha.deb\r\n Size/MD5 checksum: 369490 1b21492f700e66406ddf902b4cfd1fff\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-alpha_2.6.26-26lenny1_alpha.deb\r\n Size/MD5 checksum: 112682 5669ed2b63dfd7e25f1bed3f3c557e8b\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-smp_2.6.26-26lenny1_alpha.deb\r\n Size/MD5 checksum: 370732 744a8a3bb0751181a11b909b7f2c8741\r\n\r\namd64 architecture (AMD x86_64 (AMD64))\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-26lenny1_amd64.deb\r\n Size/MD5 checksum: 755464 a76803db0471a09013fcc410e2bd1a7c\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-amd64_2.6.26-26lenny1_amd64.deb\r\n Size/MD5 checksum: 391070 2af9113ceb56dd2a79a448ec1eb74452\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-amd64_2.6.26-26lenny1_amd64.deb\r\n Size/MD5 checksum: 1812222 800310a26af8edc580fc57d8da9b14ae\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-26lenny1_amd64.deb\r\n Size/MD5 checksum: 3727512 5cadd7b974521b7c5ccc278968631e57\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-26lenny1_amd64.deb\r\n Size/MD5 checksum: 3859380 6fd2da7ef7a274fd0aed9701374533a5\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-26lenny1_amd64.deb\r\n Size/MD5 checksum: 112652 ceed8afd8da64b6cb39f4619b7faa310\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-amd64_2.6.26-26lenny1_amd64.deb\r\n Size/MD5 checksum: 112640 ff01f002d79cc143476afa6d907127a4\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-26lenny1_amd64.deb\r\n Size/MD5 checksum: 3783174 1822a9f0434abafe5e2dd84718c7e6bc\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-26lenny1_amd64.deb\r\n Size/MD5 checksum: 20937036 2a5fa1622b4747705e74348ce23baa5b\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-amd64_2.6.26-26lenny1_amd64.deb\r\n Size/MD5 checksum: 401434 9288349bcf9919e8be6fbb21ff3a8f66\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-amd64_2.6.26-26lenny1_amd64.deb\r\n Size/MD5 checksum: 21104766 7719bc85bb26d356f24620924a8c4283\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-26lenny1_amd64.deb\r\n Size/MD5 checksum: 393366 91d81407ad8be69d8f65b4f850ba5b1a\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-amd64_2.6.26-26lenny1_amd64.deb\r\n Size/MD5 checksum: 20956050 f9e8825e29f45d42627cfa1dd62569ea\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-amd64_2.6.26-26lenny1_amd64.deb\r\n Size/MD5 checksum: 112686 c5110416ee580c5cfe71c58eadef2a22\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-26lenny1_amd64.deb\r\n Size/MD5 checksum: 3759946 08746b9bc1d832b52f245269440b2bd6\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-amd64_2.6.26-26lenny1_amd64.deb\r\n Size/MD5 checksum: 19322068 48031c2d9ce732ed6bf79103050166dd\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-amd64_2.6.26-26lenny1_amd64.deb\r\n Size/MD5 checksum: 394064 ddaa87681b7f3e9c0d155ead5302de4a\r\n\r\narm architecture (ARM)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-arm_2.6.26-26lenny1_arm.deb\r\n Size/MD5 checksum: 112776 769f5204e3edc4a3dd501f0254e97e5b\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-26lenny1_arm.deb\r\n Size/MD5 checksum: 752794 6b11a353eddc1de6463615f0c5f69701\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-26lenny1_arm.deb\r\n Size/MD5 checksum: 371914 5eece356f6b47bab5afdbd0d3c724240\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-26lenny1_arm.deb\r\n Size/MD5 checksum: 12487514 b6a0886ca511e0dd2b7cd61319923edd\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-footbridge_2.6.26-26lenny1_arm.deb\r\n Size/MD5 checksum: 356688 d62c6595ced0b11b0c2dc906254a5bd2\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-26lenny1_arm.deb\r\n Size/MD5 checksum: 11722022 82ee74470a3bfd7448da7ea9a092cf80\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-26lenny1_arm.deb\r\n Size/MD5 checksum: 4146542 0b20edfd5914b550d21c035dab0146b4\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-26lenny1_arm.deb\r\n Size/MD5 checksum: 11434794 d8e4c25a2b94a7dc1c43226f80572203\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-26lenny1_arm.deb\r\n Size/MD5 checksum: 366896 69fc71b9d4a6d1926975f22160a6ca95\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-26lenny1_arm.deb\r\n Size/MD5 checksum: 112736 78f106b38803939df3cacdebf280b5e1\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-26lenny1_arm.deb\r\n Size/MD5 checksum: 369740 61f68bbd18a0ac4f23e4d9aeb649a4a9\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-footbridge_2.6.26-26lenny1_arm.deb\r\n Size/MD5 checksum: 10288198 15384b7d3708de3ffa1e9c17849db12f\r\n\r\narmel architecture (ARM EABI)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-26lenny1_armel.deb\r\n Size/MD5 checksum: 11684250 7d6165f32980b4bdf9174d0603a4e914\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-26lenny1_armel.deb\r\n Size/MD5 checksum: 367986 0fa930045394fa7bf2f1660edea036a8\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-26lenny1_armel.deb\r\n Size/MD5 checksum: 112734 3291126b417654ea56968e2369a54879\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-26lenny1_armel.deb\r\n Size/MD5 checksum: 366188 d58ece9a482933c133e6a31fffbdaf4b\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-versatile_2.6.26-26lenny1_armel.deb\r\n Size/MD5 checksum: 339524 728cced0ac92768f5fe216d23a2cc223\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-26lenny1_armel.deb\r\n Size/MD5 checksum: 11396252 9bf2717abad67374cc197d25956f0c11\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-26lenny1_armel.deb\r\n Size/MD5 checksum: 369858 736c45757463cc47d12daa64d13627fa\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-26lenny1_armel.deb\r\n Size/MD5 checksum: 4145910 5f10aec830d3c114d1d600cc4ed25ef8\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-26lenny1_armel.deb\r\n Size/MD5 checksum: 754724 8da96ea4780a69374788ac140e85298c\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-armel_2.6.26-26lenny1_armel.deb\r\n Size/MD5 checksum: 112772 f158d96c80dd4c903be325d11a1a2704\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-versatile_2.6.26-26lenny1_armel.deb\r\n Size/MD5 checksum: 9609544 c1a690b822e8a9d94336aa9146df21b2\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-26lenny1_armel.deb\r\n Size/MD5 checksum: 12448536 2bc10e5d383940aff2f7b54e5ca84267\r\n\r\nhppa architecture (HP PA RISC)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc-smp_2.6.26-26lenny1_hppa.deb\r\n Size/MD5 checksum: 16390762 49ae803109f72ecc5f65cc0ab2a274d2\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64_2.6.26-26lenny1_hppa.deb\r\n Size/MD5 checksum: 305004 4447819b9e77572ea89388395dc328c8\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc_2.6.26-26lenny1_hppa.deb\r\n Size/MD5 checksum: 303956 c54d283e4148b3eb1aed0e9e2f9b4135\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64-smp_2.6.26-26lenny1_hppa.deb\r\n Size/MD5 checksum: 307006 92fe6b41bd11a836c273ed0736396a18\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-hppa_2.6.26-26lenny1_hppa.deb\r\n Size/MD5 checksum: 112760 10bdcd03154924f5afb34dc670886eb8\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc_2.6.26-26lenny1_hppa.deb\r\n Size/MD5 checksum: 15796706 c530209aab49e2068f14e484b6db59fd\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-26lenny1_hppa.deb\r\n Size/MD5 checksum: 3601768 e804a1671f76f3b35bfac3bbecc4b1a8\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-26lenny1_hppa.deb\r\n Size/MD5 checksum: 112728 d95be16830e352fbdf8f4250f762003b\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64-smp_2.6.26-26lenny1_hppa.deb\r\n Size/MD5 checksum: 17689704 2ce0de928b0de084a5ee21da0a58407e\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64_2.6.26-26lenny1_hppa.deb\r\n Size/MD5 checksum: 17137918 750e28de7bb1e261f636ccba8fcab308\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-26lenny1_hppa.deb\r\n Size/MD5 checksum: 764742 dbc6af80dc674736661b498edfc3a5e4\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc-smp_2.6.26-26lenny1_hppa.deb\r\n Size/MD5 checksum: 305576 58916c39063873b84cf419379053b5e2\r\n\r\ni386 architecture (Intel ia32)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-686_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 1598590 dc693b0a5fd1594615de4c5bfb51e3a2\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 401634 19b303053ef842f9dbcb05fbf9079c86\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 412706 9a6dc9914b57224d41697dd85251ad74\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686-bigmem_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 414016 fbd71b61ce54978f4df2b3e851fa7c28\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 414584 2ebea5008b5a724ecdb19079e8f86e9d\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-686_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 18216302 86ea992d0efbd38a88f5b7fc9465f38d\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-686_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 112640 68e5cb0e49e3b0e2beb8075edf84a357\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 770174 317eaad69bb2d30be37fffe2ba516ebc\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 3870582 20d8147847c2ee48b5b8e186c5aa2dd8\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 20407918 b98e78be196bcfdd8395341c517d68a4\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 3811776 d2e42bd89a509d9a3f9cd57ba7699195\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686-bigmem_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 20528204 19e4258f60a0fd94691f21dd3bef8804\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686-bigmem_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 20546188 e9dc6af2f445e672b6d80e8391402cc6\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686-bigmem_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 413080 5a5160ce3a4308aa477d091a1fe8127a\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-i386_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 112706 9ada4ab06b22be004eee1160b21d1f2a\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 3950190 ca68b70d434125f799c5208161e105b9\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-686_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 418434 28870494c0609b93b67808c043a62dfb\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 20428344 2137508d1b187b0b364bedbaf46e1ea9\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 3846426 73b6b13e86bac670f3073c5a8b2943f7\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-686_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 399948 ba847a3f96345613a25f839972e6f0ed\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 21049612 7af7a78a4c5964620a476ad5c6066887\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-486_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 20369056 721ee6c463d845e9d6f8013ac38ba1d7\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-686_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 20705350 fc2fc201e24a62fd2574d51999195182\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 112654 80a1bd5e7cf38414cc184ac3645ce5da\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-486_2.6.26-26lenny1_i386.deb\r\n Size/MD5 checksum: 412120 2f95a4695398f1e4ce933b0fb018e6f5\r\n\r\nia64 architecture (Intel ia64)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-ia64_2.6.26-26lenny1_ia64.deb\r\n Size/MD5 checksum: 112688 0951a8f0fcf20010b4fd72e8794454ea\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-mckinley_2.6.26-26lenny1_ia64.deb\r\n Size/MD5 checksum: 361828 fa942ddabe46359a026caee5ff78cf94\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-itanium_2.6.26-26lenny1_ia64.deb\r\n Size/MD5 checksum: 34255886 885360588d0a9d8519164b605b884384\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-itanium_2.6.26-26lenny1_ia64.deb\r\n Size/MD5 checksum: 361400 17899521a5c8690a0d316797d15b9a5d\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-26lenny1_ia64.deb\r\n Size/MD5 checksum: 3694882 3f8c27edf54fa2af2593b786138d5aa6\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-mckinley_2.6.26-26lenny1_ia64.deb\r\n Size/MD5 checksum: 34440396 f8f45a9dd6e8d05bb29ba21f4100b271\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-26lenny1_ia64.deb\r\n Size/MD5 checksum: 3662038 7e20eabb6a01ceafb2b934e09743209b\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-mckinley_2.6.26-26lenny1_ia64.deb\r\n Size/MD5 checksum: 34380728 c245751f72228c02f40706c0754dc4bc\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-26lenny1_ia64.deb\r\n Size/MD5 checksum: 112654 0dda61d2b3dc3529995059957ba8d523\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-itanium_2.6.26-26lenny1_ia64.deb\r\n Size/MD5 checksum: 34192832 89c734c816323509cb81a8c06d503775\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-mckinley_2.6.26-26lenny1_ia64.deb\r\n Size/MD5 checksum: 362186 3de48033c683c0b0723845ba52d97311\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-26lenny1_ia64.deb\r\n Size/MD5 checksum: 754152 8f457306ee6f9f6a0dde6a85b60ba28e\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-itanium_2.6.26-26lenny1_ia64.deb\r\n Size/MD5 checksum: 361772 ab078e4b7347c34373294d7bd48f5f77\r\n\r\nmipsel architecture (MIPS (Little Endian))\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r5k-cobalt_2.6.26-26lenny1_mipsel.deb\r\n Size/MD5 checksum: 15061864 c0c33ea0339f836d537deea40041ebbf\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-5kc-malta_2.6.26-26lenny1_mipsel.deb\r\n Size/MD5 checksum: 362194 4307fcc7be5e03bf84e65542ee773896\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-5kc-malta_2.6.26-26lenny1_mipsel.deb\r\n Size/MD5 checksum: 28579670 e8f6dbeb2b27ecaa64a7648102068197\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1-bcm91250a_2.6.26-26lenny1_mipsel.deb\r\n Size/MD5 checksum: 305764 5f9c8534fd78687ee198c3c9575423ac\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-26lenny1_mipsel.deb\r\n Size/MD5 checksum: 112730 62463422f9e70ee2f54d09ebc429c47d\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-mipsel_2.6.26-26lenny1_mipsel.deb\r\n Size/MD5 checksum: 112784 22de96fa5ed52cfaba506f0f4c7c085c\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-26lenny1_mipsel.deb\r\n Size/MD5 checksum: 3970148 e494271e4f18315b4c5e3f8692bedadd\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1-bcm91250a_2.6.26-26lenny1_mipsel.deb\r\n Size/MD5 checksum: 19686560 5a1734bb17cfd9ee65a411c3801ccf6d\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-4kc-malta_2.6.26-26lenny1_mipsel.deb\r\n Size/MD5 checksum: 362326 f79daf88f7b6813c7c005b8b9dd87460\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r5k-cobalt_2.6.26-26lenny1_mipsel.deb\r\n Size/MD5 checksum: 300858 3775978c2a2c713ac1b15b9fb62dc021\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1a-bcm91480b_2.6.26-26lenny1_mipsel.deb\r\n Size/MD5 checksum: 306226 c23551d6d68208c7adebb3acf2523ca6\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-4kc-malta_2.6.26-26lenny1_mipsel.deb\r\n Size/MD5 checksum: 23078776 0d0cf1ded5d13ab9ab1b7563ded158a3\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1a-bcm91480b_2.6.26-26lenny1_mipsel.deb\r\n Size/MD5 checksum: 19681376 5a4951e8708a86af494f4038d9a32eca\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-26lenny1_mipsel.deb\r\n Size/MD5 checksum: 763218 a434c9b6829adb49282e1f50edbc8024\r\n\r\npowerpc architecture (PowerPC)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-26lenny1_powerpc.deb\r\n Size/MD5 checksum: 3785444 6e5a16d27250c50d7db3bb10e0fb0254\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc_2.6.26-26lenny1_powerpc.deb\r\n Size/MD5 checksum: 23590652 148679b5cb6bfed70c84dc3f1128f77b\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc_2.6.26-26lenny1_powerpc.deb\r\n Size/MD5 checksum: 366624 253c73347bea4dfb6867aceeb66a758b\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc-smp_2.6.26-26lenny1_powerpc.deb\r\n Size/MD5 checksum: 367926 4c79229ecaf6ec2f64a79842101313c2\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc_2.6.26-26lenny1_powerpc.deb\r\n Size/MD5 checksum: 367420 e98a64747b70a7fc4b96dc5c3a984d9c\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-26lenny1_powerpc.deb\r\n Size/MD5 checksum: 749102 0398a006ed76f440b23c9e6f31274756\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc64_2.6.26-26lenny1_powerpc.deb\r\n Size/MD5 checksum: 373602 d35a94e121b4835db9c8935269966669\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc_2.6.26-26lenny1_powerpc.deb\r\n Size/MD5 checksum: 23160128 24bc9e9bb6ad333636effdab5d34288c\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc-smp_2.6.26-26lenny1_powerpc.deb\r\n Size/MD5 checksum: 23564700 0f2a1dda40f8c7de0e82f5f6de29f9a1\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-26lenny1_powerpc.deb\r\n Size/MD5 checksum: 112660 629d68ca03f2477c95da86870aa023e2\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-26lenny1_powerpc.deb\r\n Size/MD5 checksum: 3817674 565cee7c648e4f13df99144664bf190f\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc64_2.6.26-26lenny1_powerpc.deb\r\n Size/MD5 checksum: 375258 291bf04c8df940c91a46662980ac6465\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc64_2.6.26-26lenny1_powerpc.deb\r\n Size/MD5 checksum: 23425562 36274877b4bd887a757def9494cc7adc\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc64_2.6.26-26lenny1_powerpc.deb\r\n Size/MD5 checksum: 23482334 a467fd6e79497aacc73e59334c59b6a6\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-powerpc_2.6.26-26lenny1_powerpc.deb\r\n Size/MD5 checksum: 112700 665500b5f7af3e53f23a703198f855d7\r\n\r\ns390 architecture (IBM S/390)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-26lenny1_s390.deb\r\n Size/MD5 checksum: 3570228 561ea2d62add917cb1e60678e2f17c61\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-26lenny1_s390.deb\r\n Size/MD5 checksum: 3537872 78fb9e63d73e11bd712a33f97bca0944\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390x_2.6.26-26lenny1_s390.deb\r\n Size/MD5 checksum: 235500 e229f77bbb800763ce13f19d7a2a4d11\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390x_2.6.26-26lenny1_s390.deb\r\n Size/MD5 checksum: 7785146 534a269198bc118b178d26c164fc8293\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390-tape_2.6.26-26lenny1_s390.deb\r\n Size/MD5 checksum: 1635456 c2d7e85eb8a011fc9234ab6a70001575\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-26lenny1_s390.deb\r\n Size/MD5 checksum: 747430 9c445557fac2df3194cb798eb71d1bee\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390_2.6.26-26lenny1_s390.deb\r\n Size/MD5 checksum: 234894 2178ac16ec7024918552f6ebd85aedd3\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-26lenny1_s390.deb\r\n Size/MD5 checksum: 112654 1610747370c332f27faae88f0a1ec939\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390_2.6.26-26lenny1_s390.deb\r\n Size/MD5 checksum: 7495176 816fcfd7bc444538d77c2c3f6c12157e\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-s390x_2.6.26-26lenny1_s390.deb\r\n Size/MD5 checksum: 7846266 40b261d1b256db145d7040e1909d915c\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-s390x_2.6.26-26lenny1_s390.deb\r\n Size/MD5 checksum: 236538 cb7f28a2a97f7d9ff3538bb4bcc87698\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-s390_2.6.26-26lenny1_s390.deb\r\n Size/MD5 checksum: 112670 7455f2dcbb8ca1b9dfacf7c16436b34b\r\n\r\nsparc architecture (Sun SPARC/UltraSPARC)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-sparc_2.6.26-26lenny1_sparc.deb\r\n Size/MD5 checksum: 112678 65a66260c80f6159a91baf145d247e73\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-sparc64_2.6.26-26lenny1_sparc.deb\r\n Size/MD5 checksum: 14635110 c06723fccef45d3a020ca459ceb9f563\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64_2.6.26-26lenny1_sparc.deb\r\n Size/MD5 checksum: 305254 4a86ed1ca9373e7039fb5c2721080024\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-sparc64_2.6.26-26lenny1_sparc.deb\r\n Size/MD5 checksum: 306952 8290985574053c62b656c105ef31d4ec\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-26lenny1_sparc.deb\r\n Size/MD5 checksum: 803152 7945838b907ff50d35b0695640c3e387\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-26lenny1_sparc.deb\r\n Size/MD5 checksum: 3823362 d8828a0ae77cdd0c37548d503dd53359\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64-smp_2.6.26-26lenny1_sparc.deb\r\n Size/MD5 checksum: 306648 dad43f6b5944e37931ea645be76ad560\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64_2.6.26-26lenny1_sparc.deb\r\n Size/MD5 checksum: 14295956 0441024e85b3bf3a402d18004be74f6a\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64-smp_2.6.26-26lenny1_sparc.deb\r\n Size/MD5 checksum: 14616366 45a1f5c59b0376b3fa77e07d8058e0e7\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-26lenny1_sparc.deb\r\n Size/MD5 checksum: 3788552 c2aa5e3bf20bb154f2876bdd3a5211f0\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-26lenny1_sparc.deb\r\n Size/MD5 checksum: 112660 953336bb8af079d2e42fdbc9141b6d4b\r\n\r\n These files will probably be moved into the stable distribution on\r\n its next update.\r\n\r\n- ---------------------------------------------------------------------------------\r\nFor apt-get: deb http://security.debian.org/ stable/updates main\r\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\r\nMailing list: debian-security-announce@lists.debian.org\r\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.10 (GNU/Linux)\r\n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\r\nFknbJ4nNZutx8NS7w1Wx\r\n=DDxb\r\n-----END PGP SIGNATURE-----", "edition": 1, "modified": "2010-12-01T00:00:00", "published": "2010-12-01T00:00:00", "id": "SECURITYVULNS:DOC:25229", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:25229", "title": "[SECURITY] [DSA 2126-1] New Linux 2.6.26 packages fix several issues", "type": "securityvulns", "cvss": {"score": 8.3, "vector": "AV:ADJACENT_NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:39", "bulletinFamily": "software", "cvelist": ["CVE-2010-4081", "CVE-2010-3297", "CVE-2010-4073", "CVE-2010-4072", "CVE-2010-3437", "CVE-2010-4074", "CVE-2010-4083", "CVE-2010-3859", "CVE-2010-3477", "CVE-2010-4080", "CVE-2010-3310", "CVE-2010-2963", "CVE-2010-3877", "CVE-2010-3875", "CVE-2010-3876", "CVE-2010-3296", "CVE-2010-3850", "CVE-2010-4258", "CVE-2010-3442", "CVE-2010-3705", "CVE-2010-3848", "CVE-2010-4079", "CVE-2010-3880", "CVE-2010-3874", "CVE-2010-3858", "CVE-2010-3067", "CVE-2010-4164", "CVE-2010-3873", "CVE-2010-3448", "CVE-2010-3432", "CVE-2010-4078", "CVE-2010-3849"], "description": "Multiple DoS conditions, priviloege esclations, memory leaks from kernel memory, DoS via SCTP protocol, DoS via X.25.", "edition": 1, "modified": "2010-12-09T00:00:00", "published": "2010-12-09T00:00:00", "id": "SECURITYVULNS:VULN:11275", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:11275", "title": "Linux kernel multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 8.3, "vector": "AV:ADJACENT_NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "vmware": [{"lastseen": "2019-11-06T16:05:41", "bulletinFamily": "unix", "cvelist": ["CVE-2010-4242", "CVE-2010-2942", "CVE-2011-0521", "CVE-2010-3904", "CVE-2010-3078", "CVE-2010-4081", "CVE-2010-3865", "CVE-2010-4073", "CVE-2010-4072", "CVE-2010-4346", "CVE-2011-1658", "CVE-2010-2492", "CVE-2010-4083", "CVE-2010-2943", "CVE-2011-1494", "CVE-2010-0296", "CVE-2011-1478", "CVE-2010-3859", "CVE-2010-3477", "CVE-2010-3086", "CVE-2010-4251", "CVE-2010-4080", "CVE-2010-4343", "CVE-2010-3877", "CVE-2010-4158", "CVE-2010-3876", "CVE-2011-1659", "CVE-2010-3296", "CVE-2010-4526", "CVE-2010-3015", "CVE-2011-0710", "CVE-2011-0281", "CVE-2010-2938", "CVE-2010-4247", "CVE-2010-4263", "CVE-2010-3442", "CVE-2010-4248", "CVE-2011-1495", "CVE-2010-4243", "CVE-2010-3066", "CVE-2011-1071", "CVE-2010-3880", "CVE-2010-1083", "CVE-2010-4249", "CVE-2010-4157", "CVE-2010-4161", "CVE-2011-1010", "CVE-2010-3858", "CVE-2010-3067", "CVE-2010-3699", "CVE-2010-4238", "CVE-2011-0282", "CVE-2011-1095", "CVE-2010-4255", "CVE-2010-2798", "CVE-2010-3432", "CVE-2011-1090", "CVE-2011-0536", "CVE-2010-1323", "CVE-2010-4075", "CVE-2010-4655"], "description": "a. ESX third party update for Service Console kernel \nThis update takes the console OS kernel package to kernel-2.6.18-238.9.1 which resolves multiple security issues. \nThe Common Vulnerabilities and Exposures project ( [cve.mitre.org](<http://cve.mitre.org/>)) has assigned the names CVE-2010-1083, CVE-2010-2492, CVE-2010-2798, CVE-2010-2938, CVE-2010-2942, CVE-2010-2943, CVE-2010-3015, CVE-2010-3066, CVE-2010-3067, CVE-2010-3078, CVE-2010-3086, CVE-2010-3296, CVE-2010-3432, CVE-2010-3442, CVE-2010-3477, CVE-2010-3699, CVE-2010-3858, CVE-2010-3859, CVE-2010-3865, CVE-2010-3876, CVE-2010-3877, CVE-2010-3880, CVE-2010-3904, CVE-2010-4072, CVE-2010-4073, CVE-2010-4075, CVE-2010-4080, CVE-2010-4081, CVE-2010-4083, CVE-2010-4157, CVE-2010-4158, CVE-2010-4161, CVE-2010-4238, CVE-2010-4242, CVE-2010-4243, CVE-2010-4247, CVE-2010-4248, CVE-2010-4249, CVE-2010-4251, CVE-2010-4255, CVE-2010-4263, CVE-2010-4343, CVE-2010-4346, CVE-2010-4526, CVE-2010-4655, CVE-2011-0521, CVE-2011-0710, CVE-2011-1010, CVE-2011-1090 and CVE-2011-1478 to these issues. \nColumn 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. \n\n", "edition": 4, "modified": "2012-03-08T00:00:00", "published": "2011-10-12T00:00:00", "id": "VMSA-2011-0012", "href": "https://www.vmware.com/security/advisories/VMSA-2011-0012.html", "title": "VMware ESX third party updates for Service Console packages glibc and dhcp", "type": "vmware", "cvss": {"score": 7.9, "vector": "AV:N/AC:M/Au:S/C:C/I:C/A:N"}}]}