ID OPENVAS:1361412562310871288 Type openvas Reporter Copyright (C) 2014 Greenbone Networks GmbH Modified 2018-11-23T00:00:00
Description
The remote host is missing an update for the
###############################################################################
# OpenVAS Vulnerability Test
#
# RedHat Update for kernel RHSA-2014:1843-01
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.871288");
script_version("$Revision: 12497 $");
script_tag(name:"last_modification", value:"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $");
script_tag(name:"creation_date", value:"2014-11-12 06:23:33 +0100 (Wed, 12 Nov 2014)");
script_cve_id("CVE-2014-3185", "CVE-2014-3611", "CVE-2014-3645", "CVE-2014-3646");
script_tag(name:"cvss_base", value:"6.9");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:M/Au:N/C:C/I:C/A:C");
script_name("RedHat Update for kernel RHSA-2014:1843-01");
script_tag(name:"summary", value:"The remote host is missing an update for the 'kernel'
package(s) announced via the referenced advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"The kernel packages contain the Linux kernel, the core of any Linux
operating system.
* A race condition flaw was found in the way the Linux kernel's KVM
subsystem handled PIT (Programmable Interval Timer) emulation. A guest user
who has access to the PIT I/O ports could use this flaw to crash the host.
(CVE-2014-3611, Important)
* A memory corruption flaw was found in the way the USB ConnectTech
WhiteHEAT serial driver processed completion commands sent via USB Request
Blocks buffers. An attacker with physical access to the system could use
this flaw to crash the system or, potentially, escalate their privileges on
the system. (CVE-2014-3185, Moderate)
* It was found that the Linux kernel's KVM subsystem did not handle the VM
exits gracefully for the invept (Invalidate Translations Derived from EPT)
and invvpid (Invalidate Translations Based on VPID) instructions. On hosts
with an Intel processor and invept/invppid VM exit support, an unprivileged
guest user could use these instructions to crash the guest. (CVE-2014-3645,
CVE-2014-3646, Moderate)
Red Hat would like to thank Lars Bull of Google for reporting
CVE-2014-3611, and the Advanced Threat Research team at Intel Security for
reporting CVE-2014-3645 and CVE-2014-3646.
This update also fixes the following bugs:
* This update fixes several race conditions between PCI error recovery
callbacks and potential calls of the ifup and ifdown commands in the tg3
driver. When triggered, these race conditions could cause a kernel crash.
(BZ#1142570)
* Previously, GFS2 failed to unmount a sub-mounted GFS2 file system if its
parent was also a GFS2 file system. This problem has been fixed by adding
the appropriate d_op- d_hash() routine call for the last component of the
mount point path in the path name lookup mechanism code (namei).
(BZ#1145193)
* Due to previous changes in the virtio-net driver, a Red Hat Enterprise
Linux 6.6 guest was unable to boot with the 'mgr_rxbuf=off' option
specified. This was caused by providing the page_to_skb() function with an
incorrect packet length in the driver's Rx path. This problem has been
fixed and the guest in the described scenario can now boot successfully.
(BZ#1148693)
* When using one of the newer IPSec Authentication Header (AH) algorithms
with Openswan, a kernel panic could occur. This happened because the
maximum truncated ICV length was too small. To fix this problem, the
MAX_AH_AUTH_LEN parameter has been set to 64. (BZ#1149083)
* A bug in the IPMI driver caused the kernel to pani ...
Description truncated, please see the referenced URL(s) for more information.");
script_tag(name:"affected", value:"kernel on Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)");
script_tag(name:"solution", value:"Please Install the Updated Packages.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
script_xref(name:"RHSA", value:"2014:1843-01");
script_xref(name:"URL", value:"https://www.redhat.com/archives/rhsa-announce/2014-November/msg00026.html");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
script_family("Red Hat Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/rhel", "ssh/login/rpms", re:"ssh/login/release=RHENT_6");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release) exit(0);
res = "";
if(release == "RHENT_6")
{
if ((res = isrpmvuln(pkg:"kernel", rpm:"kernel~2.6.32~504.1.3.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"kernel-debug", rpm:"kernel-debug~2.6.32~504.1.3.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"kernel-debug-debuginfo", rpm:"kernel-debug-debuginfo~2.6.32~504.1.3.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"kernel-debug-devel", rpm:"kernel-debug-devel~2.6.32~504.1.3.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"kernel-debuginfo", rpm:"kernel-debuginfo~2.6.32~504.1.3.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"kernel-debuginfo-common-i686", rpm:"kernel-debuginfo-common-i686~2.6.32~504.1.3.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"kernel-devel", rpm:"kernel-devel~2.6.32~504.1.3.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"kernel-headers", rpm:"kernel-headers~2.6.32~504.1.3.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"perf", rpm:"perf~2.6.32~504.1.3.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"perf-debuginfo", rpm:"perf-debuginfo~2.6.32~504.1.3.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"python-perf-debuginfo", rpm:"python-perf-debuginfo~2.6.32~504.1.3.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"kernel-abi-whitelists", rpm:"kernel-abi-whitelists~2.6.32~504.1.3.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"kernel-doc", rpm:"kernel-doc~2.6.32~504.1.3.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"kernel-firmware", rpm:"kernel-firmware~2.6.32~504.1.3.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"kernel-debuginfo-common-x86_64", rpm:"kernel-debuginfo-common-x86_64~2.6.32~504.1.3.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99);
exit(0);
}
{"id": "OPENVAS:1361412562310871288", "type": "openvas", "bulletinFamily": "scanner", "title": "RedHat Update for kernel RHSA-2014:1843-01", "description": "The remote host is missing an update for the ", "published": "2014-11-12T00:00:00", "modified": "2018-11-23T00:00:00", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310871288", "reporter": "Copyright (C) 2014 Greenbone Networks GmbH", "references": ["2014:1843-01", "https://www.redhat.com/archives/rhsa-announce/2014-November/msg00026.html"], "cvelist": ["CVE-2014-3646", "CVE-2014-3611", "CVE-2014-3645", "CVE-2014-3185"], "lastseen": "2019-05-29T18:37:22", "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "f5", "idList": ["F5:K15912", "SOL15912"]}, {"type": "cve", "idList": ["CVE-2014-3645", "CVE-2014-3611", "CVE-2014-3646", "CVE-2014-3185"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310842022", "OPENVAS:1361412562310123267", "OPENVAS:1361412562310123265", "OPENVAS:1361412562310882079", "OPENVAS:1361412562310123261", "OPENVAS:1361412562310703060", "OPENVAS:1361412562310123254", "OPENVAS:1361412562310871280", "OPENVAS:1361412562310123266", "OPENVAS:1361412562310882069"]}, {"type": "nessus", "idList": ["REDHAT-RHSA-2014-1843.NASL", "CENTOS_RHSA-2014-1843.NASL", "ORACLELINUX_ELSA-2014-1843.NASL", "SL_20141028_KERNEL_ON_SL7_X.NASL", "REDHAT-RHSA-2014-1724.NASL", "CENTOS_RHSA-2014-1724.NASL", "F5_BIGIP_SOL15912.NASL", "ORACLELINUX_ELSA-2014-1724.NASL", "REDHAT-RHSA-2015-0284.NASL", "ORACLELINUX_ELSA-2014-3084.NASL"]}, {"type": "oraclelinux", "idList": ["ELSA-2014-1971", "ELSA-2014-1843", "ELSA-2014-3086", "ELSA-2014-1724", "ELSA-2014-3084", "ELSA-2014-3096", "ELSA-2014-1997", "ELSA-2015-0869", "ELSA-2014-3085"]}, {"type": "redhat", "idList": ["RHSA-2014:1724", "RHSA-2015:0284", "RHSA-2014:1843", "RHSA-2015:0126", "RHSA-2015:0869", "RHSA-2014:1318"]}, {"type": "centos", "idList": ["CESA-2014:1724", "CESA-2014:1843", "CESA-2015:0869"]}, {"type": "ubuntu", "idList": ["USN-2396-1", "USN-2491-1", "USN-2417-1", "USN-2462-1", "USN-2395-1", "USN-2374-1", "USN-2375-1", "USN-2394-1", "USN-2418-1"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:31407", "SECURITYVULNS:DOC:31325", "SECURITYVULNS:VULN:14068", "SECURITYVULNS:DOC:31324"]}, {"type": "debian", "idList": ["DEBIAN:DSA-3060-1:394A4", "DEBIAN:DLA-118-1:98410"]}, {"type": "archlinux", "idList": ["ASA-201411-14", "ASA-201411-15"]}, {"type": "suse", "idList": ["SUSE-SU-2015:0068-1"]}], "modified": "2019-05-29T18:37:22", "rev": 2}, "score": {"value": 7.6, "vector": "NONE", "modified": "2019-05-29T18:37:22", "rev": 2}, "vulnersScore": 7.6}, "pluginID": "1361412562310871288", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for kernel RHSA-2014:1843-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.871288\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2014-11-12 06:23:33 +0100 (Wed, 12 Nov 2014)\");\n script_cve_id(\"CVE-2014-3185\", \"CVE-2014-3611\", \"CVE-2014-3645\", \"CVE-2014-3646\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"RedHat Update for kernel RHSA-2014:1843-01\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n * A race condition flaw was found in the way the Linux kernel's KVM\nsubsystem handled PIT (Programmable Interval Timer) emulation. A guest user\nwho has access to the PIT I/O ports could use this flaw to crash the host.\n(CVE-2014-3611, Important)\n\n * A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB Request\nBlocks buffers. An attacker with physical access to the system could use\nthis flaw to crash the system or, potentially, escalate their privileges on\nthe system. (CVE-2014-3185, Moderate)\n\n * It was found that the Linux kernel's KVM subsystem did not handle the VM\nexits gracefully for the invept (Invalidate Translations Derived from EPT)\nand invvpid (Invalidate Translations Based on VPID) instructions. On hosts\nwith an Intel processor and invept/invppid VM exit support, an unprivileged\nguest user could use these instructions to crash the guest. (CVE-2014-3645,\nCVE-2014-3646, Moderate)\n\nRed Hat would like to thank Lars Bull of Google for reporting\nCVE-2014-3611, and the Advanced Threat Research team at Intel Security for\nreporting CVE-2014-3645 and CVE-2014-3646.\n\nThis update also fixes the following bugs:\n\n * This update fixes several race conditions between PCI error recovery\ncallbacks and potential calls of the ifup and ifdown commands in the tg3\ndriver. When triggered, these race conditions could cause a kernel crash.\n(BZ#1142570)\n\n * Previously, GFS2 failed to unmount a sub-mounted GFS2 file system if its\nparent was also a GFS2 file system. This problem has been fixed by adding\nthe appropriate d_op- d_hash() routine call for the last component of the\nmount point path in the path name lookup mechanism code (namei).\n(BZ#1145193)\n\n * Due to previous changes in the virtio-net driver, a Red Hat Enterprise\nLinux 6.6 guest was unable to boot with the 'mgr_rxbuf=off' option\nspecified. This was caused by providing the page_to_skb() function with an\nincorrect packet length in the driver's Rx path. This problem has been\nfixed and the guest in the described scenario can now boot successfully.\n(BZ#1148693)\n\n * When using one of the newer IPSec Authentication Header (AH) algorithms\nwith Openswan, a kernel panic could occur. This happened because the\nmaximum truncated ICV length was too small. To fix this problem, the\nMAX_AH_AUTH_LEN parameter has been set to 64. (BZ#1149083)\n\n * A bug in the IPMI driver caused the kernel to pani ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"affected\", value:\"kernel on Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"RHSA\", value:\"2014:1843-01\");\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2014-November/msg00026.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_6\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.32~504.1.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.32~504.1.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~2.6.32~504.1.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.32~504.1.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.32~504.1.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo-common-i686\", rpm:\"kernel-debuginfo-common-i686~2.6.32~504.1.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.32~504.1.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.32~504.1.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~2.6.32~504.1.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perf-debuginfo\", rpm:\"perf-debuginfo~2.6.32~504.1.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-perf-debuginfo\", rpm:\"python-perf-debuginfo~2.6.32~504.1.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-abi-whitelists\", rpm:\"kernel-abi-whitelists~2.6.32~504.1.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.32~504.1.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-firmware\", rpm:\"kernel-firmware~2.6.32~504.1.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo-common-x86_64\", rpm:\"kernel-debuginfo-common-x86_64~2.6.32~504.1.3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "naslFamily": "Red Hat Local Security Checks"}
{"f5": [{"lastseen": "2019-07-03T18:42:33", "bulletinFamily": "software", "cvelist": ["CVE-2014-3646", "CVE-2014-3611", "CVE-2014-3645", "CVE-2014-3185"], "description": "\nF5 Product Development has assigned ID 491008 (BIG-IP), ID 496037 and ID 496042 (BIG-IQ), ID 496045 and ID 496044 (Enterprise Manager), and ID 492564 (F5 WebSafe) to these vulnerabilities, and has evaluated the currently supported releases for potential vulnerability. Additionally, [BIG-IP iHealth](<http://www.f5.com/support/support-tools/big-ip-ihealth>) may list Heuristic H496135 on the **Diagnostics** >** Identified **> **High** screen.\n\nTo determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:\n\nProduct | Versions known to be vulnerable | Versions known to be not vulnerable | Vulnerable component or feature \n---|---|---|--- \nBIG-IP LTM | 11.6.0 - 11.6.1 \n11.1.0 - 11.5.4 | 13.0.0 \n12.0.0 - 12.1.2 \n11.6.2 \n11.5.5 \n11.0.0 \n10.1.0 - 10.2.4 | Linux kernel and specific device drivers \nBIG-IP AAM | 11.6.0 - 11.6.1 \n11.4.0 - 11.5.4 | 13.0.0 \n12.0.0 - 12.1.2 \n11.6.2 \n11.5.5 | Linux kernel and specific device drivers \nBIG-IP AFM | 11.6.0 - 11.6.1 \n11.3.0 - 11.5.4 | 13.0.0 \n12.0.0 - 12.1.2 \n11.6.2 \n11.5.5 | Linux kernel and specific device drivers \nBIG-IP Analytics | 11.6.0 - 11.6.1 \n11.1.0 - 11.5.4 | 13.0.0 \n12.0.0 - 12.1.2 \n11.6.2 \n11.5.5 \n11.0.0 | Linux kernel and specific device drivers \nBIG-IP APM | 11.6.0 - 11.6.1 \n11.1.0 - 11.5.4 | 13.0.0 \n12.0.0 - 12.1.2 \n11.6.2 \n11.5.5 \n11.0.0 \n10.1.0 - 10.2.4 | Linux kernel and specific device drivers \nBIG-IP ASM | 11.6.0 - 11.6.1 \n11.1.0 - 11.5.4 | 13.0.0 \n12.0.0 - 12.1.2 \n11.5.5 \n11.6.2 \n11.0.0 \n10.1.0 - 10.2.4 | Linux kernel and specific device drivers \nBIG-IP DNS | None | 13.0.0 \n12.0.0 - 12.1.2 | Linux kernel and specific device drivers \nBIG-IP Edge Gateway | 11.1.0 - 11.3.0 | 11.0.0 \n10.1.0 - 10.2.4 | Linux kernel and specific device drivers \nBIG-IP GTM | 11.6.0 - 11.6.1 \n11.1.0 - 11.5.4 | 11.6.2 \n11.5.5 \n11.0.0 \n10.1.0 - 10.2.4 | Linux kernel and specific device drivers \nBIG-IP Link Controller | 11.6.0 - 11.6.1 \n11.1.0 - 11.5.4 | 13.0.0 \n12.0.0 - 12.1.2 \n11.6.2 \n11.5.5 \n11.0.0 \n10.1.0 - 10.2.4 | Linux kernel and specific device drivers \nBIG-IP PEM | 11.6.0 - 11.6.1 \n11.3.0 - 11.5.4 | 13.0.0 \n12.0.0 - 12.1.2 \n11.6.2 \n11.5.5 | Linux kernel and specific device drivers \nBIG-IP PSM | 11.1.0 - 11.4.1 | 11.0.0 \n10.1.0 - 10.2.4 | Linux kernel and specific device drivers \nBIG-IP WebAccelerator | 11.1.0 - 11.3.0 | 11.0.0 \n10.1.0 - 10.2.4 | Linux kernel and specific device drivers \nBIG-IP WOM | 11.1.0 - 11.3.0 | 11.0.0 \n10.1.0 - 10.2.4 | Linux kernel and specific device drivers \nARX | None | 6.2.0 - 6.4.0 | None \nEnterprise Manager | 3.1.0 - 3.1.1 | 3.0.0 \n2.1.0 - 2.3.0 | Linux kernel and specific device drivers \nFirePass | None | 7.0.0 \n6.0.0 - 6.1.0 | None \nBIG-IQ Cloud | 4.0.0 - 4.5.0 | None | Linux kernel and specific device drivers \nBIG-IQ Device | 4.2.0 - 4.5.0 | None | Linux kernel and specific device drivers \nBIG-IQ Security | 4.0.0 - 4.5.0 | None | Linux kernel and specific device drivers \nLineRate | None | 2.4.0 - 2.5.0 \n1.6.0 - 1.6.4 | None \nF5 WebSafe | None | 1.0.0 | None\n\nIf you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the** Versions known to be not vulnerable** column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.\n\nTo mitigate vulnerability CVE-2014-3185, maintain affected products in a secure location, which limits physical access to the unit. To mitigate vulnerabilities CVE-2014-3611, CVE-2014-3645, and CVE-2014-3646, limit host and guest login to only trusted users.\n\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n", "edition": 1, "modified": "2018-02-06T01:03:00", "published": "2014-12-16T20:50:00", "id": "F5:K15912", "href": "https://support.f5.com/csp/article/K15912", "title": "Linux kernel driver vulnerabilities CVE-2014-3185, CVE-2014-3611, CVE-2014-3645, and CVE-2014-3646", "type": "f5", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2016-09-26T17:22:53", "bulletinFamily": "software", "cvelist": ["CVE-2014-3646", "CVE-2014-3611", "CVE-2014-3645", "CVE-2014-3185", "CVE-2014-3184"], "edition": 1, "description": "[CVE-2014-3184](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3184>)\n\nThe report_fixup functions in the HID subsystem in the Linux kernel before 3.16.2 might allow physically proximate attackers to cause a denial of service (out-of-bounds write) via a crafted device that provides a small report descriptor, related to (1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3) drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5) drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c.\n\n[CVE-2014-3185](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3185>)\n\nMultiple buffer overflows in the command_port_read_callback function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in the Linux kernel before 3.16.2 allow physically proximate attackers to execute arbitrary code or cause a denial of service (memory corruption and system crash) via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with a bulk response.\n\n[CVE-2014-3611](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3611>)\n\nRace condition in the __kvm_migrate_pit_timer function in arch/x86/kvm/i8254.c in the KVM subsystem in the Linux kernel through 3.17.2 allows guest OS users to cause a denial of service (host OS crash) by leveraging incorrect PIT emulation.\n\n[CVE-2014-3645](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3645>)\n\narch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.12 does not have an exit handler for the INVEPT instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.\n\n[CVE-2014-3646](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3646>)\n\narch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.\n", "modified": "2016-08-24T00:00:00", "published": "2014-12-16T00:00:00", "href": "http://support.f5.com/kb/en-us/solutions/public/15000/900/sol15912.html", "id": "SOL15912", "title": "SOL15912 - Linux kernel driver vulnerabilities CVE-2014-3184, CVE-2014-3185, CVE-2014-3611, CVE-2014-3645, and CVE-2014-3646", "type": "f5", "cvss": {"score": 6.9, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "cve": [{"lastseen": "2021-02-02T06:14:29", "description": "arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.12 does not have an exit handler for the INVEPT instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.", "edition": 6, "cvss3": {}, "published": "2014-11-10T11:55:00", "title": "CVE-2014-3645", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-3645"], "modified": "2015-03-18T02:01:00", "cpe": ["cpe:/o:linux:linux_kernel:3.0.57", "cpe:/o:linux:linux_kernel:3.7", "cpe:/o:linux:linux_kernel:3.0.36", "cpe:/o:linux:linux_kernel:3.4.4", "cpe:/o:linux:linux_kernel:3.9", "cpe:/o:linux:linux_kernel:3.11.6", "cpe:/o:linux:linux_kernel:3.4.30", "cpe:/o:linux:linux_kernel:3.1.4", "cpe:/o:linux:linux_kernel:3.1.7", "cpe:/o:linux:linux_kernel:3.0.30", "cpe:/o:linux:linux_kernel:3.0.64", "cpe:/o:linux:linux_kernel:3.4.10", "cpe:/o:linux:linux_kernel:3.2.14", "cpe:/o:linux:linux_kernel:3.10.17", "cpe:/o:linux:linux_kernel:3.4.27", "cpe:/o:linux:linux_kernel:3.0.27", "cpe:/o:linux:linux_kernel:3.2.7", "cpe:/o:linux:linux_kernel:3.8.9", "cpe:/o:linux:linux_kernel:3.8.4", "cpe:/o:linux:linux_kernel:3.0.61", "cpe:/o:linux:linux_kernel:3.10.18", "cpe:/o:linux:linux_kernel:3.4.19", "cpe:/o:linux:linux_kernel:3.4.21", "cpe:/o:linux:linux_kernel:3.2.24", "cpe:/o:linux:linux_kernel:3.2.25", "cpe:/o:linux:linux_kernel:3.5.5", "cpe:/o:linux:linux_kernel:3.0.33", "cpe:/o:linux:linux_kernel:3.3.6", "cpe:/o:linux:linux_kernel:3.2.8", "cpe:/o:linux:linux_kernel:3.0.47", "cpe:/o:linux:linux_kernel:3.10.4", "cpe:/o:linux:linux_kernel:3.0.9", "cpe:/o:linux:linux_kernel:3.4.23", "cpe:/o:linux:linux_kernel:3.4.2", "cpe:/o:linux:linux_kernel:3.4.13", "cpe:/o:linux:linux_kernel:3.2.29", "cpe:/o:linux:linux_kernel:3.2.18", "cpe:/o:linux:linux_kernel:3.0.6", "cpe:/o:linux:linux_kernel:3.10.7", "cpe:/o:linux:linux_kernel:3.6.10", "cpe:/o:linux:linux_kernel:3.6.5", "cpe:/o:linux:linux_kernel:3.10.9", "cpe:/o:linux:linux_kernel:3.0.17", "cpe:/o:linux:linux_kernel:3.6", "cpe:/o:linux:linux_kernel:3.2.23", "cpe:/o:linux:linux_kernel:3.0.10", "cpe:/o:linux:linux_kernel:3.6.3", "cpe:/o:linux:linux_kernel:3.10.14", "cpe:/o:linux:linux_kernel:3.7.3", "cpe:/o:linux:linux_kernel:3.8.10", "cpe:/o:linux:linux_kernel:3.8.12", "cpe:/o:linux:linux_kernel:3.7.8", "cpe:/o:linux:linux_kernel:3.0.40", "cpe:/o:linux:linux_kernel:3.11.3", "cpe:/o:linux:linux_kernel:3.0.67", "cpe:/o:linux:linux_kernel:3.10.10", "cpe:/o:linux:linux_kernel:3.1.3", "cpe:/o:linux:linux_kernel:3.0.45", "cpe:/o:linux:linux_kernel:3.0.7", "cpe:/o:linux:linux_kernel:3.3", "cpe:/o:linux:linux_kernel:3.0.20", "cpe:/o:linux:linux_kernel:3.2.30", "cpe:/o:linux:linux_kernel:3.0.31", "cpe:/o:linux:linux_kernel:3.10.3", "cpe:/o:linux:linux_kernel:3.4.9", "cpe:/o:linux:linux_kernel:3.10.12", "cpe:/o:linux:linux_kernel:3.0.49", "cpe:/o:linux:linux_kernel:3.2.13", "cpe:/o:linux:linux_kernel:3.4.24", "cpe:/o:linux:linux_kernel:3.0.12", "cpe:/o:linux:linux_kernel:3.0.41", "cpe:/o:linux:linux_kernel:3.10.6", "cpe:/o:linux:linux_kernel:3.0.59", "cpe:/o:linux:linux_kernel:3.0.15", "cpe:/o:linux:linux_kernel:3.8.3", "cpe:/o:linux:linux_kernel:3.2.27", "cpe:/o:linux:linux_kernel:3.0.50", "cpe:/o:linux:linux_kernel:3.0.23", "cpe:/o:linux:linux_kernel:3.8.13", "cpe:/o:linux:linux_kernel:3.0.44", "cpe:/o:linux:linux_kernel:3.8.5", "cpe:/o:linux:linux_kernel:3.1.10", "cpe:/o:linux:linux_kernel:3.9.11", "cpe:/o:linux:linux_kernel:3.4.6", "cpe:/o:linux:linux_kernel:3.11", "cpe:/o:linux:linux_kernel:3.0.13", "cpe:/o:linux:linux_kernel:3.9.5", "cpe:/o:linux:linux_kernel:3.6.1", "cpe:/o:linux:linux_kernel:3.0.5", "cpe:/o:linux:linux_kernel:3.0.39", "cpe:/o:linux:linux_kernel:3.5.1", "cpe:/o:linux:linux_kernel:3.0.3", "cpe:/o:linux:linux_kernel:3.11.7", "cpe:/o:linux:linux_kernel:3.0.63", "cpe:/o:linux:linux_kernel:3.2.28", "cpe:/o:linux:linux_kernel:3.3.4", "cpe:/o:linux:linux_kernel:3.3.7", "cpe:/o:linux:linux_kernel:3.0.14", "cpe:/o:linux:linux_kernel:3.0.28", "cpe:/o:linux:linux_kernel:3.0.25", "cpe:/o:linux:linux_kernel:3.9.1", "cpe:/o:linux:linux_kernel:3.0.56", "cpe:/o:linux:linux_kernel:3.0.1", "cpe:/o:linux:linux_kernel:3.2.3", "cpe:/o:linux:linux_kernel:3.7.2", "cpe:/o:linux:linux_kernel:3.0.58", "cpe:/o:linux:linux_kernel:3.0.8", "cpe:/o:linux:linux_kernel:3.0.66", "cpe:/o:linux:linux_kernel:3.2.17", "cpe:/o:linux:linux_kernel:3.0.60", "cpe:/o:linux:linux_kernel:3.2.6", "cpe:/o:linux:linux_kernel:3.7.5", "cpe:/o:linux:linux_kernel:3.2.1", "cpe:/o:linux:linux_kernel:3.4.3", "cpe:/o:linux:linux_kernel:3.4.32", "cpe:/o:linux:linux_kernel:3.3.2", "cpe:/o:linux:linux_kernel:3.0.65", "cpe:/o:linux:linux_kernel:3.4.20", "cpe:/o:linux:linux_kernel:3.3.3", "cpe:/o:linux:linux_kernel:3.2.19", "cpe:/o:linux:linux_kernel:3.7.7", "cpe:/o:linux:linux_kernel:3.2.16", "cpe:/o:linux:linux_kernel:3.0.62", "cpe:/o:linux:linux_kernel:3.0.55", "cpe:/o:linux:linux_kernel:3.1.1", "cpe:/o:linux:linux_kernel:3.2.5", "cpe:/o:linux:linux_kernel:3.9.3", "cpe:/o:linux:linux_kernel:3.0.46", "cpe:/o:linux:linux_kernel:3.11.4", "cpe:/o:linux:linux_kernel:3.6.6", "cpe:/o:linux:linux_kernel:3.2.2", "cpe:/o:linux:linux_kernel:3.10.8", "cpe:/o:linux:linux_kernel:3.7.6", "cpe:/o:linux:linux_kernel:3.11.2", "cpe:/o:linux:linux_kernel:3.5.6", "cpe:/o:linux:linux_kernel:3.4.22", "cpe:/o:linux:linux_kernel:3.9.9", "cpe:/o:linux:linux_kernel:3.0.18", "cpe:/o:linux:linux_kernel:3.4.26", "cpe:/o:linux:linux_kernel:3.0.19", "cpe:/o:linux:linux_kernel:3.1.5", "cpe:/o:linux:linux_kernel:3.0.26", "cpe:/o:linux:linux_kernel:3.8.1", "cpe:/o:linux:linux_kernel:3.4", "cpe:/o:linux:linux_kernel:3.4.17", "cpe:/o:linux:linux_kernel:3.10.16", "cpe:/o:linux:linux_kernel:3.6.9", "cpe:/o:linux:linux_kernel:3.0.68", "cpe:/o:linux:linux_kernel:3.8.7", "cpe:/o:linux:linux_kernel:3.0.37", "cpe:/o:linux:linux_kernel:3.0.34", "cpe:/o:linux:linux_kernel:3.10.1", "cpe:/o:linux:linux_kernel:3.0", "cpe:/o:linux:linux_kernel:3.0.32", "cpe:/o:linux:linux_kernel:3.7.10", "cpe:/o:linux:linux_kernel:3.3.8", "cpe:/o:linux:linux_kernel:3.0.16", "cpe:/o:linux:linux_kernel:3.0.38", "cpe:/o:linux:linux_kernel:3.2.4", "cpe:/o:linux:linux_kernel:3.4.29", "cpe:/o:linux:linux_kernel:3.4.15", "cpe:/o:linux:linux_kernel:3.2.15", "cpe:/o:linux:linux_kernel:3.1.9", "cpe:/o:linux:linux_kernel:3.4.18", "cpe:/o:linux:linux_kernel:3.2.20", "cpe:/o:linux:linux_kernel:3.8.8", "cpe:/o:linux:linux_kernel:3.2.12", "cpe:/o:linux:linux_kernel:3.2.21", "cpe:/o:linux:linux_kernel:3.10.5", "cpe:/o:linux:linux_kernel:3.0.2", "cpe:/o:linux:linux_kernel:3.4.8", "cpe:/o:linux:linux_kernel:3.2.11", "cpe:/o:linux:linux_kernel:3.5.7", "cpe:/o:linux:linux_kernel:3.2.22", "cpe:/o:linux:linux_kernel:3.0.53", "cpe:/o:linux:linux_kernel:3.0.4", "cpe:/o:linux:linux_kernel:3.0.42", "cpe:/o:linux:linux_kernel:3.9.6", "cpe:/o:linux:linux_kernel:3.0.21", "cpe:/o:linux:linux_kernel:3.2.9", "cpe:/o:linux:linux_kernel:3.9.2", "cpe:/o:linux:linux_kernel:3.9.0", "cpe:/o:linux:linux_kernel:3.9.8", "cpe:/o:linux:linux_kernel:3.4.28", "cpe:/o:linux:linux_kernel:3.6.7", "cpe:/o:linux:linux_kernel:3.0.29", "cpe:/o:linux:linux_kernel:3.2", "cpe:/o:linux:linux_kernel:3.4.7", "cpe:/o:linux:linux_kernel:3.5.4", "cpe:/o:linux:linux_kernel:3.8.0", "cpe:/o:linux:linux_kernel:3.4.25", "cpe:/o:linux:linux_kernel:3.3.5", "cpe:/o:linux:linux_kernel:3.5.3", "cpe:/o:linux:linux_kernel:3.4.14", "cpe:/o:linux:linux_kernel:3.0.43", "cpe:/o:linux:linux_kernel:3.0.11", "cpe:/o:linux:linux_kernel:3.7.4", "cpe:/o:linux:linux_kernel:3.5.2", "cpe:/o:linux:linux_kernel:3.10.13", "cpe:/o:linux:linux_kernel:3.0.35", "cpe:/o:linux:linux_kernel:3.4.16", "cpe:/o:linux:linux_kernel:3.0.52", "cpe:/o:linux:linux_kernel:3.0.51", "cpe:/o:linux:linux_kernel:3.8.6", "cpe:/o:linux:linux_kernel:3.0.48", "cpe:/o:linux:linux_kernel:3.0.54", "cpe:/o:linux:linux_kernel:3.11.5", "cpe:/o:linux:linux_kernel:3.7.9", "cpe:/o:linux:linux_kernel:3.9.4", "cpe:/o:linux:linux_kernel:3.1", "cpe:/o:linux:linux_kernel:3.6.11", "cpe:/o:linux:linux_kernel:3.4.12", "cpe:/o:linux:linux_kernel:3.9.7", "cpe:/o:linux:linux_kernel:3.10.11", "cpe:/o:linux:linux_kernel:3.4.31", "cpe:/o:linux:linux_kernel:3.1.6", "cpe:/o:linux:linux_kernel:3.0.22", "cpe:/o:linux:linux_kernel:3.0.24", "cpe:/o:linux:linux_kernel:3.10.15", "cpe:/o:linux:linux_kernel:3.7.1", "cpe:/o:linux:linux_kernel:3.6.4", "cpe:/o:linux:linux_kernel:3.1.8", "cpe:/o:linux:linux_kernel:3.9.10", "cpe:/o:linux:linux_kernel:3.1.2", "cpe:/o:linux:linux_kernel:3.3.1", "cpe:/o:linux:linux_kernel:3.6.2", "cpe:/o:linux:linux_kernel:3.2.26", "cpe:/o:linux:linux_kernel:3.6.8", "cpe:/o:linux:linux_kernel:3.8.2", "cpe:/o:linux:linux_kernel:3.4.5", "cpe:/o:linux:linux_kernel:3.10.2", "cpe:/o:linux:linux_kernel:3.4.1", "cpe:/o:linux:linux_kernel:3.2.10", "cpe:/o:linux:linux_kernel:3.11.1", "cpe:/o:linux:linux_kernel:3.8.11", "cpe:/o:linux:linux_kernel:3.4.11"], "id": "CVE-2014-3645", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3645", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.31:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.30:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.29:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.32:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.11.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.8.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:14:29", "description": "Race condition in the __kvm_migrate_pit_timer function in arch/x86/kvm/i8254.c in the KVM subsystem in the Linux kernel through 3.17.2 allows guest OS users to cause a denial of service (host OS crash) by leveraging incorrect PIT emulation.", "edition": 7, "cvss3": {"exploitabilityScore": 1.0, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 4.7, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2014-11-10T11:55:00", "title": "CVE-2014-3611", "type": "cve", "cwe": ["CWE-362"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 4.7, "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-3611"], "modified": "2020-08-12T17:50:00", "cpe": ["cpe:/o:redhat:enterprise_linux:5.0", "cpe:/o:canonical:ubuntu_linux:12.04", "cpe:/o:canonical:ubuntu_linux:10.04", "cpe:/o:linux:linux_kernel:3.17.2", "cpe:/o:debian:debian_linux:7.0"], "id": "CVE-2014-3611", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3611", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.17.2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"]}, {"lastseen": "2021-02-02T06:14:29", "description": "Multiple buffer overflows in the command_port_read_callback function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in the Linux kernel before 3.16.2 allow physically proximate attackers to execute arbitrary code or cause a denial of service (memory corruption and system crash) via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with a bulk response.", "edition": 6, "cvss3": {}, "published": "2014-09-28T10:55:00", "title": "CVE-2014-3185", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.9, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-3185"], "modified": "2015-05-12T02:00:00", "cpe": ["cpe:/o:linux:linux_kernel:3.16.0", "cpe:/o:linux:linux_kernel:3.16.1"], "id": "CVE-2014-3185", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3185", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:3.16.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.16.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:14:29", "description": "arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.", "edition": 7, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 5.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 3.6}, "published": "2014-11-10T11:55:00", "title": "CVE-2014-3646", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 4.7, "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-3646"], "modified": "2020-08-13T19:34:00", "cpe": ["cpe:/o:redhat:enterprise_linux:5.0", "cpe:/o:canonical:ubuntu_linux:12.04", "cpe:/o:linux:linux_kernel:3.17.2", "cpe:/o:opensuse:evergreen:11.4", "cpe:/o:debian:debian_linux:7.0", "cpe:/o:suse:suse_linux_enterprise_server:11"], "id": "CVE-2014-3646", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3646", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.17.2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2019-05-29T18:35:57", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3646", "CVE-2014-3611", "CVE-2014-3645", "CVE-2014-3185"], "description": "Oracle Linux Local Security Checks ELSA-2014-1843", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310123254", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123254", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2014-1843", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2014-1843.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123254\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:01:20 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2014-1843\");\n script_tag(name:\"insight\", value:\"ELSA-2014-1843 - kernel security and bug fix update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2014-1843\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2014-1843.html\");\n script_cve_id(\"CVE-2014-3611\", \"CVE-2014-3645\", \"CVE-2014-3646\", \"CVE-2014-3185\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux6\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.32~504.1.3.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-abi-whitelists\", rpm:\"kernel-abi-whitelists~2.6.32~504.1.3.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.32~504.1.3.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.32~504.1.3.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.32~504.1.3.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.32~504.1.3.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-firmware\", rpm:\"kernel-firmware~2.6.32~504.1.3.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.32~504.1.3.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~2.6.32~504.1.3.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~2.6.32~504.1.3.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:17", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3646", "CVE-2014-3611", "CVE-2014-3645", "CVE-2014-3185"], "description": "Check the version of kernel", "modified": "2019-03-08T00:00:00", "published": "2014-11-12T00:00:00", "id": "OPENVAS:1361412562310882079", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310882079", "type": "openvas", "title": "CentOS Update for kernel CESA-2014:1843 centos6", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for kernel CESA-2014:1843 centos6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.882079\");\n script_version(\"$Revision: 14058 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-08 14:25:52 +0100 (Fri, 08 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-11-12 06:24:22 +0100 (Wed, 12 Nov 2014)\");\n script_cve_id(\"CVE-2014-3185\", \"CVE-2014-3611\", \"CVE-2014-3645\", \"CVE-2014-3646\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"CentOS Update for kernel CESA-2014:1843 centos6\");\n\n script_tag(name:\"summary\", value:\"Check the version of kernel\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The kernel packages contain the Linux kernel,\nthe core of any Linux operating system.\n\n * A race condition flaw was found in the way the Linux kernel's KVM\nsubsystem handled PIT (Programmable Interval Timer) emulation. A guest user\nwho has access to the PIT I/O ports could use this flaw to crash the host.\n(CVE-2014-3611, Important)\n\n * A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB Request\nBlocks buffers. An attacker with physical access to the system could use\nthis flaw to crash the system or, potentially, escalate their privileges on\nthe system. (CVE-2014-3185, Moderate)\n\n * It was found that the Linux kernel's KVM subsystem did not handle the VM\nexits gracefully for the invept (Invalidate Translations Derived from EPT)\nand invvpid (Invalidate Translations Based on VPID) instructions. On hosts\nwith an Intel processor and invept/invppid VM exit support, an unprivileged\nguest user could use these instructions to crash the guest. (CVE-2014-3645,\nCVE-2014-3646, Moderate)\n\nRed Hat would like to thank Lars Bull of Google for reporting\nCVE-2014-3611, and the Advanced Threat Research team at Intel Security for\nreporting CVE-2014-3645 and CVE-2014-3646.\n\nThis update also fixes the following bugs:\n\n * This update fixes several race conditions between PCI error recovery\ncallbacks and potential calls of the ifup and ifdown commands in the tg3\ndriver. When triggered, these race conditions could cause a kernel crash.\n(BZ#1142570)\n\n * Previously, GFS2 failed to unmount a sub-mounted GFS2 file system if its\nparent was also a GFS2 file system. This problem has been fixed by adding\nthe appropriate d_op- d_hash() routine call for the last component of the\nmount point path in the path name lookup mechanism code (namei).\n(BZ#1145193)\n\n * Due to previous changes in the virtio-net driver, a Red Hat Enterprise\nLinux 6.6 guest was unable to boot with the 'mgr_rxbuf=off' option\nspecified. This was caused by providing the page_to_skb() function with an\nincorrect packet length in the driver's Rx path. This problem has been\nfixed and the guest in the described scenario can now boot successfully.\n(BZ#1148693)\n\n * When using one of the newer IPSec Authentication Header (AH) algorithms\nwith Openswan, a kernel panic could occur. This happened because the\nmaximum truncated ICV length was too small. To fix this problem, the\nMAX_AH_AUTH_LEN parameter has been set to 64. (BZ#1149083)\n\n * A bug in the IPMI driver caused the kernel to panic when an IPMI\ninterface was removed using the hotmod script. The IPMI driver has been\nfixed to properly clean the relev ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"affected\", value:\"kernel on CentOS 6\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"CESA\", value:\"2014:1843\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2014-November/020748.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS6\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.32~504.1.3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-abi-whitelists\", rpm:\"kernel-abi-whitelists~2.6.32~504.1.3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.32~504.1.3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.32~504.1.3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.32~504.1.3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.32~504.1.3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-firmware\", rpm:\"kernel-firmware~2.6.32~504.1.3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.32~504.1.3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~2.6.32~504.1.3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~2.6.32~504.1.3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:18", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3646", "CVE-2014-3611", "CVE-2014-3181", "CVE-2014-3645", "CVE-2014-3185"], "description": "Oracle Linux Local Security Checks ELSA-2014-3084", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310123265", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123265", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2014-3084", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2014-3084.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123265\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:01:28 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2014-3084\");\n script_tag(name:\"insight\", value:\"ELSA-2014-3084 - Unbreakable Enterprise kernel Security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2014-3084\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2014-3084.html\");\n script_cve_id(\"CVE-2014-3611\", \"CVE-2014-3645\", \"CVE-2014-3646\", \"CVE-2014-3185\", \"CVE-2014-3181\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux(7|6)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux7\")\n{\n if ((res = isrpmvuln(pkg:\"dtrace-modules\", rpm:\"dtrace-modules~3.8.13~44.1.4.el7uek~0.4.3~4.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek\", rpm:\"kernel-uek~3.8.13~44.1.4.el7uek\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug\", rpm:\"kernel-uek-debug~3.8.13~44.1.4.el7uek\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug-devel\", rpm:\"kernel-uek-debug-devel~3.8.13~44.1.4.el7uek\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-devel\", rpm:\"kernel-uek-devel~3.8.13~44.1.4.el7uek\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-doc\", rpm:\"kernel-uek-doc~3.8.13~44.1.4.el7uek\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-firmware\", rpm:\"kernel-uek-firmware~3.8.13~44.1.4.el7uek\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"dtrace-modules\", rpm:\"dtrace-modules~3.8.13~44.1.4.el6uek~0.4.3~4.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek\", rpm:\"kernel-uek~3.8.13~44.1.4.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug\", rpm:\"kernel-uek-debug~3.8.13~44.1.4.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug-devel\", rpm:\"kernel-uek-debug-devel~3.8.13~44.1.4.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-devel\", rpm:\"kernel-uek-devel~3.8.13~44.1.4.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-doc\", rpm:\"kernel-uek-doc~3.8.13~44.1.4.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-firmware\", rpm:\"kernel-uek-firmware~3.8.13~44.1.4.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-14T16:18:11", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3646", "CVE-2014-5077", "CVE-2014-3611", "CVE-2014-4653", "CVE-2014-3645"], "description": "Check the version of kernel", "modified": "2019-03-08T00:00:00", "published": "2014-10-29T00:00:00", "id": "OPENVAS:1361412562310882069", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310882069", "type": "openvas", "title": "CentOS Update for kernel CESA-2014:1724 centos7", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for kernel CESA-2014:1724 centos7\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.882069\");\n script_version(\"$Revision: 14058 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-08 14:25:52 +0100 (Fri, 08 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-10-29 05:53:36 +0100 (Wed, 29 Oct 2014)\");\n script_cve_id(\"CVE-2014-3611\", \"CVE-2014-3645\", \"CVE-2014-3646\", \"CVE-2014-4653\",\n \"CVE-2014-5077\");\n script_tag(name:\"cvss_base\", value:\"6.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:N/A:C\");\n script_name(\"CentOS Update for kernel CESA-2014:1724 centos7\");\n\n script_tag(name:\"summary\", value:\"Check the version of kernel\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The kernel packages contain the Linux\nkernel, the core of any Linux operating system.\n\nSecurity fixes:\n\n * A race condition flaw was found in the way the Linux kernel's KVM\nsubsystem handled PIT (Programmable Interval Timer) emulation. A guest user\nwho has access to the PIT I/O ports could use this flaw to crash the host.\n(CVE-2014-3611, Important)\n\n * A NULL pointer dereference flaw was found in the way the Linux kernel's\nStream Control Transmission Protocol (SCTP) implementation handled\nsimultaneous connections between the same hosts. A remote attacker could\nuse this flaw to crash the system. (CVE-2014-5077, Important)\n\n * It was found that the Linux kernel's KVM subsystem did not handle the VM\nexits gracefully for the invept (Invalidate Translations Derived from EPT)\nand invvpid (Invalidate Translations Based on VPID) instructions. On hosts\nwith an Intel processor and invept/invppid VM exit support, an unprivileged\nguest user could use these instructions to crash the guest. (CVE-2014-3645,\nCVE-2014-3646, Moderate)\n\n * A use-after-free flaw was found in the way the Linux kernel's Advanced\nLinux Sound Architecture (ALSA) implementation handled user controls. A\nlocal, privileged user could use this flaw to crash the system.\n(CVE-2014-4653, Moderate)\n\nRed Hat would like to thank Lars Bull of Google for reporting\nCVE-2014-3611, and the Advanced Threat Research team at Intel Security for\nreporting CVE-2014-3645 and CVE-2014-3646.\n\nBug fixes:\n\n * A known issue that could prevent Chelsio adapters using the cxgb4 driver\nfrom being initialized on IBM POWER8 systems has been fixed. These\nadapters can now be used on IBM POWER8 systems as expected. (BZ#1130548)\n\n * When bringing a hot-added CPU online, the kernel did not initialize a\nCPU mask properly, which could result in a kernel panic. This update\ncorrects the bug by ensuring that the CPU mask is properly initialized and\nthe correct NUMA node selected. (BZ#1134715)\n\n * The kernel could fail to bring a CPU online if the hardware supported\nboth, the acpi-cpufreq and intel_pstate modules. This update ensures that\nthe acpi-cpufreq module is not loaded in the intel_pstate module is\nloaded. (BZ#1134716)\n\n * Due to a bug in the time accounting of the kernel scheduler, a divide\nerror could occur when hot adding a CPU. To fix this problem, the kernel\nscheduler time accounting has been reworked. (BZ#1134717)\n\n * The kernel did not handle exceptions caused by an invalid floating point\ncontrol (FPC) register, resulting in a kernel oops. This problem has been\nfixed by placing the label to handle these exceptions to the correct place\nin the code. (BZ#1138733)\n\n * A previous ch ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"affected\", value:\"kernel on CentOS 7\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"CESA\", value:\"2014:1724\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2014-October/020710.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS7\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS7\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~3.10.0~123.9.2.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-abi-whitelists\", rpm:\"kernel-abi-whitelists~3.10.0~123.9.2.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~3.10.0~123.9.2.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~3.10.0~123.9.2.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~3.10.0~123.9.2.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~3.10.0~123.9.2.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~3.10.0~123.9.2.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~3.10.0~123.9.2.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~3.10.0~123.9.2.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-tools-libs-devel\", rpm:\"kernel-tools-libs-devel~3.10.0~123.9.2.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~3.10.0~123.9.2.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~3.10.0~123.9.2.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-08-14T16:17:39", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3646", "CVE-2014-5077", "CVE-2014-3611", "CVE-2014-4653", "CVE-2014-3645"], "description": "The remote host is missing an update for the ", "modified": "2018-11-23T00:00:00", "published": "2014-10-29T00:00:00", "id": "OPENVAS:1361412562310871280", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310871280", "type": "openvas", "title": "RedHat Update for kernel RHSA-2014:1724-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for kernel RHSA-2014:1724-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.871280\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2014-10-29 05:53:10 +0100 (Wed, 29 Oct 2014)\");\n script_cve_id(\"CVE-2014-3611\", \"CVE-2014-3645\", \"CVE-2014-3646\", \"CVE-2014-4653\", \"CVE-2014-5077\");\n script_tag(name:\"cvss_base\", value:\"6.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:N/A:C\");\n script_name(\"RedHat Update for kernel RHSA-2014:1724-01\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n * A race condition flaw was found in the way the Linux kernel's KVM\nsubsystem handled PIT (Programmable Interval Timer) emulation. A guest user\nwho has access to the PIT I/O ports could use this flaw to crash the host.\n(CVE-2014-3611, Important)\n\n * A NULL pointer dereference flaw was found in the way the Linux kernel's\nStream Control Transmission Protocol (SCTP) implementation handled\nsimultaneous connections between the same hosts. A remote attacker could\nuse this flaw to crash the system. (CVE-2014-5077, Important)\n\n * It was found that the Linux kernel's KVM subsystem did not handle the VM\nexits gracefully for the invept (Invalidate Translations Derived from EPT)\nand invvpid (Invalidate Translations Based on VPID) instructions. On hosts\nwith an Intel processor and invept/invppid VM exit support, an unprivileged\nguest user could use these instructions to crash the guest. (CVE-2014-3645,\nCVE-2014-3646, Moderate)\n\n * A use-after-free flaw was found in the way the Linux kernel's Advanced\nLinux Sound Architecture (ALSA) implementation handled user controls. A\nlocal, privileged user could use this flaw to crash the system.\n(CVE-2014-4653, Moderate)\n\nRed Hat would like to thank Lars Bull of Google for reporting\nCVE-2014-3611, and the Advanced Threat Research team at Intel Security for\nreporting CVE-2014-3645 and CVE-2014-3646.\n\nBug fixes:\n\n * A known issue that could prevent Chelsio adapters using the cxgb4 driver\nfrom being initialized on IBM POWER8 systems has been fixed. These\nadapters can now be used on IBM POWER8 systems as expected. (BZ#1130548)\n\n * When bringing a hot-added CPU online, the kernel did not initialize a\nCPU mask properly, which could result in a kernel panic. This update\ncorrects the bug by ensuring that the CPU mask is properly initialized and\nthe correct NUMA node selected. (BZ#1134715)\n\n * The kernel could fail to bring a CPU online if the hardware supported\nboth, the acpi-cpufreq and intel_pstate modules. This update ensures that\nthe acpi-cpufreq module is not loaded in the intel_pstate module is\nloaded. (BZ#1134716)\n\n * Due to a bug in the time accounting of the kernel scheduler, a divide\nerror could occur when hot adding a CPU. To fix this problem, the kernel\nscheduler time accounting has been reworked. (BZ#1134717)\n\n * The kernel did not handle exceptions caused by an invalid floating point\ncontrol (FPC) register, resulting in a kernel oops. This problem has been\nfixed by placing the label to handle these exceptions to the correct place\nin the code. ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"affected\", value:\"kernel on Red Hat Enterprise Linux Server (v. 7)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"RHSA\", value:\"2014:1724-01\");\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2014-October/msg00050.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_7\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_7\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel-abi-whitelists\", rpm:\"kernel-abi-whitelists~3.10.0~123.9.2.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~3.10.0~123.9.2.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~3.10.0~123.9.2.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~3.10.0~123.9.2.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~3.10.0~123.9.2.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~3.10.0~123.9.2.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo-common-x86_64\", rpm:\"kernel-debuginfo-common-x86_64~3.10.0~123.9.2.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~3.10.0~123.9.2.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~3.10.0~123.9.2.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~3.10.0~123.9.2.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-tools-debuginfo\", rpm:\"kernel-tools-debuginfo~3.10.0~123.9.2.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~3.10.0~123.9.2.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~3.10.0~123.9.2.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perf-debuginfo\", rpm:\"perf-debuginfo~3.10.0~123.9.2.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-perf-debuginfo\", rpm:\"python-perf-debuginfo~3.10.0~123.9.2.el7\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-08-14T16:16:39", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3646", "CVE-2014-5077", "CVE-2014-3611", "CVE-2014-4653", "CVE-2014-3645"], "description": "Oracle Linux Local Security Checks ELSA-2014-1724", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310123267", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123267", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2014-1724", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2014-1724.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123267\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:01:30 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2014-1724\");\n script_tag(name:\"insight\", value:\"ELSA-2014-1724 - kernel security and bug fix update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2014-1724\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2014-1724.html\");\n script_cve_id(\"CVE-2014-4653\", \"CVE-2014-5077\", \"CVE-2014-3611\", \"CVE-2014-3645\", \"CVE-2014-3646\");\n script_tag(name:\"cvss_base\", value:\"6.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux7\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux7\")\n{\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~3.10.0~123.9.2.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-abi-whitelists\", rpm:\"kernel-abi-whitelists~3.10.0~123.9.2.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~3.10.0~123.9.2.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~3.10.0~123.9.2.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~3.10.0~123.9.2.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~3.10.0~123.9.2.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~3.10.0~123.9.2.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~3.10.0~123.9.2.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~3.10.0~123.9.2.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-tools-libs-devel\", rpm:\"kernel-tools-libs-devel~3.10.0~123.9.2.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~3.10.0~123.9.2.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~3.10.0~123.9.2.el7\", rls:\"OracleLinux7\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:36:19", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3611", "CVE-2014-3181", "CVE-2014-3185"], "description": "Oracle Linux Local Security Checks ELSA-2014-3085", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310123266", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123266", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2014-3085", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2014-3085.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123266\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:01:29 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2014-3085\");\n script_tag(name:\"insight\", value:\"ELSA-2014-3085 - Unbreakable Enterprise kernel Security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2014-3085\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2014-3085.html\");\n script_cve_id(\"CVE-2014-3611\", \"CVE-2014-3185\", \"CVE-2014-3181\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux(5|6)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"kernel-uek\", rpm:\"kernel-uek~2.6.39~400.215.12.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug\", rpm:\"kernel-uek-debug~2.6.39~400.215.12.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug-devel\", rpm:\"kernel-uek-debug-devel~2.6.39~400.215.12.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-devel\", rpm:\"kernel-uek-devel~2.6.39~400.215.12.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-doc\", rpm:\"kernel-uek-doc~2.6.39~400.215.12.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-firmware\", rpm:\"kernel-uek-firmware~2.6.39~400.215.12.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"kernel-uek\", rpm:\"kernel-uek~2.6.39~400.215.12.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug\", rpm:\"kernel-uek-debug~2.6.39~400.215.12.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug-devel\", rpm:\"kernel-uek-debug-devel~2.6.39~400.215.12.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-devel\", rpm:\"kernel-uek-devel~2.6.39~400.215.12.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-doc\", rpm:\"kernel-uek-doc~2.6.39~400.215.12.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-firmware\", rpm:\"kernel-uek-firmware~2.6.39~400.215.12.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3611", "CVE-2014-3181", "CVE-2014-3185", "CVE-2014-3535"], "description": "Oracle Linux Local Security Checks ELSA-2014-3086", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310123261", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123261", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2014-3086", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2014-3086.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123261\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:01:25 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2014-3086\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2014-3086\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2014-3086.html\");\n script_cve_id(\"CVE-2014-3611\", \"CVE-2014-3185\", \"CVE-2014-3181\", \"CVE-2014-3535\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux(5|6)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"kernel-uek\", rpm:\"kernel-uek~2.6.32~400.36.10.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug\", rpm:\"kernel-uek-debug~2.6.32~400.36.10.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug-devel\", rpm:\"kernel-uek-debug-devel~2.6.32~400.36.10.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-devel\", rpm:\"kernel-uek-devel~2.6.32~400.36.10.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-doc\", rpm:\"kernel-uek-doc~2.6.32~400.36.10.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-firmware\", rpm:\"kernel-uek-firmware~2.6.32~400.36.10.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-headers\", rpm:\"kernel-uek-headers~2.6.32~400.36.10.el5uek\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mlnx_en\", rpm:\"mlnx_en~2.6.32~400.36.10.el5uek~1.5.7~2\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mlnx_en\", rpm:\"mlnx_en~2.6.32~400.36.10.el5uekdebug~1.5.7~2\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ofa\", rpm:\"ofa~2.6.32~400.36.10.el5uek~1.5.1~4.0.58\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ofa\", rpm:\"ofa~2.6.32~400.36.10.el5uekdebug~1.5.1~4.0.58\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"kernel-uek\", rpm:\"kernel-uek~2.6.32~400.36.10.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug\", rpm:\"kernel-uek-debug~2.6.32~400.36.10.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-debug-devel\", rpm:\"kernel-uek-debug-devel~2.6.32~400.36.10.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-devel\", rpm:\"kernel-uek-devel~2.6.32~400.36.10.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-doc\", rpm:\"kernel-uek-doc~2.6.32~400.36.10.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-firmware\", rpm:\"kernel-uek-firmware~2.6.32~400.36.10.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-uek-headers\", rpm:\"kernel-uek-headers~2.6.32~400.36.10.el6uek\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mlnx_en\", rpm:\"mlnx_en~2.6.32~400.36.10.el6uek~1.5.7~0.1\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"mlnx_en\", rpm:\"mlnx_en~2.6.32~400.36.10.el6uekdebug~1.5.7~0.1\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ofa\", rpm:\"ofa~2.6.32~400.36.10.el6uek~1.5.1~4.0.58\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ofa\", rpm:\"ofa~2.6.32~400.36.10.el6uekdebug~1.5.1~4.0.58\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:37:18", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3646", "CVE-2014-3611", "CVE-2014-3647", "CVE-2014-3610"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2014-11-11T00:00:00", "id": "OPENVAS:1361412562310842022", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842022", "type": "openvas", "title": "Ubuntu Update for linux USN-2396-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_2396_1.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for linux USN-2396-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842022\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-11-11 06:22:35 +0100 (Tue, 11 Nov 2014)\");\n script_cve_id(\"CVE-2014-3647\", \"CVE-2014-3646\", \"CVE-2014-3611\", \"CVE-2014-3610\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_name(\"Ubuntu Update for linux USN-2396-1\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the referenced advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Nadav Amit reported that the KVM (Kernel\nVirtual Machine) mishandles noncanonical addresses when emulating instructions\nthat change the rip (Instruction Pointer). A guest user with access to I/O or the\nMMIO can use this flaw to cause a denial of service (system crash) of the guest.\n(CVE-2014-3647)\n\nA flaw was discovered with the handling of the invept instruction in the\nKVM (Kernel Virtual Machine) subsystem of the Linux kernel. An unprivileged\nguest user could exploit this flaw to cause a denial of service (system\ncrash) on the guest. (CVE-2014-3646)\n\nLars Bull reported a race condition in the PIT (programmable interrupt\ntimer) emulation in the KVM (Kernel Virtual Machine) subsystem of the Linux\nkernel. A local guest user with access to PIT i/o ports could exploit this\nflaw to cause a denial of service (crash) on the host. (CVE-2014-3611)\n\nLars Bull and Nadav Amit reported a flaw in how KVM (the Kernel Virtual\nMachine) handles noncanonical writes to certain MSR registers. A privileged\nguest user can exploit this flaw to cause a denial of service (kernel\npanic) on the host. (CVE-2014-3610)\");\n script_tag(name:\"affected\", value:\"linux on Ubuntu 14.10\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"USN\", value:\"2396-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2396-1/\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU14\\.10\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-24-generic\", ver:\"3.16.0-24.32\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-24-generic-lpae\", ver:\"3.16.0-24.32\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-24-lowlatency\", ver:\"3.16.0-24.32\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-24-powerpc-e500mc\", ver:\"3.16.0-24.32\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-24-powerpc-smp\", ver:\"3.16.0-24.32\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-24-powerpc64-emb\", ver:\"3.16.0-24.32\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-24-powerpc64-smp\", ver:\"3.16.0-24.32\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:37:34", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3646", "CVE-2014-3673", "CVE-2014-3688", "CVE-2014-3611", "CVE-2014-3647", "CVE-2014-3610", "CVE-2014-3645", "CVE-2014-7207", "CVE-2014-3690", "CVE-2014-3687"], "description": "Several vulnerabilities have been discovered in the Linux kernel that\nmay lead to a denial of service:\n\nCVE-2014-3610\nLars Bull of Google and Nadav Amit reported a flaw in how KVM\nhandles noncanonical writes to certain MSR registers. A privileged\nguest user can exploit this flaw to cause a denial of service\n(kernel panic) on the host.\n\nCVE-2014-3611\nLars Bull of Google reported a race condition in in the PIT\nemulation code in KVM. A local guest user with access to PIT i/o\nports could exploit this flaw to cause a denial of service (crash)\non the host.\n\nCVE-2014-3645 / CVE-2014-3646\nThe Advanced Threat Research team at Intel Security discovered\nthat the KVM subsystem did not handle the VM exits gracefully\nfor the invept (Invalidate Translations Derived from EPT) and\ninvvpid (Invalidate Translations Based on VPID) instructions. On\nhosts with an Intel processor and invept/invppid VM exit\nsupport, an unprivileged guest user could use these instructions\nto crash the guest.\n\nCVE-2014-3647\nNadav Amit reported that KVM mishandles noncanonical addresses when\nemulating instructions that change rip, potentially causing a failed\nVM-entry. A guest user with access to I/O or the MMIO can use this\nflaw to cause a denial of service (system crash) of the guest.\n\nCVE-2014-3673\nLiu Wei of Red Hat discovered a flaw in net/core/skbuff.c leading to\na kernel panic when receiving malformed ASCONF chunks. A remote\nattacker could use this flaw to crash the system.\n\nCVE-2014-3687\nA flaw in the sctp stack was discovered leading to a kernel panic\nwhen receiving duplicate ASCONF chunks. A remote attacker could use\nthis flaw to crash the system.\n\nCVE-2014-3688\nIt was found that the sctp stack is prone to a remotely triggerable\nmemory pressure issue caused by excessive queueing. A remote\nattacker could use this flaw to cause denial-of-service conditions\non the system.\n\nCVE-2014-3690\nAndy Lutomirski discovered that incorrect register handling in KVM\nmay lead to denial of service.\n\nCVE-2014-7207\nSeveral Debian developers reported an issue in the IPv6 networking\nsubsystem. A local user with access to tun or macvtap devices, or a\nvirtual machine connected to such a device, can cause a denial of\nservice (system crash).\n\nThis update includes a bug fix related to CVE-2014-7207\nthat disables\nUFO (UDP Fragmentation Offload) in the macvtap, tun, and virtio_net\ndrivers. This will cause migration of a running VM from a host running\nan earlier kernel version to a host running this kernel version to fail,\nif the VM has been assigned a virtio network device. In order to migrate\nsuch a VM, it must be shut down first.", "modified": "2019-03-19T00:00:00", "published": "2014-10-31T00:00:00", "id": "OPENVAS:1361412562310703060", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703060", "type": "openvas", "title": "Debian Security Advisory DSA 3060-1 (linux - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3060.nasl 14302 2019-03-19 08:28:48Z cfischer $\n# Auto-generated from advisory DSA 3060-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703060\");\n script_version(\"$Revision: 14302 $\");\n script_cve_id(\"CVE-2014-3610\", \"CVE-2014-3611\", \"CVE-2014-3645\", \"CVE-2014-3646\", \"CVE-2014-3647\", \"CVE-2014-3673\", \"CVE-2014-3687\", \"CVE-2014-3688\", \"CVE-2014-3690\", \"CVE-2014-7207\");\n script_name(\"Debian Security Advisory DSA 3060-1 (linux - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-19 09:28:48 +0100 (Tue, 19 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-10-31 00:00:00 +0100 (Fri, 31 Oct 2014)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2014/dsa-3060.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB7\");\n script_tag(name:\"affected\", value:\"linux on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (wheezy), these problems have been fixed in\nversion 3.2.63-2+deb7u1.\n\nWe recommend that you upgrade your linux packages.\");\n script_tag(name:\"summary\", value:\"Several vulnerabilities have been discovered in the Linux kernel that\nmay lead to a denial of service:\n\nCVE-2014-3610\nLars Bull of Google and Nadav Amit reported a flaw in how KVM\nhandles noncanonical writes to certain MSR registers. A privileged\nguest user can exploit this flaw to cause a denial of service\n(kernel panic) on the host.\n\nCVE-2014-3611\nLars Bull of Google reported a race condition in in the PIT\nemulation code in KVM. A local guest user with access to PIT i/o\nports could exploit this flaw to cause a denial of service (crash)\non the host.\n\nCVE-2014-3645 / CVE-2014-3646\nThe Advanced Threat Research team at Intel Security discovered\nthat the KVM subsystem did not handle the VM exits gracefully\nfor the invept (Invalidate Translations Derived from EPT) and\ninvvpid (Invalidate Translations Based on VPID) instructions. On\nhosts with an Intel processor and invept/invppid VM exit\nsupport, an unprivileged guest user could use these instructions\nto crash the guest.\n\nCVE-2014-3647\nNadav Amit reported that KVM mishandles noncanonical addresses when\nemulating instructions that change rip, potentially causing a failed\nVM-entry. A guest user with access to I/O or the MMIO can use this\nflaw to cause a denial of service (system crash) of the guest.\n\nCVE-2014-3673\nLiu Wei of Red Hat discovered a flaw in net/core/skbuff.c leading to\na kernel panic when receiving malformed ASCONF chunks. A remote\nattacker could use this flaw to crash the system.\n\nCVE-2014-3687\nA flaw in the sctp stack was discovered leading to a kernel panic\nwhen receiving duplicate ASCONF chunks. A remote attacker could use\nthis flaw to crash the system.\n\nCVE-2014-3688\nIt was found that the sctp stack is prone to a remotely triggerable\nmemory pressure issue caused by excessive queueing. A remote\nattacker could use this flaw to cause denial-of-service conditions\non the system.\n\nCVE-2014-3690\nAndy Lutomirski discovered that incorrect register handling in KVM\nmay lead to denial of service.\n\nCVE-2014-7207\nSeveral Debian developers reported an issue in the IPv6 networking\nsubsystem. A local user with access to tun or macvtap devices, or a\nvirtual machine connected to such a device, can cause a denial of\nservice (system crash).\n\nThis update includes a bug fix related to CVE-2014-7207\nthat disables\nUFO (UDP Fragmentation Offload) in the macvtap, tun, and virtio_net\ndrivers. This will cause migration of a running VM from a host running\nan earlier kernel version to a host running this kernel version to fail,\nif the VM has been assigned a virtio network device. In order to migrate\nsuch a VM, it must be shut down first.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"acpi-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"acpi-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"acpi-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"affs-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"affs-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ata-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ata-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ata-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ata-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ata-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ata-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ata-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ata-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ata-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"btrfs-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"btrfs-modules-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"btrfs-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"btrfs-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"btrfs-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"btrfs-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"btrfs-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"btrfs-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"btrfs-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"btrfs-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"btrfs-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"btrfs-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"btrfs-modules-3.2.0-4-r4k-ip22-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"btrfs-modules-3.2.0-4-r5k-cobalt-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"btrfs-modules-3.2.0-4-r5k-ip32-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"btrfs-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"btrfs-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"btrfs-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"btrfs-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cdrom-core-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cdrom-core-modules-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cdrom-core-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cdrom-core-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cdrom-core-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cdrom-core-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cdrom-core-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cdrom-core-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cdrom-core-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cdrom-core-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cdrom-core-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cdrom-core-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cdrom-core-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cdrom-core-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"core-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"core-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"core-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"core-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"core-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"core-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"core-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"core-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"core-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"core-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"core-modules-3.2.0-4-s390x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"core-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"core-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"core-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crc-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crc-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crc-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crc-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crc-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crc-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crc-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crc-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crc-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crc-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crc-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crc-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-dm-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-dm-modules-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-dm-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-dm-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-dm-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-dm-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-dm-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-dm-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-dm-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-dm-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-dm-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-dm-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-dm-modules-3.2.0-4-r4k-ip22-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-dm-modules-3.2.0-4-r5k-cobalt-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-dm-modules-3.2.0-4-r5k-ip32-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-dm-modules-3.2.0-4-s390x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-dm-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-dm-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-dm-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-dm-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-modules-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-modules-3.2.0-4-r4k-ip22-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-modules-3.2.0-4-r5k-cobalt-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-modules-3.2.0-4-r5k-ip32-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-modules-3.2.0-4-s390x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"crypto-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"dasd-extra-modules-3.2.0-4-s390x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"dasd-modules-3.2.0-4-s390x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"efi-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"efi-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"efi-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"event-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"event-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"event-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"event-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"event-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"event-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"event-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"event-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"event-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext2-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext2-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext2-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext2-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext2-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext2-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext2-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext2-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext2-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext2-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext2-modules-3.2.0-4-s390x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext2-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext2-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext2-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext3-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext3-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext3-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext3-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext3-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext3-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext3-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext3-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext3-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext3-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext3-modules-3.2.0-4-s390x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext3-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext3-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext3-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext4-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext4-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext4-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext4-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext4-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext4-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext4-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext4-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext4-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext4-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext4-modules-3.2.0-4-s390x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext4-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext4-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ext4-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fancontrol-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fat-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fat-modules-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fat-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fat-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fat-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fat-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fat-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fat-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fat-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fat-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fat-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fat-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fat-modules-3.2.0-4-r5k-cobalt-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fat-modules-3.2.0-4-s390x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fat-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fat-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fat-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fat-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fb-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fb-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fb-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fb-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fb-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fb-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firewire-core-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firewire-core-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firewire-core-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firewire-core-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firewire-core-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firewire-core-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"floppy-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"floppy-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"floppy-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"floppy-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"floppy-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fuse-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fuse-modules-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fuse-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fuse-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fuse-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fuse-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fuse-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fuse-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fuse-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fuse-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fuse-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fuse-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fuse-modules-3.2.0-4-r4k-ip22-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fuse-modules-3.2.0-4-r5k-cobalt-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fuse-modules-3.2.0-4-r5k-ip32-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fuse-modules-3.2.0-4-s390x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fuse-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fuse-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fuse-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"fuse-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"hfs-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"hfs-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"hyperv-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"hyperv-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"hyperv-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"hypervisor-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"i2c-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"i2c-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"i2c-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ide-core-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ide-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"input-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"input-modules-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"input-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"input-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"input-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"input-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"input-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"input-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"input-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"input-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"input-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"input-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"input-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ipv6-modules-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ipv6-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ipv6-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ipv6-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ipv6-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ipv6-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ipv6-modules-3.2.0-4-r4k-ip22-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ipv6-modules-3.2.0-4-r5k-cobalt-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ipv6-modules-3.2.0-4-r5k-ip32-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ipv6-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ipv6-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ipv6-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"irda-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"irda-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"irda-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"irda-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"irda-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"irda-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"isofs-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"isofs-modules-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"isofs-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"isofs-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"isofs-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"isofs-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"isofs-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"isofs-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"isofs-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"isofs-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"isofs-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"isofs-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"isofs-modules-3.2.0-4-r4k-ip22-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"isofs-modules-3.2.0-4-r5k-ip32-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"isofs-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"isofs-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"isofs-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"isofs-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"jffs2-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"jffs2-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"jfs-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"jfs-modules-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"jfs-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"jfs-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"jfs-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"jfs-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"jfs-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"jfs-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"jfs-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"jfs-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"jfs-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"jfs-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"jfs-modules-3.2.0-4-r4k-ip22-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"jfs-modules-3.2.0-4-r5k-cobalt-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"jfs-modules-3.2.0-4-r5k-ip32-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"jfs-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"jfs-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"jfs-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"kernel-image-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"kernel-image-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"kernel-image-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"kernel-image-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"kernel-image-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"kernel-image-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"kernel-image-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"kernel-image-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"kernel-image-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"kernel-image-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"kernel-image-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"kernel-image-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"kernel-image-3.2.0-4-r4k-ip22-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"kernel-image-3.2.0-4-r5k-cobalt-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"kernel-image-3.2.0-4-r5k-ip32-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"kernel-image-3.2.0-4-s390x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"kernel-image-3.2.0-4-s390x-tape-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"kernel-image-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"kernel-image-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"kernel-image-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"kernel-image-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"leds-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-doc-3.2\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-486\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-4kc-malta\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-5kc-malta\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-686-pae\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-all\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-all-amd64\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-all-armel\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-all-armhf\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-all-i386\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-all-ia64\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-all-mips\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-all-mipsel\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-all-powerpc\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-all-s390\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-all-s390x\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-all-sparc\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-amd64\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-common\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-common-rt\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-iop32x\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-itanium\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-ixp4xx\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-kirkwood\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-loongson-2f\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-mckinley\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-mv78xx0\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-mx5\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-octeon\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-omap\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-orion5x\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-powerpc\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-powerpc-smp\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-powerpc64\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-r4k-ip22\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-r5k-cobalt\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-r5k-ip32\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-rt-686-pae\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-rt-amd64\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-s390x\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-sb1-bcm91250a\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-sb1a-bcm91480b\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-sparc64\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-sparc64-smp\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-versatile\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-headers-3.2.0-4-vexpress\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-486\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-4kc-malta\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-5kc-malta\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-686-pae\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-686-pae-dbg\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-amd64\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-amd64-dbg\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-iop32x\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-itanium\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-ixp4xx\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-kirkwood\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-loongson-2f\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-mckinley\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-mv78xx0\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-mx5\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-octeon\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-omap\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-orion5x\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-powerpc\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-powerpc-smp\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-powerpc64\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-r4k-ip22\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-r5k-cobalt\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-r5k-ip32\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-rt-686-pae\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-rt-686-pae-dbg\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-rt-amd64\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-rt-amd64-dbg\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-s390x\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-s390x-dbg\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-s390x-tape\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-sb1-bcm91250a\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-sb1a-bcm91480b\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-sparc64\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-sparc64-smp\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-versatile\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-image-3.2.0-4-vexpress\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-libc-dev\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-manual-3.2\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-source-3.2\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-support-3.2.0-4\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"loop-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"loop-modules-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"loop-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"loop-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"loop-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"loop-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"loop-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"loop-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"loop-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"loop-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"loop-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"loop-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"loop-modules-3.2.0-4-r4k-ip22-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"loop-modules-3.2.0-4-r5k-cobalt-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"loop-modules-3.2.0-4-r5k-ip32-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"loop-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"loop-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"loop-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"md-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"md-modules-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"md-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"md-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"md-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"md-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"md-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"md-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"md-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"md-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"md-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"md-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"md-modules-3.2.0-4-r4k-ip22-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"md-modules-3.2.0-4-r5k-cobalt-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"md-modules-3.2.0-4-r5k-ip32-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"md-modules-3.2.0-4-s390x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"md-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"md-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"md-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"md-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"minix-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"minix-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"minix-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"mmc-core-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"mmc-core-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"mmc-core-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"mmc-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"mmc-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"mmc-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"mmc-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"mmc-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"mmc-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"mouse-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"mouse-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"mouse-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"mouse-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"mouse-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"mouse-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"mouse-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"mtd-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"multipath-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"multipath-modules-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"multipath-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"multipath-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"multipath-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"multipath-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"multipath-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"multipath-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"multipath-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"multipath-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"multipath-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"multipath-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"multipath-modules-3.2.0-4-r4k-ip22-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"multipath-modules-3.2.0-4-r5k-cobalt-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"multipath-modules-3.2.0-4-r5k-ip32-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"multipath-modules-3.2.0-4-s390x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"multipath-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"multipath-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"multipath-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"multipath-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nbd-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nbd-modules-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nbd-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nbd-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nbd-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nbd-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nbd-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nbd-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nbd-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nbd-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nbd-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nbd-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nbd-modules-3.2.0-4-r4k-ip22-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nbd-modules-3.2.0-4-r5k-cobalt-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nbd-modules-3.2.0-4-r5k-ip32-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nbd-modules-3.2.0-4-s390x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nbd-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nbd-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nbd-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nbd-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nfs-modules-3.2.0-4-r5k-cobalt-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-extra-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-extra-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-extra-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-extra-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-extra-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-modules-3.2.0-4-s390x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-shared-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-shared-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-shared-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-shared-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-shared-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-shared-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-shared-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-shared-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-shared-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-shared-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-shared-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-shared-modules-3.2.0-4-r4k-ip22-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-shared-modules-3.2.0-4-r5k-cobalt-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-shared-modules-3.2.0-4-r5k-ip32-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-shared-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-shared-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-shared-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-usb-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-usb-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-usb-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-usb-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-usb-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-usb-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-usb-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-usb-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-usb-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-usb-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-usb-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-wireless-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-wireless-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-wireless-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-wireless-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"nic-wireless-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ntfs-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ntfs-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ntfs-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ntfs-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"parport-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"parport-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"parport-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"parport-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"pata-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"pata-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"pata-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"pata-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"pata-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"pata-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"pata-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"pata-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"pata-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"pcmcia-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"pcmcia-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"pcmcia-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"pcmcia-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"pcmcia-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"pcmcia-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"plip-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"plip-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"plip-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"plip-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"plip-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ppp-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ppp-modules-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ppp-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ppp-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ppp-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ppp-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ppp-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ppp-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ppp-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ppp-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ppp-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ppp-modules-3.2.0-4-r5k-cobalt-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ppp-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ppp-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ppp-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"qnx4-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"qnx4-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"qnx4-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"reiserfs-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"reiserfs-modules-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"reiserfs-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"reiserfs-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"reiserfs-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"reiserfs-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"reiserfs-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"reiserfs-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"reiserfs-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"reiserfs-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"reiserfs-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"reiserfs-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"reiserfs-modules-3.2.0-4-r4k-ip22-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"reiserfs-modules-3.2.0-4-r5k-cobalt-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"reiserfs-modules-3.2.0-4-r5k-ip32-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"reiserfs-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"reiserfs-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"reiserfs-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"rtc-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"sata-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"sata-modules-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"sata-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"sata-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"sata-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"sata-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"sata-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"sata-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"sata-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"sata-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"sata-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"sata-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"sata-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"sata-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"sata-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-common-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-common-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-common-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-common-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-common-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-common-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-common-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-common-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-core-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-core-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-core-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-core-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-core-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-core-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-core-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-core-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-core-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-core-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-core-modules-3.2.0-4-s390x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-core-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-core-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-core-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-core-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-extra-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-extra-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-extra-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-extra-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-extra-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-modules-3.2.0-4-s390x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"scsi-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"serial-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"serial-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"serial-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"serial-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"serial-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"serial-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"sn-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"sound-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"sound-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"sound-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"speakup-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"speakup-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"speakup-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"squashfs-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"squashfs-modules-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"squashfs-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"squashfs-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"squashfs-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"squashfs-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"squashfs-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"squashfs-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"squashfs-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"squashfs-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"squashfs-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"squashfs-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"squashfs-modules-3.2.0-4-r4k-ip22-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"squashfs-modules-3.2.0-4-r5k-cobalt-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"squashfs-modules-3.2.0-4-r5k-ip32-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"squashfs-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"squashfs-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"squashfs-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"squashfs-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"udf-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"udf-modules-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"udf-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"udf-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"udf-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"udf-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"udf-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"udf-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"udf-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"udf-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"udf-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"udf-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"udf-modules-3.2.0-4-r4k-ip22-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"udf-modules-3.2.0-4-r5k-ip32-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"udf-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"udf-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"udf-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"udf-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ufs-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ufs-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ufs-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ufs-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ufs-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"ufs-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"uinput-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"uinput-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"uinput-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"uinput-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"uinput-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"uinput-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"uinput-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"uinput-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"uinput-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-modules-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-serial-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-serial-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-serial-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-serial-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-serial-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-serial-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-serial-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-serial-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-serial-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-storage-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-storage-modules-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-storage-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-storage-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-storage-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-storage-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-storage-modules-3.2.0-4-kirkwood-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-storage-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-storage-modules-3.2.0-4-mx5-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-storage-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-storage-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-storage-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-storage-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-storage-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-storage-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"usb-storage-modules-3.2.0-4-vexpress-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"virtio-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"virtio-modules-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"virtio-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"virtio-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"virtio-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"virtio-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"virtio-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"virtio-modules-3.2.0-4-s390x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"virtio-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"virtio-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"xen-linux-system-3.2.0-4-686-pae\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"xen-linux-system-3.2.0-4-amd64\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"xfs-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"xfs-modules-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"xfs-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"xfs-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"xfs-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"xfs-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"xfs-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"xfs-modules-3.2.0-4-powerpc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"xfs-modules-3.2.0-4-r4k-ip22-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"xfs-modules-3.2.0-4-r5k-cobalt-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"xfs-modules-3.2.0-4-r5k-ip32-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"xfs-modules-3.2.0-4-s390x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"xfs-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"xfs-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"zlib-modules-3.2.0-4-486-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"zlib-modules-3.2.0-4-4kc-malta-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"zlib-modules-3.2.0-4-686-pae-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"zlib-modules-3.2.0-4-amd64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"zlib-modules-3.2.0-4-iop32x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"zlib-modules-3.2.0-4-itanium-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"zlib-modules-3.2.0-4-loongson-2f-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"zlib-modules-3.2.0-4-orion5x-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"zlib-modules-3.2.0-4-powerpc-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"zlib-modules-3.2.0-4-r4k-ip22-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"zlib-modules-3.2.0-4-r5k-cobalt-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"zlib-modules-3.2.0-4-r5k-ip32-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"zlib-modules-3.2.0-4-sb1-bcm91250a-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"zlib-modules-3.2.0-4-sparc64-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"zlib-modules-3.2.0-4-versatile-di\", ver:\"3.2.63-2+deb7u1\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:39:48", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3646", "CVE-2014-3611", "CVE-2014-3645", "CVE-2014-3185"], "description": "[2.6.32-504.1.3]\n- Revert: [net] revert 'bridge: Set vlan_features to allow offloads on vlans' (Vlad Yasevich) [1144442 1121991]\n[2.6.32-504.1.2]\n- [x86] kvm: fix PIT timer race condition (mguzik) [1149592 1149593] {CVE-2014-3611}\n- [x86] kvm: vmx: handle invept and invvpid vm exits gracefull (mguzik) [1144826 1144837 1144827 1144838] {CVE-2014-3646 CVE-2014-3645}\n[2.6.32-504.1.1]\n- [fs] call d_op->d_hash on last component of umount path (Abhijith Das) [1145193 1129712]\n- [usb] serial: memory corruption flaw (Jacob Tanenbaum) [1141401 1141402] {CVE-2014-3185}\n- [char] ipmi: Clear drvdata when interface is removed (Tony Camuso) [1149578 1135910]\n- [char] ipmi: init shadow_ipmi_smi_handlers early in ipmi_si_intf (Tony Camuso) [1149580 1139464]\n- [net] ipsec: update MAX_AH_AUTH_LEN to support sha512 (Herbert Xu) [1149083 1140103]\n- [net] revert 'bridge: Set vlan_features to allow offloads on vlans' (Vlad Yasevich) [1144442 1121991]\n- [netdrv] virtio-net: fix big buffer receiving (Jason Wang) [1148693 1144073]\n- [netdrv] tg3: prevent ifup/ifdown during PCI error recovery (Ivan Vecera) [1142570 1117009]", "edition": 4, "modified": "2014-11-11T00:00:00", "published": "2014-11-11T00:00:00", "id": "ELSA-2014-1843", "href": "http://linux.oracle.com/errata/ELSA-2014-1843.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:34:56", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3646", "CVE-2014-3611", "CVE-2014-3181", "CVE-2014-3645", "CVE-2014-3185"], "description": "kernel-uek\n[3.8.13-44.1.4.el7uek]\n- USB: whiteheat: Added bounds checking for bulk command response (James Forshaw) [Orabug: 19849334] {CVE-2014-3185}\n- HID: fix a couple of off-by-ones (Jiri Kosina) [Orabug: 19849317] {CVE-2014-3181}\n- kvm: vmx: handle invvpid vm exit gracefully (Petr Matousek) [Orabug: 19906300] {CVE-2014-3646}\n- nEPT: Nested INVEPT (Nadav Har'El) [Orabug: 19906267] {CVE-2014-3645}\n- KVM: x86: Improve thread safety in pit (Andy Honig) [Orabug: 19905686] {CVE-2014-3611}", "edition": 4, "modified": "2014-10-30T00:00:00", "published": "2014-10-30T00:00:00", "id": "ELSA-2014-3084", "href": "http://linux.oracle.com/errata/ELSA-2014-3084.html", "title": "Unbreakable Enterprise kernel Security update", "type": "oraclelinux", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-14T13:34:45", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3646", "CVE-2014-5077", "CVE-2014-3611", "CVE-2014-4653", "CVE-2014-3645"], "description": "[3.10.0-123.9.2]\n- Oracle Linux certificates (Alexey Petrenko)\n[3.10.0-123.9.2]\n- [virt] kvm: fix PIT timer race condition (Petr Matousek) [1144879 1144880] {CVE-2014-3611}\n- [virt] kvm/vmx: handle invept and invvpid vm exits gracefully (Petr Matousek) [1145449 1116936] [1144828 1144829] {CVE-2014-3645 CVE-2014-3646}\n[3.10.0-123.9.1]\n- [md] raid6: avoid data corruption during recovery of double-degraded RAID6 (Jes Sorensen) [1143850 1130905]\n- [fs] ext4: fix type declaration of ext4_validate_block_bitmap (Lukas Czerner) [1140978 1091055]\n- [fs] ext4: error out if verifying the block bitmap fails (Lukas Czerner) [1140978 1091055]\n- [powerpc] sched: stop updating inside arch_update_cpu_topology() when nothing to be update (Gustavo Duarte) [1140300 1098372]\n- [powerpc] 64bit sendfile is capped at 2GB (Gustavo Duarte) [1139126 1107774]\n- [s390] fix restore of invalid floating-point-control (Hendrik Brueckner) [1138733 1121965]\n- [kernel] sched/fair: Rework sched_fair time accounting (Rik van Riel) [1134717 1123731]\n- [kernel] math64: Add mul_u64_u32_shr() (Rik van Riel) [1134717 1123731]\n- [kernel] workqueue: zero cpumask of wq_numa_possible_cpumask on init (Motohiro Kosaki) [1134715 1117184]\n- [cpufreq] acpi-cpufreq: skip loading acpi_cpufreq after intel_pstate (Motohiro Kosaki) [1134716 1123250]\n- [security] selinux: Increase ebitmap_node size for 64-bit configuration (Paul Moore) [1132076 922752]\n- [security] selinux: Reduce overhead of mls_level_isvalid() function call (Paul Moore) [1132076 922752]\n- [ethernet] cxgb4: allow large buffer size to have page size (Gustavo Duarte) [1130548 1078977]\n- [kernel] sched/autogroup: Fix race with task_groups list (Gustavo Duarte) [1129990 1081406]\n- [net] sctp: inherit auth_capable on INIT collisions (Daniel Borkmann) [1124337 1123763] {CVE-2014-5077}\n- [sound] alsa/control: Don't access controls outside of protected regions (Radomir Vrbovsky) [1117330 1117331] {CVE-2014-4653}", "edition": 5, "modified": "2014-10-28T00:00:00", "published": "2014-10-28T00:00:00", "id": "ELSA-2014-1724", "href": "http://linux.oracle.com/errata/ELSA-2014-1724.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:39:48", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3611", "CVE-2014-3181", "CVE-2014-3185"], "description": "[2.6.39-400.215.12]\n- USB: whiteheat: Added bounds checking for bulk command response (James Forshaw) [Orabug: 19849335] {CVE-2014-3185}\n- HID: fix a couple of off-by-ones (Jiri Kosina) [Orabug: 19849318] {CVE-2014-3181}\n- KVM: x86: Improve thread safety in pit (Andy Honig) [Orabug: 19905687] {CVE-2014-3611}", "edition": 4, "modified": "2014-10-30T00:00:00", "published": "2014-10-30T00:00:00", "id": "ELSA-2014-3085", "href": "http://linux.oracle.com/errata/ELSA-2014-3085.html", "title": "Unbreakable Enterprise kernel Security update", "type": "oraclelinux", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:32", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3611", "CVE-2014-3181", "CVE-2014-3185", "CVE-2014-3535"], "description": "kernel-uek\n[2.6.32-400.36.10uek]\n- USB: whiteheat: Added bounds checking for bulk command response (James Forshaw) [Orabug: 19849336] {CVE-2014-3185}\n- HID: fix a couple of off-by-ones (Jiri Kosina) [Orabug: 19849320] {CVE-2014-3181}\nlogging macros to functions (Joe Perches) [Orabug: 19847630] {CVE-2014-3535}\nlogging macros to functions (Joe Perches) [Orabug: 19847630] \n- vsprintf: Recursive vsnprintf: Add '%pV', struct va_format (Joe Perches) [Orabug: 19847630] \n- KVM: x86: Improve thread safety in pit (Andy Honig) [Orabug: 19905688] {CVE-2014-3611}", "edition": 4, "modified": "2014-11-03T00:00:00", "published": "2014-11-03T00:00:00", "id": "ELSA-2014-3086", "href": "http://linux.oracle.com/errata/ELSA-2014-3086.html", "title": "Unbreakable Enterprise kernel security update", "type": "oraclelinux", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:37:19", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3646", "CVE-2014-3673", "CVE-2014-1739", "CVE-2014-3611", "CVE-2014-3645", "CVE-2014-4171", "CVE-2014-4014", "CVE-2014-3184", "CVE-2014-3687"], "description": "kernel-uek\n[3.8.13-55]\n- freezer: set PF_SUSPEND_TASK flag on tasks that call freeze_processes (Colin Cross) [Orabug: 20082843]\n[3.8.13-54]\n- netfilter: nf_nat: fix oops on netns removal (Florian Westphal) [Orabug: 19988779] \n- tcp: tsq: restore minimal amount of queueing (Eric Dumazet) [Orabug: 19909542] \n- qedf: Fixes for compilation issues on oracle uek3r4. (Saurav Kashyap) [Orabug: 20027243] \n- qla2xxx: fix wrongly report 'PCI EEH busy' when get_thermal_temp (Vaughan Cao) [Orabug: 19916135] \n- Revert 'ib_cm: reduce latency when destroying large number of ids' (Guangyu Sun) [Orabug: 20012864] \n- Revert 'rds: avoid duplicate connection drops for active bonding' (Guangyu Sun) [Orabug: 20012864] \n- xen/pciback: Restore configuration space when detaching from a guest. (Konrad Rzeszutek Wilk) [Orabug: 19970142] \n- cpufreq: remove race while accessing cur_policy (Bibek Basu) [Orabug: 19945473] \n- cpufreq: serialize calls to __cpufreq_governor() (Viresh Kumar) [Orabug: 19945473] \n- cpufreq: don't allow governor limits to be changed when it is disabled (Viresh Kumar) [Orabug: 19945473] \n- net: sctp: fix panic on duplicate ASCONF chunks (Daniel Borkmann) [Orabug: 19953088] {CVE-2014-3687}\n- net: sctp: fix skb_over_panic when receiving malformed ASCONF chunks (Daniel Borkmann) [Orabug: 19953087] {CVE-2014-3673}\n- perf/x86: Check all MSRs before passing hw check (George Dunlap) [Orabug: 19803968] \n- o2dlm: fix NULL pointer dereference in o2dlm_blocking_ast_wrapper (Srinivas Eeda) [Orabug: 19825227] \n- RDS: add module parameter to allow module unload or not (Wengang Wang) [Orabug: 19927376] \n- dwarf2ctf: don't use O_PATH in rel_abs_file_name(). (Jamie Iles) [Orabug: 19957565] \n- dwarf2ctf: don't leak directory fd. (Jamie Iles) [Orabug: 19957565]\n[3.8.13-53]\n- net: reset mac header in dev_start_xmit() (Eric Dumazet) [Orabug: 19951043]\n[3.8.13-52]\n- xen/efi: rebased version of xen.efi (Jan Beulich) [Orabug: 19878307]\n[3.8.13-51]\n- config: enable pm80xx module (Guangyu Sun) [Orabug: 19890236] \n- free ib_device related resource (Wengang Wang) [Orabug: 19479464] \n- srq initialization and cleanup -v3.1 (Wengang Wang) [Orabug: 19010606] \n- rds: avoid duplicate connection drops for active bonding (Ajaykumar Hotchandani) [Orabug: 19870095] \n- ib_cm: reduce latency when destroying large number of ids (Ajaykumar Hotchandani) [Orabug: 19870101] \n- IPoIB: Change default IPOIB_RX_RING_SIZE to 2048 (Chien-Hua Yen) [Orabug: 19870157] \n- ipv6: ip6_dst_check needs to check for expired dst_entries (Hannes Frederic Sowa) [Orabug: 19073604] \n- netxen: Fix bug in Tx completion path. (Manish Chopra) [Orabug: 19877613] \n- netxen: Fix BUG 'sleeping function called from invalid context' (Manish Chopra) [Orabug: 19877613] \n- drivers/net: Convert remaining uses of pr_warning to pr_warn (Joe Perches) [Orabug: 19877613] \n- treewide: Fix typo in printk (Masanari Iida) [Orabug: 19877613] \n- PCI: Remove DEFINE_PCI_DEVICE_TABLE macro use (Benoit Taine) [Orabug: 19877613] \n- bnx2fc: upgrade to 2.5.5.1 (Vaughan Cao) [Orabug: 19892175] \n- bnx2i: upgrade to 2.7.10.31d1 (Vaughan Cao) [Orabug: 19892173] \n- bnx2x: upgrade to 1.710.51 (Vaughan Cao) [Orabug: 19877629] \n- cnic: upgrade to 2.5.20b (Vaughan Cao) [Orabug: 19877628] \n- bnx2: upgrade to 2.2.5i (Vaughan Cao) [Orabug: 19877628] \n- Update lpfc version for 10.2.8061.0 driver release. (Dick Kennedy) [Orabug: 19877605] \n- lpfc 10.2.8061.0: Fix ExpressLane priority setup (Dick Kennedy) [Orabug: 19877605] \n- lpfc 10.2.8061.0: Removed obsolete PCI IDs from the driver. (Dick Kennedy) [Orabug: 19877605] \n- lpfc 10.2.8061.0: Fix for initializing RRQ bitmap (Dick Kennedy) [Orabug: 19877605] \n- lpfc 10.2.8061.0: Fix for cleaning up stale ring flag and sp_queue_event entries. (Dick Kennedy) [Orabug: 19877605] \n- lpfc: Add iotag memory barrier (Dick Kennedy) [Orabug: 19877605] \n- lpfc 10.2.8060.0: Update Copyright on changed files from 8.3.45 patches (Dick Kennedy) [Orabug: 19877605] \n- lpfc 10.2.8060.0: Fixed locking for scsi task management commands (Dick Kennedy) [Orabug: 19877605] \n- lpfc 10.2.8060.0: Convert runtime references to old xlane cfg param to fof cfg param (Dick Kennedy) [Orabug: 19877605] \n- lpfc 10.2.8060: Fix FW dump using sysfs (Dick Kennedy) [Orabug: 19877605] \n- lpfc 10.2.8060.0: Fix SLI4 s abort loop to process all FCP rings and under ring_lock (Dick Kennedy) [Orabug: 19877605] \n- lpfc 10.2.8060.0: Fixed kernel panic in lpfc_abort_handler (Dick Kennedy) [Orabug: 19877605] \n- lpfc 10.2.8060.0: Fix locking for postbufq when freeing (Dick Kennedy) [Orabug: 19877605] \n- lpfc: remove self-assignments (Dick Kennedy) [Orabug: 19877605] \n- lpfc 8.3.43: use NULL instead of 0 for pointer (Daeseok Youn) [Orabug: 19877605] \n- lpfc 10.2.8060.0: Fix locking for lpfc_hba_down_post (Dick Kennedy) [Orabug: 19877605] \n- lpfc 10.2.8060.0: Fix dynamic transitions of FirstBurst from on to off (Dick Kennedy) [Orabug: 19877605] \n- lpfc 8.3.45: Fixed crash during driver unload. (James Smart) [Orabug: 19877605] \n- lpfc 8.3.45: Fixed driver error messages after firmware download (James Smart) [Orabug: 19877605] \n- lpfc 8.3.45: Fixed missing initialization for task management IOCBs (James Smart) [Orabug: 19877605] \n- lpfc 8.3.45: Fix sysfs buffer overrun in read of lpfc_fcp_cpu_map for 128 CPUs. (James Smart) [Orabug: 19877605] \n- lpfc 8.3.45: Incorporate changes to use reason in change_queue_depth function. (James Smart) [Orabug: 19877605] \n- lpfc 8.3.45: Incorporated support of a low-latency io path (James Smart) [Orabug: 19877605] \n- lpfc 8.3.45: Added dport mailbox pass through support. (James Smart) [Orabug: 19877605] \n- be2iscsi : Bump the driver version (John Soni Jose) [Orabug: 19877611] \n- be2iscsi : Fix kernel panic during reboot/shutdown (John Soni Jose) [Orabug: 19877611] \n- be2iscsi: Fix processing CQE before connection resources are freed (Jayamohan Kallickal) [Orabug: 19877611] \n- be2iscsi: Fix updating the boot enteries in sysfs (Jayamohan Kallickal) [Orabug: 19877611] \n- be2iscsi: Fix the copyright year (Jayamohan Kallickal) [Orabug: 19877611] \n- be2iscsi: Fix the sparse warning introduced in previous submission (Jayamohan Kallickal) [Orabug: 19877611] \n- turbostat: fix build breakage (Brian Maly) [Orabug: 19894618] \n- kvm: vmx: handle invvpid vm exit gracefully (Petr Matousek) [Orabug: 19906290] {CVE-2014-3646}\n- nEPT: Nested INVEPT (Nadav Har'El) [Orabug: 19905739] {CVE-2014-3645}\n- KVM: x86: Improve thread safety in pit (Andy Honig) [Orabug: 19905575] {CVE-2014-3611}\n[3.8.13-50]\n- NVMe: Do not over allocate for discard requests (Keith Busch) [Orabug: 19791123] \n- NVMe: Do not open disks that are being deleted (Keith Busch) [Orabug: 19791123] \n- NVMe: Clear QUEUE_FLAG_STACKABLE (Keith Busch) [Orabug: 19791123] \n- NVMe: Fix device probe waiting on kthread (Keith Busch) [Orabug: 19791123] \n- NVMe: Updates for 1.1 spec (Keith Busch) [Orabug: 19791123] \n- NVMe: Passthrough IOCTL for IO commands (Keith Busch) [Orabug: 19791123] \n- NVMe: Add revalidate_disk callback (Keith Busch) [Orabug: 19791123] \n- NVMe: Fix nvmeq waitqueue entry initialization (Keith Busch) [Orabug: 19791123] \n- NVMe: Translate NVMe status to errno (Keith Busch) [Orabug: 19791123] \n- NVMe: Fix SG_IO status values (Keith Busch) [Orabug: 19791123] \n- NVMe: Remove duplicate compat SG_IO code (Keith Busch) [Orabug: 19791123] \n- NVMe: Reference count pci device (Keith Busch) [Orabug: 19791123] \n- nvme: Replace rcu_assign_pointer() with RCU_INIT_POINTER() (Andreea-Cristina Bernat) [Orabug: 19791123] \n- NVMe: Correctly handle IOCTL_SUBMIT_IO when cpus > online queues (Sam Bradshaw) [Orabug: 19791123] \n- NVMe: Fix filesystem sync deadlock on removal (Keith Busch) [Orabug: 19791123] \n- NVMe: Add shutdown timeout as module parameter. (Dan McLeran) [Orabug: 19791123] \n- NVMe: Skip orderly shutdown on failed devices (Keith Busch) [Orabug: 19791123] \n- NVMe: Whitespace fixes (Keith Busch) [Orabug: 19791123] \n- NVMe: Handling devices incapable of I/O (Keith Busch) [Orabug: 19791123] \n- NVMe: Change nvme_enable_ctrl to set EN and manage CC thru ctrl_config. (Dan McLeran) [Orabug: 19791123] \n- NVMe: Mismatched host/device page size support (Keith Busch) [Orabug: 19791123] \n- NVMe: Update list of status codes (Matthew Wilcox) [Orabug: 19791123] \n- NVMe: Async event request (Keith Busch) [Orabug: 19791123] \n- qlge: Fix compilation warning (Harish Patil) [Orabug: 19877615] \n- qlge: Fix TSO for non-accelerated vlan traffic (Vlad Yasevich) [Orabug: 19877615] \n- PCI: Remove DEFINE_PCI_DEVICE_TABLE macro use (Benoit Taine) [Orabug: 19877615] \n- i40e: Update flow director error messages to reduce user confusion (Carolyn Wyborny) [Orabug: 19882061] \n- i40evf: enable module build (Brian Maly) [Orabug: 19528533] \n- i40e/i40evf: Bump build versions (Catherine Sullivan) [Orabug: 19528533] \n- i40e: Tweak for-loop in i40e_ethtool.c (Catherine Sullivan) [Orabug: 19528533] \n- i40e: Cleanup if/else statements (Catherine Sullivan) [Orabug: 19528533] \n- i40e: abstract the close path for better netdev vsis (Shannon Nelson) [Orabug: 19528533] \n- i40e/i40evf: add tracking to NVM busy state (Shannon Nelson) [Orabug: 19528533] \n- i40e: Fix an issue with displaying IPv4 FD filters (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: Remove a FW workaround (Catherine Sullivan) [Orabug: 19528533] \n- i40e/i40evf: Bump build versions (Catherine Sullivan) [Orabug: 19528533] \n- i40e: Enable VF Tx bandwidth setting (Mitch Williams) [Orabug: 19528533] \n- i40e: Reset the VF upon conflicting VLAN configuration (Greg Rose) [Orabug: 19528533] \n- i40e: remove open-coded skb_cow_head (Francois Romieu) [Orabug: 19528533] \n- i40evf: program RSS LUT correctly (Mitch A Williams) [Orabug: 19528533] \n- i40evf: remove open-coded skb_cow_head (Francois Romieu) [Orabug: 19528533] \n- i40e: Remove casts of pointer to same type (Joe Perches) [Orabug: 19528533] \n- i40e/i40evf: Remove addressof casts to same type (Joe Perches) [Orabug: 19528533] \n- i40e: fix function kernel doc description (Jean Sacren) [Orabug: 19528533] \n- i40e: Use DEBUG_FD message level for an FD message (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e/i40evf: Add an FD message level (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: check for netdev before debugfs use (Shannon Nelson) [Orabug: 19528533] \n- i40evf: remove double space after return (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: Add functionality for FD SB to drop packets (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: Cleanup in FDIR SB ethtool code (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: eeprom integrity check on load and empr (Shannon Nelson) [Orabug: 19528533] \n- i40e: Make the alloc and free queue vector calls orthogonal (Greg Rose) [Orabug: 19528533] \n- i40evf: fix oops in watchdog handler (Mitch Williams) [Orabug: 19528533] \n- i40e: Delete ATR filter on RST (Anjali Singhai Jain) [Orabug: 19528533] \n- i40evf: clean up init error messages (Mitch Williams) [Orabug: 19528533] \n- i40evf: don't shut down admin queue on error (Mitch Williams) [Orabug: 19528533] \n- i40e: Fix a message string (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e/i40evf: Add EEE LPI stats (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e/i40evf: Bump build versions (Catherine Sullivan) [Orabug: 19528533] \n- i40e: potential array underflow in i40e_vc_process_vf_msg() (Dan Carpenter) [Orabug: 19528533] \n- i40e/i40evf: reduce context descriptors (Jesse Brandeburg) [Orabug: 19528533] \n- i40e/i40evf: enable hardware feature head write back (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: Patch to enable Ethtool/netdev feature flag for NTUPLE control (Anjali Singhai Jain) [Orabug: 19528533] \n- i40evf: use min_t (Mitch Williams) [Orabug: 19528533] \n- i40evf: correctly program RSS HLUT table (Mitch Williams) [Orabug: 19528533] \n- net/i40e: Avoid double setting of NETIF_F_SG for the HW encapsulation feature mask (Or Gerlitz) [Orabug: 19528533] \n- i40evf: Rename i40e_ptype_lookup i40evf_ptype_lookup (Eric W Biederman) [Orabug: 19528533] \n- i40e: Don't receive packets when the napi budget == 0 (Eric W. Biederman) [Orabug: 19528533] \n- i40e/i40evf: Use correct number of VF vectors (Mitch Williams) [Orabug: 19528533] \n- i40e: Let MDD events be handled by MDD handler (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: Bug fix for FDIR replay logic (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: add missing variable to i40e_ethtool (Brian Maly) [Orabug: 19528533] \n- i40e: Add code to handle FD table full condition (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: Define a new state variable to keep track of feature auto disable (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: Fix function comments (Akeem G Abodunrin) [Orabug: 19528533] \n- i40e: make string references to q be queue (Jesse Brandeburg) [Orabug: 19528533] \n- i40e/i40evf: Some flow director HW definition fixes (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: Fix a bug in the update logic for FDIR SB filter. (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: delete netdev after deleting napi and vectors (Shannon Nelson) [Orabug: 19528533] \n- i40e/i40evf: Bump pf&vf build versions (Catherine Sullivan) [Orabug: 19528533] \n- i40e/i40evf: carefully fill tx ring (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: fix nvm version and remove firmware report (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: Remove a redundant filter addition (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: count timeout events (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: Remove a FW workaround for Number of MSIX vectors (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: clean up comment style (Shannon Nelson) [Orabug: 19528533] \n- i40e: Prevent overflow due to kzalloc (Akeem G Abodunrin) [Orabug: 19528533] \n- i40e: Flow Director sideband accounting (Joseph Gasparakis) [Orabug: 19528533] \n- i40evf: Enable the ndo_set_features netdev op (Greg Rose) [Orabug: 19528533] \n- i40e and i40evf: Bump driver versions (Catherine Sullivan) [Orabug: 19528533] \n- i40e: Change MSIX to MSI-X (Catherine Sullivan) [Orabug: 19528533] \n- i40e: tighten up ring enable/disable flow (Mitch Williams) [Orabug: 19528533] \n- i40e: remove unnecessary delay (Mitch Williams) [Orabug: 19528533] \n- i40evf: remove errant space (Mitch A Williams) [Orabug: 19528533] \n- i40evf: update version and copyright date (Mitch Williams) [Orabug: 19528533] \n- i40evf: store ring size in ring structs (Mitch Williams) [Orabug: 19528533] \n- i40evf: don't guess device name (Mitch Williams) [Orabug: 19528533] \n- i40evf: remove bogus comment (Mitch Williams) [Orabug: 19528533] \n- i40evf: fix up strings in init task (Mitch Williams) [Orabug: 19528533] \n- i40evf: get rid of pci_using_dac (Mitch Williams) [Orabug: 19528533] \n- i40evf: fix multiple crashes on remove (Mitch Williams) [Orabug: 19528533] \n- i40evf: remove VLAN filters on close (Mitch Williams) [Orabug: 19528533] \n- i40evf: request reset on tx hang (Mitch Williams) [Orabug: 19528533] \n- i40e: Use pci_enable_msix_range() instead of pci_enable_msix() (Alexander Gordeev) [Orabug: 19528533] \n- net: i40evf: Remove duplicate include (Sachin Kamat) [Orabug: 19528533] \n- i40evf: refactor reset handling (Mitch Williams) [Orabug: 19528533] \n- i40evf: change type of flags variable (Mitch Williams) [Orabug: 19528533] \n- i40evf: don't store unnecessary array of strings (Mitch Williams) [Orabug: 19528533] \n- i40evf: fix bogus comment (Mitch Williams) [Orabug: 19528533] \n- i40evf: clean up adapter struct (Mitch Williams) [Orabug: 19528533] \n- i40e: don't handle VF reset on unload (Mitch Williams) [Orabug: 19528533] \n- i40e: enable extant VFs (Mitch Williams) [Orabug: 19528533] \n- i40e: reset VFs after PF reset (Mitch Williams) [Orabug: 19528533] \n- i40e: set VF state to active when reset is complete (Mitch Williams) [Orabug: 19528533] \n- i40e: remove dead code (Mitch Williams) [Orabug: 19528533] \n- i40e: Setting i40e_down bit for tx_timeout (Akeem G Abodunrin) [Orabug: 19528533] \n- i40evf: clean up memsets (Mitch Williams) [Orabug: 19528533] \n- i40evf: trivial fixes (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: bump driver version (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: spelling error (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: refactor flow director (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: rename defines (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: whitespace fixes (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: Change firmware workaround (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: fix compile warning on checksum_local (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: updates to AdminQ interface (Shannon Nelson) [Orabug: 19528533] \n- i40e: check desc pointer before printing (Shannon Nelson) [Orabug: 19528533] \n- i40e: Remove autogenerated Module.symvers file. (David S. Miller) [Orabug: 19528533] \n- i40e: Retain MAC filters on port VLAN deletion (Greg Rose) [Orabug: 19528533] \n- i40e: Warn admin to reload VF driver on port VLAN configuration (Greg Rose) [Orabug: 19528533] \n- i40e: Bump version number (Catherine Sullivan) [Orabug: 19528533] \n- i40e: trivial cleanup (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: whitespace fixes (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: make message meaningful (Mitch Williams) [Orabug: 19528533] \n- i40e: associate VMDq queue with VM type (Shannon Nelson) [Orabug: 19528533] \n- i40e: remove extra register write (Mitch Williams) [Orabug: 19528533] \n- i40e: Bump version (Catherine Sullivan) [Orabug: 19528533] \n- i40e: fix log message wording (Shannon Nelson) [Orabug: 19528533] \n- i40e: enable PTP (Jacob Keller) [Orabug: 19528533] \n- i40e: call clear_pxe after adminq is initialized (Shannon Nelson) [Orabug: 19528533] \n- i40e: clear qtx_head before enabling Tx queue (Shannon Nelson) [Orabug: 19528533] \n- i40e: adjust ITR max and min values (Shannon Nelson) [Orabug: 19528533] \n- i40e: check for possible incorrect ipv6 checksum (Shannon Nelson) [Orabug: 19528533] \n- i40e: allow VF to remove any MAC filter (Mitch Williams) [Orabug: 19528533] \n- i40e: do not bail when disabling if Tx queue disable fails (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: Setting queue count to 1 using ethtool is valid (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: Cleanup Doxygen warnings (Jeff Kirsher) [Orabug: 19528533] \n- i40e: fix long lines (Mitch Williams) [Orabug: 19528533] \n- i40e: Bump version (Catherine Sullivan) [Orabug: 19528533] \n- i40e: Update the Current NVM version Low value (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: drop unused macros (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: use assignment instead of memcpy (Mitch Williams) [Orabug: 19528533] \n- i40e: Turn flow director off in MFP mode (Catherine Sullivan) [Orabug: 19528533] \n- i40e: Add a dummy packet template (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: fix spelling errors (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: trivial: formatting and checkpatch fixes (Mitch Williams) [Orabug: 19528533] \n- i40e: shorten wordy fields (Mitch Williams) [Orabug: 19528533] \n- i40e: accept pf to pf adminq messages (Shannon Nelson) [Orabug: 19528533] \n- i40e: remove interrupt on AQ error (Shannon Nelson) [Orabug: 19528533] \n- i40e: release NVM resource reservation on startup (Shannon Nelson) [Orabug: 19528533] \n- i40e: Cleanup reconfig rss path (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: disable packet split (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: add a comment on barrier and fix panic on reset (Greg Rose) [Orabug: 19528533] \n- i40e: Fix MAC format in Write MAC address AQ cmd (Kamil Krawczyk) [Orabug: 19528533] \n- i40e: Fix GPL header (Greg Rose) [Orabug: 19528533] \n- i40e: use kernel specific defines (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: Re-enable interrupt on ICR0 (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: correctly setup ARQ descriptors (Mitch Williams) [Orabug: 19528533] \n- i40e: remove redundant AQ enable (Kamil Krawczyk) [Orabug: 19528533] \n- i40e: Enable/Disable PF switch LB on SR-IOV configure changes (Greg Rose) [Orabug: 19528533] \n- i40e: whitespace paren and comment tweaks (Shannon Nelson) [Orabug: 19528533] \n- i40e: rework shadow ram read functions (Shannon Nelson) [Orabug: 19528533] \n- i40e: check MAC type before any REG access (Shannon Nelson) [Orabug: 19528533] \n- i40e: move PF ID init from PF reset to SC init (Shannon Nelson) [Orabug: 19528533] \n- i40e: Reduce range of interrupt reg in reg test (Shannon Nelson) [Orabug: 19528533] \n- i40e: update firmware api to 1.1 (Shannon Nelson) [Orabug: 19528533] \n- i40e: Add code to wait for FW to complete in reset path (Shannon Nelson) [Orabug: 19528533] \n- i40e: Bump version (Catherine Sullivan) [Orabug: 19528533] \n- i40e: Allow VF to set already assigned MAC address (Greg Rose) [Orabug: 19528533] \n- i40e: Stop accepting any VLAN tag on VLAN 0 filter set (Greg Rose) [Orabug: 19528533] \n- i40e: Do not enable broadcast promiscuous by default (Greg Rose) [Orabug: 19528533] \n- i40e: Expose AQ debugfs hooks (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: Do not allow AQ calls from ndo-ops (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: check asq alive before notify (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: Admin queue shutdown fixes (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: Hide the Port VLAN VLAN ID (Greg Rose) [Orabug: 19528533] \n- i40e: use correct struct for get and update vsi params (Shannon Nelson) [Orabug: 19528533] \n- i40e: Fix VF driver MAC address configuration (Greg Rose) [Orabug: 19528533] \n- i40e: support VFs on PFs other than 0 (Mitch Williams) [Orabug: 19528533] \n- i40e: acknowledge VFLR when disabling SR-IOV (Mitch Williams) [Orabug: 19528533] \n- i40e: don't allocate zero size (Mitch Williams) [Orabug: 19528533] \n- i40e: use struct assign instead of memcpy (Mitch Williams) [Orabug: 19528533] \n- i40e: Do not enable default port on the VEB (Greg Rose) [Orabug: 19528533] \n- i40e: avoid unnecessary register read (Mitch Williams) [Orabug: 19528533] \n- i40e: fix whitespace (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: Fix SR-IOV VF port VLAN (Greg Rose) [Orabug: 19528533] \n- i40e: Record dma buffer info for dummy packets (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: remove un-necessary io-write (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: Remove unnecessary prototypes (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: I40E_FLAG_MQ_ENABLED is not used (Neerav Parikh) [Orabug: 19528533] \n- i40e: Fix ring allocation (Neerav Parikh) [Orabug: 19528533] \n- i40e: catch unset q_vector (Shannon Nelson) [Orabug: 19528533] \n- i40e: keep allocated memory in structs (David Cassard) [Orabug: 19528533] \n- i40e: fix error handling when alloc of vsi array fails (Shannon Nelson) [Orabug: 19528533] \n- i40e: reinit buffer size each time (Mitch Williams) [Orabug: 19528533] \n- i40e: use functions to enable and disable icr 0 (Mitch Williams) [Orabug: 19528533] \n- i40e: add header file flag _I40E_TXRX_H_ (Vasu Dev) [Orabug: 19528533] \n- i40e: guard against vf message races (Mitch Williams) [Orabug: 19528533] \n- i40e: fix constant cast issues (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: Change the ethtool NVM read method to use AQ (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: fix mac address checking (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: Dump the whole NVM, not half (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: report VF MAC addresses correctly (Mitch Williams) [Orabug: 19528533] \n- i40e: update led set args (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: make a define from a large constant (Mitch Williams) [Orabug: 19528533] \n- i40e: be more informative (Mitch Williams) [Orabug: 19528533] \n- i40e: fix error return (Mitch Williams) [Orabug: 19528533] \n- i40e: remove chatty log messages (Mitch Williams) [Orabug: 19528533] \n- i40e: remove redundant code (Mitch Williams) [Orabug: 19528533] \n- i40e: refactor VF reset flow (Mitch Williams) [Orabug: 19528533] \n- i40e: move i40e_reset_vf (Mitch Williams) [Orabug: 19528533] \n- i40e: fix curly brace use and return type (Shannon Nelson) [Orabug: 19528533] \n- i40e: add wake-on-lan support (Shannon Nelson) [Orabug: 19528533] \n- i40e: Suppress HMC error to Interrupt message level (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: using for_each_set_bit to simplify the code (Wei Yongjun) [Orabug: 19528533] \n- i40e: make functions static and remove dead code (Stephen Hemminger) [Orabug: 19528533] \n- i40e: Fix off by one in i40e_dbg_command_write (Alan Cox) [Orabug: 19528533] \n- i40e: Bump version number (Catherine Sullivan) [Orabug: 19528533] \n- i40e: Fix wrong mask bits being used in misc interrupt (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: more print_hex_dump use (Shannon Nelson) [Orabug: 19528533] \n- i40e: fix up scanf decoders (Shannon Nelson) [Orabug: 19528533] \n- i40e: simplify error messages for dump descriptor (Shannon Nelson) [Orabug: 19528533] \n- i40e: prevent null pointer exception in dump descriptor (Shannon Nelson) [Orabug: 19528533] \n- i40e: Fix dump output from debugfs calls (Neerav Parikh) [Orabug: 19528533] \n- i40e: Remove FCoE in i40e_virtchnl_pf.c code (Neerav Parikh) [Orabug: 19528533] \n- i40e: support for suspend and resume (Shannon Nelson) [Orabug: 19528533] \n- i40e: rtnl_lock in reset path fixes (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: Add basic support for get/set channels for RSS (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: function to reconfigure RSS queues and rebuild (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: reinit flow for the main VSI (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: use same number of queues as CPUs (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: trivial fixes (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: init flow control settings to disabled (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: Tell the stack about our actual number of queues (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: fix pf reset after offline test (Shannon Nelson) [Orabug: 19528533] \n- i40e: fix up some of the ethtool connection reporting (Brian Maly) [Orabug: 19528533] \n- i40e: Bump version number (Catherine Sullivan) [Orabug: 19528533] \n- i40e: remove and fix confusing define name (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: complain about out-of-range descriptor request (Shannon Nelson) [Orabug: 19528533] \n- i40e: loopback info and set loopback fix (Kamil Krawczyk) [Orabug: 19528533] \n- i40e: restrict diag test messages (Shannon Nelson) [Orabug: 19528533] \n- i40e: Add a new variable to track number of pf instances (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: add num_VFs message (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: refactor ethtool tests (Shannon Nelson) [Orabug: 19528533] \n- i40e: clear test state bit after all ethtool tests (Shannon Nelson) [Orabug: 19528533] \n- i40e: only set up the rings to be used (Shannon Nelson) [Orabug: 19528533] \n- i40e: Enable all PCTYPEs except FCOE for RSS. (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: refactor reset code (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: Bump version (Catherine Sullivan) [Orabug: 19528533] \n- i40e: whitespace (Jeff Kirsher) [Orabug: 19528533] \n- i40e: enable early hardware support (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: Add flag for L2 VEB filtering (Kevin Scott) [Orabug: 19528533] \n- i40e: get media type during link info (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: check multi-bit state correctly (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: separate TSYNVALID and TSYNINDX fields in Rx descriptor (Jacob Keller) [Orabug: 19528533] \n- i40e: sync header files with hardware (Anjali Singhai Jain) [Orabug: 19528533] \n- i40e: restrict diag test length (Kamil Krawczyk) [Orabug: 19528533] \n- i40e: add support for triggering EMPR (Shannon Nelson) [Orabug: 19528533] \n- i40e: add interrupt test (Shannon Nelson) [Orabug: 19528533] \n- i40e: default debug mask setting (Shannon Nelson) [Orabug: 19528533] \n- i40e: fix debugging messages (Mitch Williams) [Orabug: 19528533] \n- i40e: properly add VF MAC addresses (Mitch Williams) [Orabug: 19528533] \n- i40e: retry call on timeout (Shannon Nelson) [Orabug: 19528533] \n- i40e: select reset counters correctly (Shannon Nelson) [Orabug: 19528533] \n- i40e: allow one more vector for VFs (Mitch Williams) [Orabug: 19528533] \n- i40e: firmware version fields offsets update (Anjali Singhai jain) [Orabug: 19528533] \n- i40e: simplify aq head-tail-len setups (Shannon Nelson) [Orabug: 19528533] \n- i40e: clear AQ head and tail registers (Shannon Nelson) [Orabug: 19528533] \n- i40e: register file updates (Anjali Singhai jain) [Orabug: 19528533] \n- i40e: set pf_id based on device and function numbers (Christopher Pau) [Orabug: 19528533] \n- i40e: fix null dereference (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: fix error return code in i40e_probe() (Wei Yongjun) [Orabug: 19528533] \n(Wei Yongjun) [Orabug: 19528533] \n- i40e: Bump version (Catherine Sullivan) [Orabug: 19528533] \n- i40e: use pf_id for pf function id in qtx_ctl (Shannon Nelson) [Orabug: 19528533] \n- i40e: check vsi ptrs before dumping them (Shannon Nelson) [Orabug: 19528533] \n- i40e: reorder block declarations in debugfs (Shannon Nelson) [Orabug: 19528533] \n- i40e: tweaking icr0 handling for legacy irq (Shannon Nelson) [Orabug: 19528533] \n- i40e: refactor fdir setup function (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: fix sign extension issue (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: fix use of untrusted scalar value warning (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: clamp debugfs nvm read command (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: debugfs fixups (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: fixup legacy interrupt handling (Shannon Nelson) [Orabug: 19528533] \n- i40e: assign correct vector to VF (Mitch Williams) [Orabug: 19528533] \n- i40e: don't free nonexistent rings (Mitch Williams) [Orabug: 19528533] \n- i40e: do not flush after re-enabling interrupts (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: Bump version (Catherine Sullivan) [Orabug: 19528533] \n- i40e: Add support for 64 bit netstats (Alexander Duyck) [Orabug: 19528533] \n- i40e: Move rings from pointer to array to array of pointers (Alexander Duyck) [Orabug: 19528533] \n- i40e: Replace ring container array with linked list (Alexander Duyck) [Orabug: 19528533] \n- i40e: Move q_vectors from pointer to array to array of pointers (Alexander Duyck) [Orabug: 19528533] \n- i40e: Split bytes and packets from Rx/Tx stats (Alexander Duyck) [Orabug: 19528533] \n- i40e: Add support for Tx byte queue limits (Alexander Duyck) [Orabug: 19528533] \n- i40e: Drop dead code and flags from Tx hotpath (Alexander Duyck) [Orabug: 19528533] \n- i40e: clean up Tx fast path (Alexander Duyck) [Orabug: 19528533] \n- i40e: Do not directly increment Tx next_to_use (Alexander Duyck) [Orabug: 19528533] \n- i40e: Cleanup Tx buffer info layout (Alexander Duyck) [Orabug: 19528533] \n- i40e: Drop unused completed stat (Alexander Duyck) [Orabug: 19528533] \n- i40e: Link code updates (Anjali Singhai) [Orabug: 19528533] \n- i40e: clean up coccicheck reported errors (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: better return values (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: convert ret to aq_ret (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: small clean ups from review (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: use common failure flow (Jesse Brandeburg) [Orabug: 19528533] \n- i40e: Fix device ID define names to align to standard (Shannon Nelson) [Orabug: 19528533] \n- i40evf: conform to UEK kapi (Brian Maly) [Orabug: 19528533] \n- i40evf: A0 silicon specific (Greg Rose) [Orabug: 19528533] \n- i40evf: add driver to kernel build system (Greg Rose) [Orabug: 19528533] \n- i40evf: init code and hardware support (Greg Rose) [Orabug: 19528533] \n- i40evf: driver core headers (Greg Rose) [Orabug: 19528533] \n- i40evf: virtual channel interface (Greg Rose) [Orabug: 19528533] \n- i40evf: core ethtool functionality (Greg Rose) [Orabug: 19528533] \n- i40evf: transmit and receive functionality (Greg Rose) [Orabug: 19528533] \n- i40evf: main driver core (Greg Rose) [Orabug: 19528533] \n- Revert 'i40e: upgrade to 1.0.15' (Brian Maly) [Orabug: 19528533] \n- ixgbe: Look up MAC address on SPARC systems (Martin K. Petersen) [Orabug: 18182472] \n- cpufreq: intel_pstate: allow driver to be built as a module (Brian Maly) [Orabug: 19250051] \n- cpufreq: intel_pstate: enable driver in kernel config (Brian Maly) [Orabug: 19250051] \n- cpufreq: intel_pstate: Remove core_pct rounding (Stratos Karafotis) [Orabug: 19250051] \n- cpufreq: intel_pstate: Simplify P state adjustment logic. (Stratos Karafotis) [Orabug: 19250051] \n- cpufreq: intel_pstate: Keep values in aperf/mperf in full precision (Stratos Karafotis) [Orabug: 19250051] \n- cpufreq: intel_pstate: Disable interrupts during MSRs reading (Stratos Karafotis) [Orabug: 19250051] ", "edition": 72, "modified": "2014-12-04T00:00:00", "published": "2014-12-04T00:00:00", "id": "ELSA-2014-3096", "href": "http://linux.oracle.com/errata/ELSA-2014-3096.html", "title": "Unbreakable Enterprise kernel security update", "type": "oraclelinux", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:34:15", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3646", "CVE-2014-3673", "CVE-2014-3688", "CVE-2014-3611", "CVE-2014-9322", "CVE-2014-3645", "CVE-2014-5472", "CVE-2012-6657", "CVE-2014-6410", "CVE-2014-5471", "CVE-2014-3687"], "description": "[2.6.32-504.3.3]\n- [x86] traps: stop using IST for #SS (Petr Matousek) [1172810 1172811] {CVE-2014-9322}\n[2.6.32-504.3.2]\n- [md] dm-thin: fix pool_io_hints to avoid looking at max_hw_sectors (Mike Snitzer) [1161420 1161421 1142773 1145230]\n[2.6.32-504.3.1]\n- [s390] zcrypt: toleration of new crypto adapter hardware (Hendrik Brueckner) [1158311 1134984]\n- [s390] zcrypt: support for extended number of ap domains (Hendrik Brueckner) [1158311 1134984]\n- [md] dm-thin: fix potential for infinite loop in pool_io_hints (Mike Snitzer) [1161420 1161421 1142773 1145230]\n[2.6.32-504.2.1]\n- [fs] udf: Avoid infinite loop when processing indirect ICBs (Jacob Tanenbaum) [1142319 1142320] {CVE-2014-6410}\n- [fs] isofs: unbound recursion when processing relocated directories (Jacob Tanenbaum) [1142268 1142269] {CVE-2014-5472 CVE-2014-5471}\n- [net] ipv6: delete expired route in ip6_pmtu_deliver (Hannes Frederic Sowa) [1161418 1156137]\n- [net] sctp: fix remote memory pressure from excessive queueing (Daniel Borkmann) [1155746 1154676] {CVE-2014-3688}\n- [net] sctp: fix panic on duplicate ASCONF chunks (Daniel Borkmann) [1155733 1154676] {CVE-2014-3687}\n- [net] sctp: fix skb_over_panic when receiving malformed ASCONF chunks (Daniel Borkmann) [1147857 1154676] {CVE-2014-3673}\n- [net] sctp: handle association restarts when the socket is closed (Daniel Borkmann) [1147857 1154676]\n- [md] dm-thin: refactor requeue_io to eliminate spinlock bouncing (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [md] dm-thin: optimize retry_bios_on_resume (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [md] dm-thin: sort the deferred cells (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [md] dm-thin: direct dispatch when breaking sharing (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [md] dm-thin: remap the bios in a cell immediately (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [md] dm-thin: defer whole cells rather than individual bios (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [md] dm-thin: factor out remap_and_issue_overwrite (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [md] dm-thin: performance improvement to discard processing (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [md] dm-thin: grab a virtual cell before looking up the mapping (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [md] dm-thin: implement thin_merge (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [md] dm: improve documentation and code clarity in dm_merge_bvec (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [md] dm-thin: adjust max_sectors_kb based on thinp blocksize (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [md] block: fix alignment_offset math that assumes io_min is a power-of-2 (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [md] dm-thin: throttle incoming IO (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [md] dm-thin: prefetch missing metadata pages (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [md] dm-transaction-manager: add support for prefetching blocks of metadata (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [md] dm-thin-metadata: change dm_thin_find_block to allow blocking, but not issuing, IO (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [md] dm-bio-prison: switch to using a red black tree (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [md] dm-bufio: evict buffers that are past the max age but retain some buffers (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [md] dm-bufio: switch from a huge hash table to an rbtree (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [md] dm-bufio: update last_accessed when relinking a buffer (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [md] dm-bufio: use kzalloc when allocating dm_bufio_client (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [md] dm-thin-metadata: do not allow the data block size to change (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [md] dm-thin: cleanup noflush_work to use a proper completion (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [md] dm-thin: fix DMERR typo in pool_status error path (Mike Snitzer) [1161420 1161421 1142773 1145230]\n- [fs] xfs: xlog_cil_force_lsn doesn't always wait correctly (Eric Sandeen) [1158325 1133304]\n- [netdrv] ixgbe: allow TXDCTL.WRTHRESH to be 1 will small ITR values (John Greene) [1158326 1132267]\n- [netdrv] ixgbe: Intel Change to allow itr changes without CONFIG_BQL support (John Greene) [1158326 1132267]\n- [video] offb: Fix setting of the pseudo-palette for >8bpp (Gerd Hoffmann) [1158328 1142450]\n- [video] offb: Add palette hack for qemu 'standard vga' framebuffer (Gerd Hoffmann) [1158328 1142450]\n- [video] offb: Fix bug in calculating requested vram size (Gerd Hoffmann) [1158328 1142450]\n- [net] sock_queue_err_skb() dont mess with sk_forward_alloc (Jiri Benc) [1155427 1148257]\n- [net] guard tcp_set_keepalive() to tcp sockets (Florian Westphal) [1141744 1141746] {CVE-2012-6657}\n- Revert: [net] revert 'bridge: Set vlan_features to allow offloads on vlans' (Vlad Yasevich) [1144442 1121991]\n- [x86] kvm: fix PIT timer race condition (mguzik) [1149592 1149593] {CVE-2014-3611}\n- [x86] kvm: vmx: handle invept and invvpid vm exits gracefull (mguzik) [1144826 1144837 1144827 1144838] {CVE-2014-3646 CVE-2014-3645}", "edition": 4, "modified": "2014-12-16T00:00:00", "published": "2014-12-16T00:00:00", "id": "ELSA-2014-1997", "href": "http://linux.oracle.com/errata/ELSA-2014-1997.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:35:12", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3611", "CVE-2014-3610"], "description": "[kvm-83-270.0.1.el5_11]\n- Added kvm-add-oracle-workaround-for-libvirt-bug.patch\n- Added kvm-Introduce-oel-machine-type.patch\n[kvm-83-270.el5]\n- KVM: x86: Check non canonical addresses upon WRMSR\n- Resolves: bz#1152982\n (CVE-2014-3610 kernel: kvm: noncanonical MSR writes [rhel-5.11.z])\n[kvm-83-269.el5]\n- KVM: x86: Improve thread safety in pit\n- Resolves: bz#1152985\n (CVE-2014-3611 kernel: kvm: PIT timer race condition)", "edition": 4, "modified": "2015-04-22T00:00:00", "published": "2015-04-22T00:00:00", "id": "ELSA-2015-0869", "href": "http://linux.oracle.com/errata/ELSA-2015-0869.html", "title": "kvm security update", "type": "oraclelinux", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:38:44", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3646", "CVE-2014-3182", "CVE-2014-3186", "CVE-2014-4655", "CVE-2014-3673", "CVE-2014-1739", "CVE-2014-3688", "CVE-2013-2929", "CVE-2014-3611", "CVE-2014-3181", "CVE-2014-3645", "CVE-2014-3185", "CVE-2014-4027", "CVE-2014-4654", "CVE-2014-5045", "CVE-2014-4656", "CVE-2014-3631", "CVE-2014-4652", "CVE-2014-6410", "CVE-2014-3184", "CVE-2014-3687"], "description": "[3.10.0-123.13.1]\n- Oracle Linux certificates (Alexey Petrenko)\n[3.10.0-123.13.1]\n- [powerpc] mm: Make sure a local_irq_disable prevent a parallel THP split (Don Zickus) [1151057 1083296]\n- [powerpc] Implement __get_user_pages_fast() (Don Zickus) [1151057 1083296]\n- [scsi] vmw_pvscsi: Some improvements in pvscsi driver (Ewan Milne) [1144016 1075090]\n- [scsi] vmw_pvscsi: Add support for I/O requests coalescing (Ewan Milne) [1144016 1075090]\n- [scsi] vmw_pvscsi: Fix pvscsi_abort() function (Ewan Milne) [1144016 1075090]\n[3.10.0-123.12.1]\n- [alsa] control: Make sure that id->index does not overflow (Jaroslav Kysela) [1117313 1117314] {CVE-2014-4656}\n- [alsa] control: Handle numid overflow (Jaroslav Kysela) [1117313 1117314] {CVE-2014-4656}\n- [alsa] control: Protect user controls against concurrent access (Jaroslav Kysela) [1117338 1117339] {CVE-2014-4652}\n- [alsa] control: Fix replacing user controls (Jaroslav Kysela) [1117323 1117324] {CVE-2014-4654 CVE-2014-4655}\n- [net] sctp: fix remote memory pressure from excessive queueing (Daniel Borkmann) [1155750 1152755] {CVE-2014-3688}\n- [net] sctp: fix panic on duplicate ASCONF chunks (Daniel Borkmann) [1155737 1152755] {CVE-2014-3687}\n- [net] sctp: fix skb_over_panic when receiving malformed ASCONF chunks (Daniel Borkmann) [1147856 1152755] {CVE-2014-3673}\n- [net] sctp: handle association restarts when the socket is closed (Daniel Borkmann) [1147856 1152755] [1155737 1152755] [1155750 1152755]\n- [pci] Add ACS quirk for Intel 10G NICs (Alex Williamson) [1156447 1141399]\n- [pci] Add ACS quirk for Solarflare SFC9120 & SFC9140 (Alex Williamson) [1158316 1131552]\n- [lib] assoc_array: Fix termination condition in assoc array garbage collection (David Howells) [1155136 1139431] {CVE-2014-3631}\n- [block] cfq-iosched: Add comments on update timing of weight (Vivek Goyal) [1152874 1116126]\n- [block] cfq-iosched: Fix wrong children_weight calculation (Vivek Goyal) [1152874 1116126]\n- [powerpc] mm: Check paca psize is up to date for huge mappings (Gustavo Duarte) [1151927 1107337]\n- [x86] perf/intel: ignore CondChgd bit to avoid false NMI handling (Don Zickus) [1146819 1110264]\n- [x86] smpboot: initialize secondary CPU only if master CPU will wait for it (Phillip Lougher) [1144295 968147]\n- [x86] smpboot: Log error on secondary CPU wakeup failure at ERR level (Igor Mammedov) [1144295 968147]\n- [x86] smpboot: Fix list/memory corruption on CPU hotplug (Igor Mammedov) [1144295 968147]\n- [acpi] processor: do not mark present at boot but not onlined CPU as onlined (Igor Mammedov) [1144295 968147]\n- [fs] udf: Avoid infinite loop when processing indirect ICBs (Jacob Tanenbaum) [1142321 1142322] {CVE-2014-6410}\n- [hid] picolcd: fix memory corruption via OOB write (Jacob Tanenbaum) [1141408 1141409] {CVE-2014-3186}\n- [usb] serial/whiteheat: fix memory corruption flaw (Jacob Tanenbaum) [1141403 1141404] {CVE-2014-3185}\n- [hid] fix off by one error in various _report_fixup routines (Jacob Tanenbaum) [1141393 1141394] {CVE-2014-3184}\n- [hid] logitech-dj: fix OOB array access (Jacob Tanenbaum) [1141211 1141212] {CVE-2014-3182}\n- [hid] fix OOB write in magicmouse driver (Jacob Tanenbaum) [1141176 1141177] {CVE-2014-3181}\n- [acpi] Fix bug when ACPI reset register is implemented in system memory (Nigel Croxon) [1136525 1109971]\n- [fs] vfs: fix ref count leak in path_mountpoint() (Ian Kent) [1122481 1122376] {CVE-2014-5045}\n- [kernel] ptrace: get_dumpable() incorrect tests (Jacob Tanenbaum) [1111605 1111606] {CVE-2013-2929}\n- [media] media-device: fix an information leakage (Jacob Tanenbaum) [1109776 1109777] {CVE-2014-1739}\n- [target] rd: Refactor rd_build_device_space + rd_release_device_space (Denys Vlasenko) [1108754 1108755] {CVE-2014-4027}\n- [block] blkcg: fix use-after-free in __blkg_release_rcu() by making blkcg_gq refcnt an atomic_t (Vivek Goyal) [1158313 1118436]\n- [virt] kvm: fix PIT timer race condition (Petr Matousek) [1144879 1144880] {CVE-2014-3611}\n- [virt] kvm/vmx: handle invept and invvpid vm exits gracefully (Petr Matousek) [1145449 1116936] [1144828 1144829] {CVE-2014-3645 CVE-2014-3646}\n[3.10.0-123.11.1]\n- [net] fix UDP tunnel GSO of frag_list GRO packets (Phillip Lougher) [1149661 1119392]\n[3.10.0-123.10.1]\n- [pci] hotplug: Prevent NULL dereference during pciehp probe (Myron Stowe) [1142393 1133107]\n- [kernel] workqueue: apply __WQ_ORDERED to create_singlethread_workqueue() (Tomas Henzl) [1151314 1131563]", "edition": 4, "modified": "2014-12-09T00:00:00", "published": "2014-12-09T00:00:00", "id": "ELSA-2014-1971", "href": "http://linux.oracle.com/errata/ELSA-2014-1971.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "centos": [{"lastseen": "2019-12-20T18:26:51", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3646", "CVE-2014-3611", "CVE-2014-3645", "CVE-2014-3185"], "description": "**CentOS Errata and Security Advisory** CESA-2014:1843\n\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A race condition flaw was found in the way the Linux kernel's KVM\nsubsystem handled PIT (Programmable Interval Timer) emulation. A guest user\nwho has access to the PIT I/O ports could use this flaw to crash the host.\n(CVE-2014-3611, Important)\n\n* A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB Request\nBlocks buffers. An attacker with physical access to the system could use\nthis flaw to crash the system or, potentially, escalate their privileges on\nthe system. (CVE-2014-3185, Moderate)\n\n* It was found that the Linux kernel's KVM subsystem did not handle the VM\nexits gracefully for the invept (Invalidate Translations Derived from EPT)\nand invvpid (Invalidate Translations Based on VPID) instructions. On hosts\nwith an Intel processor and invept/invppid VM exit support, an unprivileged\nguest user could use these instructions to crash the guest. (CVE-2014-3645,\nCVE-2014-3646, Moderate)\n\nRed Hat would like to thank Lars Bull of Google for reporting\nCVE-2014-3611, and the Advanced Threat Research team at Intel Security for\nreporting CVE-2014-3645 and CVE-2014-3646.\n\nThis update also fixes the following bugs:\n\n* This update fixes several race conditions between PCI error recovery\ncallbacks and potential calls of the ifup and ifdown commands in the tg3\ndriver. When triggered, these race conditions could cause a kernel crash.\n(BZ#1142570)\n\n* Previously, GFS2 failed to unmount a sub-mounted GFS2 file system if its\nparent was also a GFS2 file system. This problem has been fixed by adding\nthe appropriate d_op->d_hash() routine call for the last component of the\nmount point path in the path name lookup mechanism code (namei).\n(BZ#1145193)\n\n* Due to previous changes in the virtio-net driver, a Red Hat Enterprise\nLinux 6.6 guest was unable to boot with the \"mgr_rxbuf=off\" option\nspecified. This was caused by providing the page_to_skb() function with an\nincorrect packet length in the driver's Rx path. This problem has been\nfixed and the guest in the described scenario can now boot successfully.\n(BZ#1148693)\n\n* When using one of the newer IPSec Authentication Header (AH) algorithms\nwith Openswan, a kernel panic could occur. This happened because the\nmaximum truncated ICV length was too small. To fix this problem, the\nMAX_AH_AUTH_LEN parameter has been set to 64. (BZ#1149083)\n\n* A bug in the IPMI driver caused the kernel to panic when an IPMI\ninterface was removed using the hotmod script. The IPMI driver has been\nfixed to properly clean the relevant data when removing an IPMI interface.\n(BZ#1149578)\n\n* Due to a bug in the IPMI driver, the kernel could panic when adding an\nIPMI interface that was previously removed using the hotmod script.\nThis update fixes this bug by ensuring that the relevant shadow structure\nis initialized at the right time. (BZ#1149580)\n\nAll kernel users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. The system must be\nrebooted for this update to take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2014-November/032786.html\n\n**Affected packages:**\nkernel\nkernel-abi-whitelists\nkernel-debug\nkernel-debug-devel\nkernel-devel\nkernel-doc\nkernel-firmware\nkernel-headers\nperf\npython-perf\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2014-1843.html", "edition": 3, "modified": "2014-11-11T19:31:00", "published": "2014-11-11T19:31:00", "href": "http://lists.centos.org/pipermail/centos-announce/2014-November/032786.html", "id": "CESA-2014:1843", "title": "kernel, perf, python security update", "type": "centos", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-14T13:38:35", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3646", "CVE-2014-5077", "CVE-2014-3611", "CVE-2014-4653", "CVE-2014-3645"], "description": "**CentOS Errata and Security Advisory** CESA-2014:1724\n\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* A race condition flaw was found in the way the Linux kernel's KVM\nsubsystem handled PIT (Programmable Interval Timer) emulation. A guest user\nwho has access to the PIT I/O ports could use this flaw to crash the host.\n(CVE-2014-3611, Important)\n\n* A NULL pointer dereference flaw was found in the way the Linux kernel's\nStream Control Transmission Protocol (SCTP) implementation handled\nsimultaneous connections between the same hosts. A remote attacker could\nuse this flaw to crash the system. (CVE-2014-5077, Important)\n\n* It was found that the Linux kernel's KVM subsystem did not handle the VM\nexits gracefully for the invept (Invalidate Translations Derived from EPT)\nand invvpid (Invalidate Translations Based on VPID) instructions. On hosts\nwith an Intel processor and invept/invppid VM exit support, an unprivileged\nguest user could use these instructions to crash the guest. (CVE-2014-3645,\nCVE-2014-3646, Moderate)\n\n* A use-after-free flaw was found in the way the Linux kernel's Advanced\nLinux Sound Architecture (ALSA) implementation handled user controls. A\nlocal, privileged user could use this flaw to crash the system.\n(CVE-2014-4653, Moderate)\n\nRed Hat would like to thank Lars Bull of Google for reporting\nCVE-2014-3611, and the Advanced Threat Research team at Intel Security for\nreporting CVE-2014-3645 and CVE-2014-3646.\n\nBug fixes:\n\n* A known issue that could prevent Chelsio adapters using the cxgb4 driver\nfrom being initialized on IBM POWER8 systems has been fixed. These\nadapters can now be used on IBM POWER8 systems as expected. (BZ#1130548)\n\n* When bringing a hot-added CPU online, the kernel did not initialize a\nCPU mask properly, which could result in a kernel panic. This update\ncorrects the bug by ensuring that the CPU mask is properly initialized and\nthe correct NUMA node selected. (BZ#1134715)\n\n* The kernel could fail to bring a CPU online if the hardware supported\nboth, the acpi-cpufreq and intel_pstate modules. This update ensures that\nthe acpi-cpufreq module is not loaded in the intel_pstate module is\nloaded. (BZ#1134716)\n\n* Due to a bug in the time accounting of the kernel scheduler, a divide\nerror could occur when hot adding a CPU. To fix this problem, the kernel\nscheduler time accounting has been reworked. (BZ#1134717)\n\n* The kernel did not handle exceptions caused by an invalid floating point\ncontrol (FPC) register, resulting in a kernel oops. This problem has been\nfixed by placing the label to handle these exceptions to the correct place\nin the code. (BZ#1138733)\n\n* A previous change to the kernel for the PowerPC architecture changed\nimplementation of the compat_sys_sendfile() function. Consequently, the\n64-bit sendfile() system call stopped working for files larger than 2 GB\non PowerPC. This update restores previous behavior of sendfile() on\nPowerPC, and it again process files bigger than 2 GB as expected.\n(BZ#1139126)\n\n* Previously, the kernel scheduler could schedule a CPU topology update\neven though the topology did not change. This could negatively affect the\nCPU load balancing, cause degradation of the system performance, and\neventually result in a kernel oops. This problem has been fixed by\nskipping the CPU topology update if the topology has not actually changed.\n(BZ#1140300)\n\n* Previously, recovery of a double-degraded RAID6 array could, under\ncertain circumstances, result in data corruption. This could happen\nbecause the md driver was using an optimization that is safe to use only\nfor single-degraded arrays. This update ensures that this optimization is\nskipped during the recovery of double-degraded RAID6 arrays. (BZ#1143850)\n\nAll kernel users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. The system must be\nrebooted for this update to take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2014-October/032748.html\n\n**Affected packages:**\nkernel\nkernel-abi-whitelists\nkernel-debug\nkernel-debug-devel\nkernel-devel\nkernel-doc\nkernel-headers\nkernel-tools\nkernel-tools-libs\nkernel-tools-libs-devel\nperf\npython-perf\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2014-1724.html", "edition": 4, "modified": "2014-10-29T02:12:28", "published": "2014-10-29T02:12:28", "href": "http://lists.centos.org/pipermail/centos-announce/2014-October/032748.html", "id": "CESA-2014:1724", "title": "kernel, perf, python security update", "type": "centos", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-12-20T18:27:55", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3611", "CVE-2014-3610"], "description": "**CentOS Errata and Security Advisory** CESA-2015:0869\n\n\nKVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built for\nthe standard Red Hat Enterprise Linux kernel.\n\nIt was found that KVM's Write to Model Specific Register (WRMSR)\ninstruction emulation would write non-canonical values passed in by the\nguest to certain MSRs in the host's context. A privileged guest user could\nuse this flaw to crash the host. (CVE-2014-3610)\n\nA race condition flaw was found in the way the Linux kernel's KVM subsystem\nhandled PIT (Programmable Interval Timer) emulation. A guest user who has\naccess to the PIT I/O ports could use this flaw to crash the host.\n(CVE-2014-3611)\n\nRed Hat would like to thank Lars Bull of Google and Nadav Amit for\nreporting the CVE-2014-3610 issue, and Lars Bull of Google for reporting\nthe CVE-2014-3611 issue.\n\nAll kvm users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. Note: The procedure in\nthe Solution section must be performed before this update will take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2015-April/033123.html\n\n**Affected packages:**\nkmod-kvm\nkmod-kvm-debug\nkvm\nkvm-qemu-img\nkvm-tools\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2015-0869.html", "edition": 3, "modified": "2015-04-22T14:47:16", "published": "2015-04-22T14:47:16", "href": "http://lists.centos.org/pipermail/centos-announce/2015-April/033123.html", "id": "CESA-2015:0869", "title": "kmod, kvm security update", "type": "centos", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}], "nessus": [{"lastseen": "2021-01-17T13:15:07", "description": "Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A race condition flaw was found in the way the Linux kernel's KVM\nsubsystem handled PIT (Programmable Interval Timer) emulation. A guest\nuser who has access to the PIT I/O ports could use this flaw to crash\nthe host. (CVE-2014-3611, Important)\n\n* A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB\nRequest Blocks buffers. An attacker with physical access to the system\ncould use this flaw to crash the system or, potentially, escalate\ntheir privileges on the system. (CVE-2014-3185, Moderate)\n\n* It was found that the Linux kernel's KVM subsystem did not handle\nthe VM exits gracefully for the invept (Invalidate Translations\nDerived from EPT) and invvpid (Invalidate Translations Based on VPID)\ninstructions. On hosts with an Intel processor and invept/invppid VM\nexit support, an unprivileged guest user could use these instructions\nto crash the guest. (CVE-2014-3645, CVE-2014-3646, Moderate)\n\nRed Hat would like to thank Lars Bull of Google for reporting\nCVE-2014-3611, and the Advanced Threat Research team at Intel Security\nfor reporting CVE-2014-3645 and CVE-2014-3646.\n\nThis update also fixes the following bugs :\n\n* This update fixes several race conditions between PCI error recovery\ncallbacks and potential calls of the ifup and ifdown commands in the\ntg3 driver. When triggered, these race conditions could cause a kernel\ncrash. (BZ#1142570)\n\n* Previously, GFS2 failed to unmount a sub-mounted GFS2 file system if\nits parent was also a GFS2 file system. This problem has been fixed by\nadding the appropriate d_op->d_hash() routine call for the last\ncomponent of the mount point path in the path name lookup mechanism\ncode (namei). (BZ#1145193)\n\n* Due to previous changes in the virtio-net driver, a Red Hat\nEnterprise Linux 6.6 guest was unable to boot with the 'mgr_rxbuf=off'\noption specified. This was caused by providing the page_to_skb()\nfunction with an incorrect packet length in the driver's Rx path. This\nproblem has been fixed and the guest in the described scenario can now\nboot successfully. (BZ#1148693)\n\n* When using one of the newer IPSec Authentication Header (AH)\nalgorithms with Openswan, a kernel panic could occur. This happened\nbecause the maximum truncated ICV length was too small. To fix this\nproblem, the MAX_AH_AUTH_LEN parameter has been set to 64.\n(BZ#1149083)\n\n* A bug in the IPMI driver caused the kernel to panic when an IPMI\ninterface was removed using the hotmod script. The IPMI driver has\nbeen fixed to properly clean the relevant data when removing an IPMI\ninterface. (BZ#1149578)\n\n* Due to a bug in the IPMI driver, the kernel could panic when adding\nan IPMI interface that was previously removed using the hotmod script.\nThis update fixes this bug by ensuring that the relevant shadow\nstructure is initialized at the right time. (BZ#1149580)\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The system\nmust be rebooted for this update to take effect.", "edition": 27, "cvss3": {"score": 5.5, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}, "published": "2014-11-12T00:00:00", "title": "RHEL 6 : kernel (RHSA-2014:1843)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3646", "CVE-2014-3611", "CVE-2014-3645", "CVE-2014-3185"], "modified": "2014-11-12T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-s390x", "p-cpe:/a:redhat:enterprise_linux:kernel-firmware", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "cpe:/o:redhat:enterprise_linux:6.6", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel", "p-cpe:/a:redhat:enterprise_linux:perf-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:python-perf", "cpe:/o:redhat:enterprise_linux:6", "p-cpe:/a:redhat:enterprise_linux:perf", "p-cpe:/a:redhat:enterprise_linux:kernel-doc", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-i686"], "id": "REDHAT-RHSA-2014-1843.NASL", "href": "https://www.tenable.com/plugins/nessus/79206", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2014:1843. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(79206);\n script_version(\"1.23\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2014-3185\", \"CVE-2014-3611\", \"CVE-2014-3645\", \"CVE-2014-3646\");\n script_bugtraq_id(69781, 70743, 70745, 70746);\n script_xref(name:\"RHSA\", value:\"2014:1843\");\n\n script_name(english:\"RHEL 6 : kernel (RHSA-2014:1843)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A race condition flaw was found in the way the Linux kernel's KVM\nsubsystem handled PIT (Programmable Interval Timer) emulation. A guest\nuser who has access to the PIT I/O ports could use this flaw to crash\nthe host. (CVE-2014-3611, Important)\n\n* A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB\nRequest Blocks buffers. An attacker with physical access to the system\ncould use this flaw to crash the system or, potentially, escalate\ntheir privileges on the system. (CVE-2014-3185, Moderate)\n\n* It was found that the Linux kernel's KVM subsystem did not handle\nthe VM exits gracefully for the invept (Invalidate Translations\nDerived from EPT) and invvpid (Invalidate Translations Based on VPID)\ninstructions. On hosts with an Intel processor and invept/invppid VM\nexit support, an unprivileged guest user could use these instructions\nto crash the guest. (CVE-2014-3645, CVE-2014-3646, Moderate)\n\nRed Hat would like to thank Lars Bull of Google for reporting\nCVE-2014-3611, and the Advanced Threat Research team at Intel Security\nfor reporting CVE-2014-3645 and CVE-2014-3646.\n\nThis update also fixes the following bugs :\n\n* This update fixes several race conditions between PCI error recovery\ncallbacks and potential calls of the ifup and ifdown commands in the\ntg3 driver. When triggered, these race conditions could cause a kernel\ncrash. (BZ#1142570)\n\n* Previously, GFS2 failed to unmount a sub-mounted GFS2 file system if\nits parent was also a GFS2 file system. This problem has been fixed by\nadding the appropriate d_op->d_hash() routine call for the last\ncomponent of the mount point path in the path name lookup mechanism\ncode (namei). (BZ#1145193)\n\n* Due to previous changes in the virtio-net driver, a Red Hat\nEnterprise Linux 6.6 guest was unable to boot with the 'mgr_rxbuf=off'\noption specified. This was caused by providing the page_to_skb()\nfunction with an incorrect packet length in the driver's Rx path. This\nproblem has been fixed and the guest in the described scenario can now\nboot successfully. (BZ#1148693)\n\n* When using one of the newer IPSec Authentication Header (AH)\nalgorithms with Openswan, a kernel panic could occur. This happened\nbecause the maximum truncated ICV length was too small. To fix this\nproblem, the MAX_AH_AUTH_LEN parameter has been set to 64.\n(BZ#1149083)\n\n* A bug in the IPMI driver caused the kernel to panic when an IPMI\ninterface was removed using the hotmod script. The IPMI driver has\nbeen fixed to properly clean the relevant data when removing an IPMI\ninterface. (BZ#1149578)\n\n* Due to a bug in the IPMI driver, the kernel could panic when adding\nan IPMI interface that was previously removed using the hotmod script.\nThis update fixes this bug by ensuring that the relevant shadow\nstructure is initialized at the right time. (BZ#1149580)\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The system\nmust be rebooted for this update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2014:1843\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3185\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3611\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3646\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3645\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-i686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-s390x\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/09/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/11/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/11/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2014-3185\", \"CVE-2014-3611\", \"CVE-2014-3645\", \"CVE-2014-3646\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2014:1843\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2014:1843\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"kernel-abi-whitelists-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-debug-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-debug-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debug-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-debug-debuginfo-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-debug-debuginfo-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debug-debuginfo-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-debug-devel-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-debug-devel-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debug-devel-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-debuginfo-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-debuginfo-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debuginfo-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-debuginfo-common-i686-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-debuginfo-common-s390x-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debuginfo-common-x86_64-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-devel-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-devel-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-devel-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"kernel-doc-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"kernel-firmware-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-headers-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-headers-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-headers-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-kdump-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-kdump-debuginfo-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-kdump-devel-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"perf-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"perf-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"perf-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"perf-debuginfo-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"perf-debuginfo-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"perf-debuginfo-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"python-perf-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"python-perf-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"python-perf-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"python-perf-debuginfo-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"python-perf-debuginfo-2.6.32-504.1.3.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"python-perf-debuginfo-2.6.32-504.1.3.el6\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-abi-whitelists / kernel-debug / etc\");\n }\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T12:49:17", "description": "From Red Hat Security Advisory 2014:1843 :\n\nUpdated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A race condition flaw was found in the way the Linux kernel's KVM\nsubsystem handled PIT (Programmable Interval Timer) emulation. A guest\nuser who has access to the PIT I/O ports could use this flaw to crash\nthe host. (CVE-2014-3611, Important)\n\n* A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB\nRequest Blocks buffers. An attacker with physical access to the system\ncould use this flaw to crash the system or, potentially, escalate\ntheir privileges on the system. (CVE-2014-3185, Moderate)\n\n* It was found that the Linux kernel's KVM subsystem did not handle\nthe VM exits gracefully for the invept (Invalidate Translations\nDerived from EPT) and invvpid (Invalidate Translations Based on VPID)\ninstructions. On hosts with an Intel processor and invept/invppid VM\nexit support, an unprivileged guest user could use these instructions\nto crash the guest. (CVE-2014-3645, CVE-2014-3646, Moderate)\n\nRed Hat would like to thank Lars Bull of Google for reporting\nCVE-2014-3611, and the Advanced Threat Research team at Intel Security\nfor reporting CVE-2014-3645 and CVE-2014-3646.\n\nThis update also fixes the following bugs :\n\n* This update fixes several race conditions between PCI error recovery\ncallbacks and potential calls of the ifup and ifdown commands in the\ntg3 driver. When triggered, these race conditions could cause a kernel\ncrash. (BZ#1142570)\n\n* Previously, GFS2 failed to unmount a sub-mounted GFS2 file system if\nits parent was also a GFS2 file system. This problem has been fixed by\nadding the appropriate d_op->d_hash() routine call for the last\ncomponent of the mount point path in the path name lookup mechanism\ncode (namei). (BZ#1145193)\n\n* Due to previous changes in the virtio-net driver, a Red Hat\nEnterprise Linux 6.6 guest was unable to boot with the 'mgr_rxbuf=off'\noption specified. This was caused by providing the page_to_skb()\nfunction with an incorrect packet length in the driver's Rx path. This\nproblem has been fixed and the guest in the described scenario can now\nboot successfully. (BZ#1148693)\n\n* When using one of the newer IPSec Authentication Header (AH)\nalgorithms with Openswan, a kernel panic could occur. This happened\nbecause the maximum truncated ICV length was too small. To fix this\nproblem, the MAX_AH_AUTH_LEN parameter has been set to 64.\n(BZ#1149083)\n\n* A bug in the IPMI driver caused the kernel to panic when an IPMI\ninterface was removed using the hotmod script. The IPMI driver has\nbeen fixed to properly clean the relevant data when removing an IPMI\ninterface. (BZ#1149578)\n\n* Due to a bug in the IPMI driver, the kernel could panic when adding\nan IPMI interface that was previously removed using the hotmod script.\nThis update fixes this bug by ensuring that the relevant shadow\nstructure is initialized at the right time. (BZ#1149580)\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The system\nmust be rebooted for this update to take effect.", "edition": 24, "cvss3": {"score": 5.5, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}, "published": "2014-11-12T00:00:00", "title": "Oracle Linux 6 : kernel (ELSA-2014-1843)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3646", "CVE-2014-3611", "CVE-2014-3645", "CVE-2014-3185"], "modified": "2014-11-12T00:00:00", "cpe": ["cpe:/o:oracle:linux:6", "p-cpe:/a:oracle:linux:kernel-debug", "p-cpe:/a:oracle:linux:kernel-devel", "p-cpe:/a:oracle:linux:kernel-doc", "p-cpe:/a:oracle:linux:perf", "p-cpe:/a:oracle:linux:kernel-debug-devel", "p-cpe:/a:oracle:linux:kernel-headers", "p-cpe:/a:oracle:linux:kernel-abi-whitelists", "p-cpe:/a:oracle:linux:kernel", "p-cpe:/a:oracle:linux:kernel-firmware", "p-cpe:/a:oracle:linux:python-perf"], "id": "ORACLELINUX_ELSA-2014-1843.NASL", "href": "https://www.tenable.com/plugins/nessus/79201", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2014:1843 and \n# Oracle Linux Security Advisory ELSA-2014-1843 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(79201);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2014-3185\", \"CVE-2014-3611\", \"CVE-2014-3645\", \"CVE-2014-3646\");\n script_bugtraq_id(69781, 70743, 70745, 70746);\n script_xref(name:\"RHSA\", value:\"2014:1843\");\n\n script_name(english:\"Oracle Linux 6 : kernel (ELSA-2014-1843)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"From Red Hat Security Advisory 2014:1843 :\n\nUpdated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A race condition flaw was found in the way the Linux kernel's KVM\nsubsystem handled PIT (Programmable Interval Timer) emulation. A guest\nuser who has access to the PIT I/O ports could use this flaw to crash\nthe host. (CVE-2014-3611, Important)\n\n* A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB\nRequest Blocks buffers. An attacker with physical access to the system\ncould use this flaw to crash the system or, potentially, escalate\ntheir privileges on the system. (CVE-2014-3185, Moderate)\n\n* It was found that the Linux kernel's KVM subsystem did not handle\nthe VM exits gracefully for the invept (Invalidate Translations\nDerived from EPT) and invvpid (Invalidate Translations Based on VPID)\ninstructions. On hosts with an Intel processor and invept/invppid VM\nexit support, an unprivileged guest user could use these instructions\nto crash the guest. (CVE-2014-3645, CVE-2014-3646, Moderate)\n\nRed Hat would like to thank Lars Bull of Google for reporting\nCVE-2014-3611, and the Advanced Threat Research team at Intel Security\nfor reporting CVE-2014-3645 and CVE-2014-3646.\n\nThis update also fixes the following bugs :\n\n* This update fixes several race conditions between PCI error recovery\ncallbacks and potential calls of the ifup and ifdown commands in the\ntg3 driver. When triggered, these race conditions could cause a kernel\ncrash. (BZ#1142570)\n\n* Previously, GFS2 failed to unmount a sub-mounted GFS2 file system if\nits parent was also a GFS2 file system. This problem has been fixed by\nadding the appropriate d_op->d_hash() routine call for the last\ncomponent of the mount point path in the path name lookup mechanism\ncode (namei). (BZ#1145193)\n\n* Due to previous changes in the virtio-net driver, a Red Hat\nEnterprise Linux 6.6 guest was unable to boot with the 'mgr_rxbuf=off'\noption specified. This was caused by providing the page_to_skb()\nfunction with an incorrect packet length in the driver's Rx path. This\nproblem has been fixed and the guest in the described scenario can now\nboot successfully. (BZ#1148693)\n\n* When using one of the newer IPSec Authentication Header (AH)\nalgorithms with Openswan, a kernel panic could occur. This happened\nbecause the maximum truncated ICV length was too small. To fix this\nproblem, the MAX_AH_AUTH_LEN parameter has been set to 64.\n(BZ#1149083)\n\n* A bug in the IPMI driver caused the kernel to panic when an IPMI\ninterface was removed using the hotmod script. The IPMI driver has\nbeen fixed to properly clean the relevant data when removing an IPMI\ninterface. (BZ#1149578)\n\n* Due to a bug in the IPMI driver, the kernel could panic when adding\nan IPMI interface that was previously removed using the hotmod script.\nThis update fixes this bug by ensuring that the relevant shadow\nstructure is initialized at the right time. (BZ#1149580)\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The system\nmust be rebooted for this update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2014-November/004630.html\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/09/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/11/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/11/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 6\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2014-3185\", \"CVE-2014-3611\", \"CVE-2014-3645\", \"CVE-2014-3646\"); \n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for ELSA-2014-1843\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nkernel_major_minor = get_kb_item(\"Host/uname/major_minor\");\nif (empty_or_null(kernel_major_minor)) exit(1, \"Unable to determine kernel major-minor level.\");\nexpected_kernel_major_minor = \"2.6\";\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, \"running kernel level \" + expected_kernel_major_minor + \", it is running kernel level \" + kernel_major_minor);\n\nflag = 0;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-2.6.32-504.1.3.el6\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-abi-whitelists-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-abi-whitelists-2.6.32-504.1.3.el6\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-debug-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-debug-2.6.32-504.1.3.el6\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-debug-devel-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-debug-devel-2.6.32-504.1.3.el6\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-devel-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-devel-2.6.32-504.1.3.el6\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-doc-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-doc-2.6.32-504.1.3.el6\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-firmware-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-firmware-2.6.32-504.1.3.el6\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-headers-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-headers-2.6.32-504.1.3.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"perf-2.6.32-504.1.3.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"python-perf-2.6.32-504.1.3.el6\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"affected kernel\");\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-15T01:31:05", "description": "CVE-2014-3185\n\nMultiple buffer overflows in the command_port_read_callback function\nin drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver\nin the Linux kernel before 3.16.2 allow physically proximate attackers\nto execute arbitrary code or cause a denial of service (memory\ncorruption and system crash) via a crafted device that provides a\nlarge amount of (1) EHCI or (2) XHCI data associated with a bulk\nresponse.\n\nCVE-2014-3611 Race condition in the __kvm_migrate_pit_timer function\nin arch/x86/kvm/i8254.c in the KVM subsystem in the Linux kernel\nthrough 3.17.2 allows guest OS users to cause a denial of service\n(host OS crash) by leveraging incorrect PIT emulation.\n\nCVE-2014-3645 arch/x86/kvm/vmx.c in the KVM subsystem in the Linux\nkernel before 3.12 does not have an exit handler for the INVEPT\ninstruction, which allows guest OS users to cause a denial of service\n(guest OS crash) via a crafted application.\n\nCVE-2014-3646 arch/x86/kvm/vmx.c in the KVM subsystem in the Linux\nkernel through 3.17.2 does not have an exit handler for the INVVPID\ninstruction, which allows guest OS users to cause a denial of service\n(guest OS crash) via a crafted application.\n\nImpact\n\nAn attacker may be able to gain access to unauthorized information,\nperform unauthorized modification of data, or cause disruption of\nservices. CVE-2014-3185 require physical access to the device.\nCVE-2014-3611, CVE-2014-3645, and CVE-2014-3646 are considered local,\nas they are exploitable only by an authenticated user.", "edition": 24, "cvss3": {"score": 5.5, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}, "published": "2014-12-17T00:00:00", "title": "F5 Networks BIG-IP : Linux kernel driver vulnerabilities (K15912)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3646", "CVE-2014-3611", "CVE-2014-3645", "CVE-2014-3185"], "modified": "2014-12-17T00:00:00", "cpe": ["cpe:/a:f5:big-ip_global_traffic_manager", "cpe:/a:f5:big-ip_link_controller", "cpe:/a:f5:big-ip_advanced_firewall_manager", "cpe:/a:f5:big-ip_policy_enforcement_manager", "cpe:/a:f5:big-ip_application_security_manager", "cpe:/a:f5:big-ip_application_acceleration_manager", "cpe:/h:f5:big-ip_protocol_security_manager", "cpe:/a:f5:big-ip_local_traffic_manager", "cpe:/a:f5:big-ip_wan_optimization_manager", "cpe:/h:f5:big-ip", "cpe:/a:f5:big-ip_application_visibility_and_reporting", "cpe:/a:f5:big-ip_webaccelerator", "cpe:/a:f5:big-ip_access_policy_manager"], "id": "F5_BIGIP_SOL15912.NASL", "href": "https://www.tenable.com/plugins/nessus/80059", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from F5 Networks BIG-IP Solution K15912.\n#\n# The text description of this plugin is (C) F5 Networks.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(80059);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/08/14\");\n\n script_cve_id(\"CVE-2014-3185\", \"CVE-2014-3611\", \"CVE-2014-3645\", \"CVE-2014-3646\");\n script_bugtraq_id(69781, 70743, 70745, 70746);\n\n script_name(english:\"F5 Networks BIG-IP : Linux kernel driver vulnerabilities (K15912)\");\n script_summary(english:\"Checks the BIG-IP version.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote device is missing a vendor-supplied security patch.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"CVE-2014-3185\n\nMultiple buffer overflows in the command_port_read_callback function\nin drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver\nin the Linux kernel before 3.16.2 allow physically proximate attackers\nto execute arbitrary code or cause a denial of service (memory\ncorruption and system crash) via a crafted device that provides a\nlarge amount of (1) EHCI or (2) XHCI data associated with a bulk\nresponse.\n\nCVE-2014-3611 Race condition in the __kvm_migrate_pit_timer function\nin arch/x86/kvm/i8254.c in the KVM subsystem in the Linux kernel\nthrough 3.17.2 allows guest OS users to cause a denial of service\n(host OS crash) by leveraging incorrect PIT emulation.\n\nCVE-2014-3645 arch/x86/kvm/vmx.c in the KVM subsystem in the Linux\nkernel before 3.12 does not have an exit handler for the INVEPT\ninstruction, which allows guest OS users to cause a denial of service\n(guest OS crash) via a crafted application.\n\nCVE-2014-3646 arch/x86/kvm/vmx.c in the KVM subsystem in the Linux\nkernel through 3.17.2 does not have an exit handler for the INVVPID\ninstruction, which allows guest OS users to cause a denial of service\n(guest OS crash) via a crafted application.\n\nImpact\n\nAn attacker may be able to gain access to unauthorized information,\nperform unauthorized modification of data, or cause disruption of\nservices. CVE-2014-3185 require physical access to the device.\nCVE-2014-3611, CVE-2014-3645, and CVE-2014-3646 are considered local,\nas they are exploitable only by an authenticated user.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://support.f5.com/csp/article/K15912\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Upgrade to one of the non-vulnerable versions listed in the F5\nSolution K15912.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_access_policy_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_advanced_firewall_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_application_acceleration_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_application_security_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_application_visibility_and_reporting\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_global_traffic_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_link_controller\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_local_traffic_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_policy_enforcement_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_wan_optimization_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_webaccelerator\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/h:f5:big-ip\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/h:f5:big-ip_protocol_security_manager\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/09/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/12/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/12/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"F5 Networks Local Security Checks\");\n\n script_dependencies(\"f5_bigip_detect.nbin\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/BIG-IP/hotfix\", \"Host/BIG-IP/modules\", \"Host/BIG-IP/version\", \"Settings/ParanoidReport\");\n\n exit(0);\n}\n\n\ninclude(\"f5_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nversion = get_kb_item(\"Host/BIG-IP/version\");\nif ( ! version ) audit(AUDIT_OS_NOT, \"F5 Networks BIG-IP\");\nif ( isnull(get_kb_item(\"Host/BIG-IP/hotfix\")) ) audit(AUDIT_KB_MISSING, \"Host/BIG-IP/hotfix\");\nif ( ! get_kb_item(\"Host/BIG-IP/modules\") ) audit(AUDIT_KB_MISSING, \"Host/BIG-IP/modules\");\n\nsol = \"K15912\";\nvmatrix = make_array();\n\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\n# AFM\nvmatrix[\"AFM\"] = make_array();\nvmatrix[\"AFM\"][\"affected\" ] = make_list(\"11.6.0-11.6.1\",\"11.3.0-11.5.4\");\nvmatrix[\"AFM\"][\"unaffected\"] = make_list(\"13.0.0\",\"12.0.0-12.1.2\",\"11.6.2\",\"11.5.5\");\n\n# AM\nvmatrix[\"AM\"] = make_array();\nvmatrix[\"AM\"][\"affected\" ] = make_list(\"11.6.0-11.6.1\",\"11.4.0-11.5.4\");\nvmatrix[\"AM\"][\"unaffected\"] = make_list(\"13.0.0\",\"12.0.0-12.1.2\",\"11.6.2\",\"11.5.5\");\n\n# APM\nvmatrix[\"APM\"] = make_array();\nvmatrix[\"APM\"][\"affected\" ] = make_list(\"11.6.0-11.6.1\",\"11.1.0-11.5.4\");\nvmatrix[\"APM\"][\"unaffected\"] = make_list(\"13.0.0\",\"12.0.0-12.1.2\",\"11.6.2\",\"11.5.5\",\"11.0.0\",\"10.1.0-10.2.4\");\n\n# ASM\nvmatrix[\"ASM\"] = make_array();\nvmatrix[\"ASM\"][\"affected\" ] = make_list(\"11.6.0-11.6.1\",\"11.1.0-11.5.4\");\nvmatrix[\"ASM\"][\"unaffected\"] = make_list(\"13.0.0\",\"12.0.0-12.1.2\",\"11.5.5\",\"11.6.2\",\"11.0.0\",\"10.1.0-10.2.4\");\n\n# AVR\nvmatrix[\"AVR\"] = make_array();\nvmatrix[\"AVR\"][\"affected\" ] = make_list(\"11.6.0-11.6.1\",\"11.1.0-11.5.4\");\nvmatrix[\"AVR\"][\"unaffected\"] = make_list(\"13.0.0\",\"12.0.0-12.1.2\",\"11.6.2\",\"11.5.5\",\"11.0.0\");\n\n# GTM\nvmatrix[\"GTM\"] = make_array();\nvmatrix[\"GTM\"][\"affected\" ] = make_list(\"11.6.0-11.6.1\",\"11.1.0-11.5.4\");\nvmatrix[\"GTM\"][\"unaffected\"] = make_list(\"11.6.2\",\"11.5.5\",\"11.0.0\",\"10.1.0-10.2.4\");\n\n# LC\nvmatrix[\"LC\"] = make_array();\nvmatrix[\"LC\"][\"affected\" ] = make_list(\"11.6.0-11.6.1\",\"11.1.0-11.5.4\");\nvmatrix[\"LC\"][\"unaffected\"] = make_list(\"13.0.0\",\"12.0.0-12.1.2\",\"11.6.2\",\"11.5.5\",\"11.0.0\",\"10.1.0-10.2.4\");\n\n# LTM\nvmatrix[\"LTM\"] = make_array();\nvmatrix[\"LTM\"][\"affected\" ] = make_list(\"11.6.0-11.6.1\",\"11.1.0-11.5.4\");\nvmatrix[\"LTM\"][\"unaffected\"] = make_list(\"13.0.0\",\"12.0.0-12.1.2\",\"11.6.2\",\"11.5.5\",\"11.0.0\",\"10.1.0-10.2.4\");\n\n# PEM\nvmatrix[\"PEM\"] = make_array();\nvmatrix[\"PEM\"][\"affected\" ] = make_list(\"11.6.0-11.6.1\",\"11.3.0-11.5.4\");\nvmatrix[\"PEM\"][\"unaffected\"] = make_list(\"13.0.0\",\"12.0.0-12.1.2\",\"11.6.2\",\"11.5.5\");\n\n# PSM\nvmatrix[\"PSM\"] = make_array();\nvmatrix[\"PSM\"][\"affected\" ] = make_list(\"11.1.0-11.4.1\");\nvmatrix[\"PSM\"][\"unaffected\"] = make_list(\"11.0.0\",\"10.1.0-10.2.4\");\n\n# WAM\nvmatrix[\"WAM\"] = make_array();\nvmatrix[\"WAM\"][\"affected\" ] = make_list(\"11.1.0-11.3.0\");\nvmatrix[\"WAM\"][\"unaffected\"] = make_list(\"11.0.0\",\"10.1.0-10.2.4\");\n\n# WOM\nvmatrix[\"WOM\"] = make_array();\nvmatrix[\"WOM\"][\"affected\" ] = make_list(\"11.1.0-11.3.0\");\nvmatrix[\"WOM\"][\"unaffected\"] = make_list(\"11.0.0\",\"10.1.0-10.2.4\");\n\n\nif (bigip_is_affected(vmatrix:vmatrix, sol:sol))\n{\n if (report_verbosity > 0) security_warning(port:0, extra:bigip_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = bigip_get_tested_modules();\n audit_extra = \"For BIG-IP module(s) \" + tested + \",\";\n if (tested) audit(AUDIT_INST_VER_NOT_VULN, audit_extra, version);\n else audit(AUDIT_HOST_NOT, \"running any of the affected modules\");\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:29:52", "description": "Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A race condition flaw was found in the way the Linux kernel's KVM\nsubsystem handled PIT (Programmable Interval Timer) emulation. A guest\nuser who has access to the PIT I/O ports could use this flaw to crash\nthe host. (CVE-2014-3611, Important)\n\n* A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB\nRequest Blocks buffers. An attacker with physical access to the system\ncould use this flaw to crash the system or, potentially, escalate\ntheir privileges on the system. (CVE-2014-3185, Moderate)\n\n* It was found that the Linux kernel's KVM subsystem did not handle\nthe VM exits gracefully for the invept (Invalidate Translations\nDerived from EPT) and invvpid (Invalidate Translations Based on VPID)\ninstructions. On hosts with an Intel processor and invept/invppid VM\nexit support, an unprivileged guest user could use these instructions\nto crash the guest. (CVE-2014-3645, CVE-2014-3646, Moderate)\n\nRed Hat would like to thank Lars Bull of Google for reporting\nCVE-2014-3611, and the Advanced Threat Research team at Intel Security\nfor reporting CVE-2014-3645 and CVE-2014-3646.\n\nThis update also fixes the following bugs :\n\n* This update fixes several race conditions between PCI error recovery\ncallbacks and potential calls of the ifup and ifdown commands in the\ntg3 driver. When triggered, these race conditions could cause a kernel\ncrash. (BZ#1142570)\n\n* Previously, GFS2 failed to unmount a sub-mounted GFS2 file system if\nits parent was also a GFS2 file system. This problem has been fixed by\nadding the appropriate d_op->d_hash() routine call for the last\ncomponent of the mount point path in the path name lookup mechanism\ncode (namei). (BZ#1145193)\n\n* Due to previous changes in the virtio-net driver, a Red Hat\nEnterprise Linux 6.6 guest was unable to boot with the 'mgr_rxbuf=off'\noption specified. This was caused by providing the page_to_skb()\nfunction with an incorrect packet length in the driver's Rx path. This\nproblem has been fixed and the guest in the described scenario can now\nboot successfully. (BZ#1148693)\n\n* When using one of the newer IPSec Authentication Header (AH)\nalgorithms with Openswan, a kernel panic could occur. This happened\nbecause the maximum truncated ICV length was too small. To fix this\nproblem, the MAX_AH_AUTH_LEN parameter has been set to 64.\n(BZ#1149083)\n\n* A bug in the IPMI driver caused the kernel to panic when an IPMI\ninterface was removed using the hotmod script. The IPMI driver has\nbeen fixed to properly clean the relevant data when removing an IPMI\ninterface. (BZ#1149578)\n\n* Due to a bug in the IPMI driver, the kernel could panic when adding\nan IPMI interface that was previously removed using the hotmod script.\nThis update fixes this bug by ensuring that the relevant shadow\nstructure is initialized at the right time. (BZ#1149580)\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The system\nmust be rebooted for this update to take effect.", "edition": 27, "cvss3": {"score": 5.5, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}, "published": "2014-11-12T00:00:00", "title": "CentOS 6 : kernel (CESA-2014:1843)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3646", "CVE-2014-3611", "CVE-2014-3645", "CVE-2014-3185"], "modified": "2014-11-12T00:00:00", "cpe": ["cpe:/o:centos:centos:6", "p-cpe:/a:centos:centos:perf", "p-cpe:/a:centos:centos:python-perf", "p-cpe:/a:centos:centos:kernel-doc", "p-cpe:/a:centos:centos:kernel-devel", "p-cpe:/a:centos:centos:kernel", "p-cpe:/a:centos:centos:kernel-debug", "p-cpe:/a:centos:centos:kernel-headers", "p-cpe:/a:centos:centos:kernel-firmware", "p-cpe:/a:centos:centos:kernel-abi-whitelists", "p-cpe:/a:centos:centos:kernel-debug-devel"], "id": "CENTOS_RHSA-2014-1843.NASL", "href": "https://www.tenable.com/plugins/nessus/79189", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2014:1843 and \n# CentOS Errata and Security Advisory 2014:1843 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(79189);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2014-3185\", \"CVE-2014-3611\", \"CVE-2014-3645\", \"CVE-2014-3646\");\n script_bugtraq_id(69781, 70743, 70745, 70746);\n script_xref(name:\"RHSA\", value:\"2014:1843\");\n\n script_name(english:\"CentOS 6 : kernel (CESA-2014:1843)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A race condition flaw was found in the way the Linux kernel's KVM\nsubsystem handled PIT (Programmable Interval Timer) emulation. A guest\nuser who has access to the PIT I/O ports could use this flaw to crash\nthe host. (CVE-2014-3611, Important)\n\n* A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB\nRequest Blocks buffers. An attacker with physical access to the system\ncould use this flaw to crash the system or, potentially, escalate\ntheir privileges on the system. (CVE-2014-3185, Moderate)\n\n* It was found that the Linux kernel's KVM subsystem did not handle\nthe VM exits gracefully for the invept (Invalidate Translations\nDerived from EPT) and invvpid (Invalidate Translations Based on VPID)\ninstructions. On hosts with an Intel processor and invept/invppid VM\nexit support, an unprivileged guest user could use these instructions\nto crash the guest. (CVE-2014-3645, CVE-2014-3646, Moderate)\n\nRed Hat would like to thank Lars Bull of Google for reporting\nCVE-2014-3611, and the Advanced Threat Research team at Intel Security\nfor reporting CVE-2014-3645 and CVE-2014-3646.\n\nThis update also fixes the following bugs :\n\n* This update fixes several race conditions between PCI error recovery\ncallbacks and potential calls of the ifup and ifdown commands in the\ntg3 driver. When triggered, these race conditions could cause a kernel\ncrash. (BZ#1142570)\n\n* Previously, GFS2 failed to unmount a sub-mounted GFS2 file system if\nits parent was also a GFS2 file system. This problem has been fixed by\nadding the appropriate d_op->d_hash() routine call for the last\ncomponent of the mount point path in the path name lookup mechanism\ncode (namei). (BZ#1145193)\n\n* Due to previous changes in the virtio-net driver, a Red Hat\nEnterprise Linux 6.6 guest was unable to boot with the 'mgr_rxbuf=off'\noption specified. This was caused by providing the page_to_skb()\nfunction with an incorrect packet length in the driver's Rx path. This\nproblem has been fixed and the guest in the described scenario can now\nboot successfully. (BZ#1148693)\n\n* When using one of the newer IPSec Authentication Header (AH)\nalgorithms with Openswan, a kernel panic could occur. This happened\nbecause the maximum truncated ICV length was too small. To fix this\nproblem, the MAX_AH_AUTH_LEN parameter has been set to 64.\n(BZ#1149083)\n\n* A bug in the IPMI driver caused the kernel to panic when an IPMI\ninterface was removed using the hotmod script. The IPMI driver has\nbeen fixed to properly clean the relevant data when removing an IPMI\ninterface. (BZ#1149578)\n\n* Due to a bug in the IPMI driver, the kernel could panic when adding\nan IPMI interface that was previously removed using the hotmod script.\nThis update fixes this bug by ensuring that the relevant shadow\nstructure is initialized at the right time. (BZ#1149580)\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The system\nmust be rebooted for this update to take effect.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2014-November/020748.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?8a227356\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-3185\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/09/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/11/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/11/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 6.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-2.6.32-504.1.3.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-abi-whitelists-2.6.32-504.1.3.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-debug-2.6.32-504.1.3.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-debug-devel-2.6.32-504.1.3.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-devel-2.6.32-504.1.3.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-doc-2.6.32-504.1.3.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-firmware-2.6.32-504.1.3.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-headers-2.6.32-504.1.3.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"perf-2.6.32-504.1.3.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"python-perf-2.6.32-504.1.3.el6\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-abi-whitelists / kernel-debug / kernel-debug-devel / etc\");\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T12:49:34", "description": "Description of changes:\n\nkernel-uek\n[3.8.13-44.1.4.el7uek]\n- USB: whiteheat: Added bounds checking for bulk command response (James \nForshaw) [Orabug: 19849334] {CVE-2014-3185}\n- HID: fix a couple of off-by-ones (Jiri Kosina) [Orabug: 19849317] \n{CVE-2014-3181}\n- kvm: vmx: handle invvpid vm exit gracefully (Petr Matousek) [Orabug: \n19906300] {CVE-2014-3646}\n- nEPT: Nested INVEPT (Nadav Har'El) [Orabug: 19906267] {CVE-2014-3645}\n- KVM: x86: Improve thread safety in pit (Andy Honig) [Orabug: \n19905686] {CVE-2014-3611}", "edition": 22, "cvss3": {"score": 5.5, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}, "published": "2014-10-31T00:00:00", "title": "Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2014-3084)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3646", "CVE-2014-3611", "CVE-2014-3181", "CVE-2014-3645", "CVE-2014-3185"], "modified": "2014-10-31T00:00:00", "cpe": ["cpe:/o:oracle:linux:6", "p-cpe:/a:oracle:linux:kernel-uek-firmware", "p-cpe:/a:oracle:linux:kernel-uek-doc", "p-cpe:/a:oracle:linux:kernel-uek", "p-cpe:/a:oracle:linux:kernel-uek-debug-devel", "p-cpe:/a:oracle:linux:kernel-uek-devel", "cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:dtrace-modules-3.8.13-44.1.4.el7uek", "p-cpe:/a:oracle:linux:dtrace-modules-3.8.13-44.1.4.el6uek", "p-cpe:/a:oracle:linux:kernel-uek-debug"], "id": "ORACLELINUX_ELSA-2014-3084.NASL", "href": "https://www.tenable.com/plugins/nessus/78756", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2014-3084.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(78756);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2014-3181\", \"CVE-2014-3185\", \"CVE-2014-3611\", \"CVE-2014-3645\", \"CVE-2014-3646\");\n script_bugtraq_id(69779, 69781, 70743, 70745, 70746);\n\n script_name(english:\"Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2014-3084)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Description of changes:\n\nkernel-uek\n[3.8.13-44.1.4.el7uek]\n- USB: whiteheat: Added bounds checking for bulk command response (James \nForshaw) [Orabug: 19849334] {CVE-2014-3185}\n- HID: fix a couple of off-by-ones (Jiri Kosina) [Orabug: 19849317] \n{CVE-2014-3181}\n- kvm: vmx: handle invvpid vm exit gracefully (Petr Matousek) [Orabug: \n19906300] {CVE-2014-3646}\n- nEPT: Nested INVEPT (Nadav Har'El) [Orabug: 19906267] {CVE-2014-3645}\n- KVM: x86: Improve thread safety in pit (Andy Honig) [Orabug: \n19905686] {CVE-2014-3611}\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2014-October/004588.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2014-October/004593.html\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected unbreakable enterprise kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:dtrace-modules-3.8.13-44.1.4.el6uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:dtrace-modules-3.8.13-44.1.4.el7uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/09/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/10/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/10/31\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(6|7)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 6 / 7\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2014-3181\", \"CVE-2014-3185\", \"CVE-2014-3611\", \"CVE-2014-3645\", \"CVE-2014-3646\"); \n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for ELSA-2014-3084\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nkernel_major_minor = get_kb_item(\"Host/uname/major_minor\");\nif (empty_or_null(kernel_major_minor)) exit(1, \"Unable to determine kernel major-minor level.\");\nexpected_kernel_major_minor = \"3.8\";\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, \"running kernel level \" + expected_kernel_major_minor + \", it is running kernel level \" + kernel_major_minor);\n\nflag = 0;\nif (rpm_check(release:\"EL6\", cpu:\"x86_64\", reference:\"dtrace-modules-3.8.13-44.1.4.el6uek-0.4.3-4.el6\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-3.8.13\") && rpm_check(release:\"EL6\", cpu:\"x86_64\", reference:\"kernel-uek-3.8.13-44.1.4.el6uek\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-debug-3.8.13\") && rpm_check(release:\"EL6\", cpu:\"x86_64\", reference:\"kernel-uek-debug-3.8.13-44.1.4.el6uek\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-debug-devel-3.8.13\") && rpm_check(release:\"EL6\", cpu:\"x86_64\", reference:\"kernel-uek-debug-devel-3.8.13-44.1.4.el6uek\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-devel-3.8.13\") && rpm_check(release:\"EL6\", cpu:\"x86_64\", reference:\"kernel-uek-devel-3.8.13-44.1.4.el6uek\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-doc-3.8.13\") && rpm_check(release:\"EL6\", cpu:\"x86_64\", reference:\"kernel-uek-doc-3.8.13-44.1.4.el6uek\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-uek-firmware-3.8.13\") && rpm_check(release:\"EL6\", cpu:\"x86_64\", reference:\"kernel-uek-firmware-3.8.13-44.1.4.el6uek\")) flag++;\n\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"dtrace-modules-3.8.13-44.1.4.el7uek-0.4.3-4.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-uek-3.8.13\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-uek-3.8.13-44.1.4.el7uek\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-uek-debug-3.8.13\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-uek-debug-3.8.13-44.1.4.el7uek\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-uek-debug-devel-3.8.13\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-uek-debug-devel-3.8.13-44.1.4.el7uek\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-uek-devel-3.8.13\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-uek-devel-3.8.13-44.1.4.el7uek\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-uek-doc-3.8.13\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-uek-doc-3.8.13-44.1.4.el7uek\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-uek-firmware-3.8.13\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-uek-firmware-3.8.13-44.1.4.el7uek\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"affected kernel\");\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-14T17:40:28", "description": "Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 6.5 Extended\nUpdate Support.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A race condition flaw was found in the way the Linux kernel's KVM\nsubsystem handled PIT (Programmable Interval Timer) emulation. A guest\nuser who has access to the PIT I/O ports could use this flaw to crash\nthe host. (CVE-2014-3611, Important)\n\n* A flaw was found in the way the Linux kernel's SCTP implementation\nvalidated INIT chunks when performing Address Configuration Change\n(ASCONF). A remote attacker could use this flaw to crash the system by\nsending a specially crafted SCTP packet to trigger a NULL pointer\ndereference on the system. (CVE-2014-7841, Important)\n\n* A flaw was found in the way the ipc_rcu_putref() function in the\nLinux kernel's IPC implementation handled reference counter\ndecrementing. A local, unprivileged user could use this flaw to\ntrigger an Out of Memory (OOM) condition and, potentially, crash the\nsystem. (CVE-2013-4483, Moderate)\n\n* A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB\nRequest Blocks buffers. An attacker with physical access to the system\ncould use this flaw to crash the system or, potentially, escalate\ntheir privileges on the system. (CVE-2014-3185, Moderate)\n\n* It was found that the Linux kernel's KVM subsystem did not handle\nthe VM exits gracefully for the invept (Invalidate Translations\nDerived from EPT) and invvpid (Invalidate Translations Based on VPID)\ninstructions. On hosts with an Intel processor and invept/invppid VM\nexit support, an unprivileged guest user could use these instructions\nto crash the guest. (CVE-2014-3645, CVE-2014-3646, Moderate)\n\n* A flaw was found in the way the Linux kernel's netfilter subsystem\nhandled generic protocol tracking. As demonstrated in the Stream\nControl Transmission Protocol (SCTP) case, a remote attacker could use\nthis flaw to bypass intended iptables rule restrictions when the\nassociated connection tracking module was not loaded on the system.\n(CVE-2014-8160, Moderate)\n\nRed Hat would like to thank Lars Bull of Google for reporting\nCVE-2014-3611, Vladimir Davydov (Parallels) for reporting\nCVE-2013-4483, and the Advanced Threat Research team at Intel Security\nfor reporting CVE-2014-3645 and CVE-2014-3646. The CVE-2014-7841 issue\nwas discovered by Liu Wei of Red Hat.\n\nBug fixes :\n\n* When forwarding a packet, the iptables target TCPOPTSTRIP used the\ntcp_hdr() function to locate the option space. Consequently,\nTCPOPTSTRIP located the incorrect place in the packet, and therefore\ndid not match options for stripping. TCPOPTSTRIP now uses the TCP\nheader itself to locate the option space, and the options are now\nproperly stripped. (BZ#1172026)\n\n* The ipset utility computed incorrect values of timeouts from an old\nIP set, and these values were then supplied to a new IP set. A resize\non an IP set with a timeouts option enabled could then supply\ncorrupted data from an old IP set. This bug has been fixed by properly\nreading timeout values from an old set before supplying them to a new\nset. (BZ#1172763)\n\n* Incorrect processing of errors from the BCM5719 LAN controller could\nresult in incoming packets being dropped. Now, received errors are\nhandled properly, and incoming packets are no longer randomly dropped.\n(BZ#1180405)\n\n* When the NVMe driver allocated a name-space queue, it was recognized\nas a request-based driver, whereas it was a BIO-based driver. While\ntrying to access data during the loading of NVMe along with a\nrequest-based DM device, the system could terminate unexpectedly or\nbecome unresponsive. Now, NVMe does not set the QUEUE_FLAG_STACKABLE\nflag during the allocation of a name-space queue, and the system no\nlonger attempts to insert a request into the queue, preventing a\ncrash. (BZ#1180554)\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The system\nmust be rebooted for this update to take effect.", "edition": 25, "cvss3": {"score": 5.5, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}, "published": "2015-03-05T00:00:00", "title": "RHEL 6 : kernel (RHSA-2015:0284)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3646", "CVE-2014-8160", "CVE-2014-7841", "CVE-2014-3611", "CVE-2014-3645", "CVE-2014-3185", "CVE-2013-4483"], "modified": "2015-03-05T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump", "cpe:/o:redhat:enterprise_linux:6.5", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-s390x", "p-cpe:/a:redhat:enterprise_linux:kernel-firmware", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel", "p-cpe:/a:redhat:enterprise_linux:perf-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:python-perf", "p-cpe:/a:redhat:enterprise_linux:perf", "p-cpe:/a:redhat:enterprise_linux:kernel-doc", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-i686"], "id": "REDHAT-RHSA-2015-0284.NASL", "href": "https://www.tenable.com/plugins/nessus/81624", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2015:0284. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(81624);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/08/14\");\n\n script_cve_id(\"CVE-2013-4483\", \"CVE-2014-3185\", \"CVE-2014-3611\", \"CVE-2014-3645\", \"CVE-2014-3646\", \"CVE-2014-7841\", \"CVE-2014-8160\");\n script_xref(name:\"RHSA\", value:\"2015:0284\");\n\n script_name(english:\"RHEL 6 : kernel (RHSA-2015:0284)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Updated kernel packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise Linux 6.5 Extended\nUpdate Support.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A race condition flaw was found in the way the Linux kernel's KVM\nsubsystem handled PIT (Programmable Interval Timer) emulation. A guest\nuser who has access to the PIT I/O ports could use this flaw to crash\nthe host. (CVE-2014-3611, Important)\n\n* A flaw was found in the way the Linux kernel's SCTP implementation\nvalidated INIT chunks when performing Address Configuration Change\n(ASCONF). A remote attacker could use this flaw to crash the system by\nsending a specially crafted SCTP packet to trigger a NULL pointer\ndereference on the system. (CVE-2014-7841, Important)\n\n* A flaw was found in the way the ipc_rcu_putref() function in the\nLinux kernel's IPC implementation handled reference counter\ndecrementing. A local, unprivileged user could use this flaw to\ntrigger an Out of Memory (OOM) condition and, potentially, crash the\nsystem. (CVE-2013-4483, Moderate)\n\n* A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB\nRequest Blocks buffers. An attacker with physical access to the system\ncould use this flaw to crash the system or, potentially, escalate\ntheir privileges on the system. (CVE-2014-3185, Moderate)\n\n* It was found that the Linux kernel's KVM subsystem did not handle\nthe VM exits gracefully for the invept (Invalidate Translations\nDerived from EPT) and invvpid (Invalidate Translations Based on VPID)\ninstructions. On hosts with an Intel processor and invept/invppid VM\nexit support, an unprivileged guest user could use these instructions\nto crash the guest. (CVE-2014-3645, CVE-2014-3646, Moderate)\n\n* A flaw was found in the way the Linux kernel's netfilter subsystem\nhandled generic protocol tracking. As demonstrated in the Stream\nControl Transmission Protocol (SCTP) case, a remote attacker could use\nthis flaw to bypass intended iptables rule restrictions when the\nassociated connection tracking module was not loaded on the system.\n(CVE-2014-8160, Moderate)\n\nRed Hat would like to thank Lars Bull of Google for reporting\nCVE-2014-3611, Vladimir Davydov (Parallels) for reporting\nCVE-2013-4483, and the Advanced Threat Research team at Intel Security\nfor reporting CVE-2014-3645 and CVE-2014-3646. The CVE-2014-7841 issue\nwas discovered by Liu Wei of Red Hat.\n\nBug fixes :\n\n* When forwarding a packet, the iptables target TCPOPTSTRIP used the\ntcp_hdr() function to locate the option space. Consequently,\nTCPOPTSTRIP located the incorrect place in the packet, and therefore\ndid not match options for stripping. TCPOPTSTRIP now uses the TCP\nheader itself to locate the option space, and the options are now\nproperly stripped. (BZ#1172026)\n\n* The ipset utility computed incorrect values of timeouts from an old\nIP set, and these values were then supplied to a new IP set. A resize\non an IP set with a timeouts option enabled could then supply\ncorrupted data from an old IP set. This bug has been fixed by properly\nreading timeout values from an old set before supplying them to a new\nset. (BZ#1172763)\n\n* Incorrect processing of errors from the BCM5719 LAN controller could\nresult in incoming packets being dropped. Now, received errors are\nhandled properly, and incoming packets are no longer randomly dropped.\n(BZ#1180405)\n\n* When the NVMe driver allocated a name-space queue, it was recognized\nas a request-based driver, whereas it was a BIO-based driver. While\ntrying to access data during the loading of NVMe along with a\nrequest-based DM device, the system could terminate unexpectedly or\nbecome unresponsive. Now, NVMe does not set the QUEUE_FLAG_STACKABLE\nflag during the allocation of a name-space queue, and the system no\nlonger attempts to insert a request into the queue, preventing a\ncrash. (BZ#1180554)\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The system\nmust be rebooted for this update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2015:0284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2013-4483\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3185\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3611\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3646\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3645\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-7841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-8160\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-i686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-s390x\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/11/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/03/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/03/05\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6\\.5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.5\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2013-4483\", \"CVE-2014-3185\", \"CVE-2014-3611\", \"CVE-2014-3645\", \"CVE-2014-3646\", \"CVE-2014-7841\", \"CVE-2014-8160\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2015:0284\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2015:0284\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"i686\", reference:\"kernel-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", reference:\"kernel-abi-whitelists-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"i686\", reference:\"kernel-debug-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-debug-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-debug-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"i686\", reference:\"kernel-debug-debuginfo-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-debug-debuginfo-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-debug-debuginfo-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"i686\", reference:\"kernel-debug-devel-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-debug-devel-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-debug-devel-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"i686\", reference:\"kernel-debuginfo-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-debuginfo-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-debuginfo-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"i686\", reference:\"kernel-debuginfo-common-i686-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-debuginfo-common-s390x-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-debuginfo-common-x86_64-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"i686\", reference:\"kernel-devel-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-devel-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-devel-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", reference:\"kernel-doc-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", reference:\"kernel-firmware-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"i686\", reference:\"kernel-headers-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-headers-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-headers-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-kdump-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-kdump-debuginfo-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-kdump-devel-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"i686\", reference:\"perf-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"s390x\", reference:\"perf-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"x86_64\", reference:\"perf-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"i686\", reference:\"perf-debuginfo-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"s390x\", reference:\"perf-debuginfo-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"x86_64\", reference:\"perf-debuginfo-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"i686\", reference:\"python-perf-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"s390x\", reference:\"python-perf-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"x86_64\", reference:\"python-perf-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"i686\", reference:\"python-perf-debuginfo-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"s390x\", reference:\"python-perf-debuginfo-2.6.32-431.50.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"x86_64\", reference:\"python-perf-debuginfo-2.6.32-431.50.1.el6\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-abi-whitelists / kernel-debug / etc\");\n }\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T13:48:31", "description": "Security fixes :\n\n - A race condition flaw was found in the way the Linux\n kernel's KVM subsystem handled PIT (Programmable\n Interval Timer) emulation. A guest user who has access\n to the PIT I/O ports could use this flaw to crash the\n host. (CVE-2014-3611, Important)\n\n - A NULL pointer dereference flaw was found in the way the\n Linux kernel's Stream Control Transmission Protocol\n (SCTP) implementation handled simultaneous connections\n between the same hosts. A remote attacker could use this\n flaw to crash the system. (CVE-2014-5077, Important)\n\n - It was found that the Linux kernel's KVM subsystem did\n not handle the VM exits gracefully for the invept\n (Invalidate Translations Derived from EPT) and invvpid\n (Invalidate Translations Based on VPID) instructions. On\n hosts with an Intel processor and invept/invppid VM exit\n support, an unprivileged guest user could use these\n instructions to crash the guest. (CVE-2014-3645,\n CVE-2014-3646, Moderate)\n\n - A use-after-free flaw was found in the way the Linux\n kernel's Advanced Linux Sound Architecture (ALSA)\n implementation handled user controls. A local,\n privileged user could use this flaw to crash the system.\n (CVE-2014-4653, Moderate)\n\nBug fixes :\n\n - A known issue that could prevent Chelsio adapters using\n the cxgb4 driver from being initialized on IBM POWER8\n systems has been fixed. These adapters can now be used\n on IBM POWER8 systems as expected.\n\n - When bringing a hot-added CPU online, the kernel did not\n initialize a CPU mask properly, which could result in a\n kernel panic. This update corrects the bug by ensuring\n that the CPU mask is properly initialized and the\n correct NUMA node selected.\n\n - The kernel could fail to bring a CPU online if the\n hardware supported both, the acpi-cpufreq and\n intel_pstate modules. This update ensures that the\n acpi-cpufreq module is not loaded in the intel_pstate\n module is loaded.\n\n - Due to a bug in the time accounting of the kernel\n scheduler, a divide error could occur when hot adding a\n CPU. To fix this problem, the kernel scheduler time\n accounting has been reworked.\n\n - The kernel did not handle exceptions caused by an\n invalid floating point control (FPC) register, resulting\n in a kernel oops. This problem has been fixed by placing\n the label to handle these exceptions to the correct\n place in the code.\n\n - A previous change to the kernel for the PowerPC\n architecture changed implementation of the\n compat_sys_sendfile() function. Consequently, the 64-bit\n sendfile() system call stopped working for files larger\n than 2 GB on PowerPC. This update restores previous\n behavior of sendfile() on PowerPC, and it again process\n files bigger than 2 GB as expected.\n\n - Previously, the kernel scheduler could schedule a CPU\n topology update even though the topology did not change.\n This could negatively affect the CPU load balancing,\n cause degradation of the system performance, and\n eventually result in a kernel oops. This problem has\n been fixed by skipping the CPU topology update if the\n topology has not actually changed.\n\n - Previously, recovery of a double-degraded RAID6 array\n could, under certain circumstances, result in data\n corruption. This could happen because the md driver was\n using an optimization that is safe to use only for\n single-degraded arrays. This update ensures that this\n optimization is skipped during the recovery of\n double-degraded RAID6 arrays.\n\nThe system must be rebooted for this update to take effect.", "edition": 18, "cvss3": {"score": 5.5, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}, "published": "2014-11-04T00:00:00", "title": "Scientific Linux Security Update : kernel on SL7.x x86_64 (20141028)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3646", "CVE-2014-5077", "CVE-2014-3611", "CVE-2014-4653", "CVE-2014-3645"], "modified": "2014-11-04T00:00:00", "cpe": ["p-cpe:/a:fermilab:scientific_linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:fermilab:scientific_linux:kernel-debug-debuginfo", "p-cpe:/a:fermilab:scientific_linux:kernel-abi-whitelists", "p-cpe:/a:fermilab:scientific_linux:kernel", "p-cpe:/a:fermilab:scientific_linux:kernel-debuginfo", "p-cpe:/a:fermilab:scientific_linux:python-perf-debuginfo", "p-cpe:/a:fermilab:scientific_linux:perf-debuginfo", "p-cpe:/a:fermilab:scientific_linux:kernel-debug", "p-cpe:/a:fermilab:scientific_linux:kernel-headers", "p-cpe:/a:fermilab:scientific_linux:python-perf", "p-cpe:/a:fermilab:scientific_linux:kernel-devel", "p-cpe:/a:fermilab:scientific_linux:kernel-debug-devel", "p-cpe:/a:fermilab:scientific_linux:kernel-tools-libs-devel", "x-cpe:/o:fermilab:scientific_linux", "p-cpe:/a:fermilab:scientific_linux:kernel-doc", "p-cpe:/a:fermilab:scientific_linux:perf", "p-cpe:/a:fermilab:scientific_linux:kernel-tools-debuginfo", "p-cpe:/a:fermilab:scientific_linux:kernel-tools", "p-cpe:/a:fermilab:scientific_linux:kernel-tools-libs"], "id": "SL_20141028_KERNEL_ON_SL7_X.NASL", "href": "https://www.tenable.com/plugins/nessus/78851", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(78851);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2014-3611\", \"CVE-2014-3645\", \"CVE-2014-3646\", \"CVE-2014-4653\", \"CVE-2014-5077\");\n\n script_name(english:\"Scientific Linux Security Update : kernel on SL7.x x86_64 (20141028)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Security fixes :\n\n - A race condition flaw was found in the way the Linux\n kernel's KVM subsystem handled PIT (Programmable\n Interval Timer) emulation. A guest user who has access\n to the PIT I/O ports could use this flaw to crash the\n host. (CVE-2014-3611, Important)\n\n - A NULL pointer dereference flaw was found in the way the\n Linux kernel's Stream Control Transmission Protocol\n (SCTP) implementation handled simultaneous connections\n between the same hosts. A remote attacker could use this\n flaw to crash the system. (CVE-2014-5077, Important)\n\n - It was found that the Linux kernel's KVM subsystem did\n not handle the VM exits gracefully for the invept\n (Invalidate Translations Derived from EPT) and invvpid\n (Invalidate Translations Based on VPID) instructions. On\n hosts with an Intel processor and invept/invppid VM exit\n support, an unprivileged guest user could use these\n instructions to crash the guest. (CVE-2014-3645,\n CVE-2014-3646, Moderate)\n\n - A use-after-free flaw was found in the way the Linux\n kernel's Advanced Linux Sound Architecture (ALSA)\n implementation handled user controls. A local,\n privileged user could use this flaw to crash the system.\n (CVE-2014-4653, Moderate)\n\nBug fixes :\n\n - A known issue that could prevent Chelsio adapters using\n the cxgb4 driver from being initialized on IBM POWER8\n systems has been fixed. These adapters can now be used\n on IBM POWER8 systems as expected.\n\n - When bringing a hot-added CPU online, the kernel did not\n initialize a CPU mask properly, which could result in a\n kernel panic. This update corrects the bug by ensuring\n that the CPU mask is properly initialized and the\n correct NUMA node selected.\n\n - The kernel could fail to bring a CPU online if the\n hardware supported both, the acpi-cpufreq and\n intel_pstate modules. This update ensures that the\n acpi-cpufreq module is not loaded in the intel_pstate\n module is loaded.\n\n - Due to a bug in the time accounting of the kernel\n scheduler, a divide error could occur when hot adding a\n CPU. To fix this problem, the kernel scheduler time\n accounting has been reworked.\n\n - The kernel did not handle exceptions caused by an\n invalid floating point control (FPC) register, resulting\n in a kernel oops. This problem has been fixed by placing\n the label to handle these exceptions to the correct\n place in the code.\n\n - A previous change to the kernel for the PowerPC\n architecture changed implementation of the\n compat_sys_sendfile() function. Consequently, the 64-bit\n sendfile() system call stopped working for files larger\n than 2 GB on PowerPC. This update restores previous\n behavior of sendfile() on PowerPC, and it again process\n files bigger than 2 GB as expected.\n\n - Previously, the kernel scheduler could schedule a CPU\n topology update even though the topology did not change.\n This could negatively affect the CPU load balancing,\n cause degradation of the system performance, and\n eventually result in a kernel oops. This problem has\n been fixed by skipping the CPU topology update if the\n topology has not actually changed.\n\n - Previously, recovery of a double-degraded RAID6 array\n could, under certain circumstances, result in data\n corruption. This could happen because the md driver was\n using an optimization that is safe to use only for\n single-degraded arrays. This update ensures that this\n optimization is skipped during the recovery of\n double-degraded RAID6 arrays.\n\nThe system must be rebooted for this update to take effect.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1411&L=scientific-linux-errata&T=0&P=460\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c4d1b0b1\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:python-perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/07/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/10/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/11/04\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nos_ver = pregmatch(pattern: \"Scientific Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Scientific Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Scientific Linux 7.x\", \"Scientific Linux \" + os_ver);\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"kernel-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"SL7\", reference:\"kernel-abi-whitelists-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"kernel-debug-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"kernel-debug-debuginfo-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"kernel-debug-devel-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"kernel-debuginfo-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"kernel-debuginfo-common-x86_64-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"kernel-devel-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"SL7\", reference:\"kernel-doc-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"kernel-headers-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"kernel-tools-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"kernel-tools-debuginfo-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-devel-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"perf-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"perf-debuginfo-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"python-perf-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"python-perf-debuginfo-3.10.0-123.9.2.el7\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-abi-whitelists / kernel-debug / etc\");\n}\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T13:15:06", "description": "Updated kernel packages that fix several security issues and bugs are\nnow available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes :\n\n* A race condition flaw was found in the way the Linux kernel's KVM\nsubsystem handled PIT (Programmable Interval Timer) emulation. A guest\nuser who has access to the PIT I/O ports could use this flaw to crash\nthe host. (CVE-2014-3611, Important)\n\n* A NULL pointer dereference flaw was found in the way the Linux\nkernel's Stream Control Transmission Protocol (SCTP) implementation\nhandled simultaneous connections between the same hosts. A remote\nattacker could use this flaw to crash the system. (CVE-2014-5077,\nImportant)\n\n* It was found that the Linux kernel's KVM subsystem did not handle\nthe VM exits gracefully for the invept (Invalidate Translations\nDerived from EPT) and invvpid (Invalidate Translations Based on VPID)\ninstructions. On hosts with an Intel processor and invept/invppid VM\nexit support, an unprivileged guest user could use these instructions\nto crash the guest. (CVE-2014-3645, CVE-2014-3646, Moderate)\n\n* A use-after-free flaw was found in the way the Linux kernel's\nAdvanced Linux Sound Architecture (ALSA) implementation handled user\ncontrols. A local, privileged user could use this flaw to crash the\nsystem. (CVE-2014-4653, Moderate)\n\nRed Hat would like to thank Lars Bull of Google for reporting\nCVE-2014-3611, and the Advanced Threat Research team at Intel Security\nfor reporting CVE-2014-3645 and CVE-2014-3646.\n\nBug fixes :\n\n* A known issue that could prevent Chelsio adapters using the cxgb4\ndriver from being initialized on IBM POWER8 systems has been fixed.\nThese adapters can now be used on IBM POWER8 systems as expected.\n(BZ#1130548)\n\n* When bringing a hot-added CPU online, the kernel did not initialize\na CPU mask properly, which could result in a kernel panic. This update\ncorrects the bug by ensuring that the CPU mask is properly initialized\nand the correct NUMA node selected. (BZ#1134715)\n\n* The kernel could fail to bring a CPU online if the hardware\nsupported both, the acpi-cpufreq and intel_pstate modules. This update\nensures that the acpi-cpufreq module is not loaded in the intel_pstate\nmodule is loaded. (BZ#1134716)\n\n* Due to a bug in the time accounting of the kernel scheduler, a\ndivide error could occur when hot adding a CPU. To fix this problem,\nthe kernel scheduler time accounting has been reworked. (BZ#1134717)\n\n* The kernel did not handle exceptions caused by an invalid floating\npoint control (FPC) register, resulting in a kernel oops. This problem\nhas been fixed by placing the label to handle these exceptions to the\ncorrect place in the code. (BZ#1138733)\n\n* A previous change to the kernel for the PowerPC architecture changed\nimplementation of the compat_sys_sendfile() function. Consequently,\nthe 64-bit sendfile() system call stopped working for files larger\nthan 2 GB on PowerPC. This update restores previous behavior of\nsendfile() on PowerPC, and it again process files bigger than 2 GB as\nexpected. (BZ#1139126)\n\n* Previously, the kernel scheduler could schedule a CPU topology\nupdate even though the topology did not change. This could negatively\naffect the CPU load balancing, cause degradation of the system\nperformance, and eventually result in a kernel oops. This problem has\nbeen fixed by skipping the CPU topology update if the topology has not\nactually changed. (BZ#1140300)\n\n* Previously, recovery of a double-degraded RAID6 array could, under\ncertain circumstances, result in data corruption. This could happen\nbecause the md driver was using an optimization that is safe to use\nonly for single-degraded arrays. This update ensures that this\noptimization is skipped during the recovery of double-degraded RAID6\narrays. (BZ#1143850)\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The system\nmust be rebooted for this update to take effect.", "edition": 28, "cvss3": {"score": 5.5, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}, "published": "2014-10-29T00:00:00", "title": "RHEL 7 : kernel (RHSA-2014:1724)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3646", "CVE-2014-5077", "CVE-2014-3611", "CVE-2014-4653", "CVE-2014-3645"], "modified": "2014-10-29T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists", "cpe:/o:redhat:enterprise_linux:7.4", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-s390x", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel", "cpe:/o:redhat:enterprise_linux:7.7", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "cpe:/o:redhat:enterprise_linux:7.5", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "cpe:/o:redhat:enterprise_linux:7", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel", "p-cpe:/a:redhat:enterprise_linux:perf-debuginfo", "cpe:/o:redhat:enterprise_linux:7.3", "p-cpe:/a:redhat:enterprise_linux:kernel-tools", "p-cpe:/a:redhat:enterprise_linux:kernel", "cpe:/o:redhat:enterprise_linux:7.6", "p-cpe:/a:redhat:enterprise_linux:python-perf", "p-cpe:/a:redhat:enterprise_linux:perf", "p-cpe:/a:redhat:enterprise_linux:kernel-doc"], "id": "REDHAT-RHSA-2014-1724.NASL", "href": "https://www.tenable.com/plugins/nessus/78722", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2014:1724. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(78722);\n script_version(\"1.21\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2014-3611\", \"CVE-2014-3645\", \"CVE-2014-3646\", \"CVE-2014-4653\", \"CVE-2014-5077\");\n script_xref(name:\"RHSA\", value:\"2014:1724\");\n\n script_name(english:\"RHEL 7 : kernel (RHSA-2014:1724)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Updated kernel packages that fix several security issues and bugs are\nnow available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes :\n\n* A race condition flaw was found in the way the Linux kernel's KVM\nsubsystem handled PIT (Programmable Interval Timer) emulation. A guest\nuser who has access to the PIT I/O ports could use this flaw to crash\nthe host. (CVE-2014-3611, Important)\n\n* A NULL pointer dereference flaw was found in the way the Linux\nkernel's Stream Control Transmission Protocol (SCTP) implementation\nhandled simultaneous connections between the same hosts. A remote\nattacker could use this flaw to crash the system. (CVE-2014-5077,\nImportant)\n\n* It was found that the Linux kernel's KVM subsystem did not handle\nthe VM exits gracefully for the invept (Invalidate Translations\nDerived from EPT) and invvpid (Invalidate Translations Based on VPID)\ninstructions. On hosts with an Intel processor and invept/invppid VM\nexit support, an unprivileged guest user could use these instructions\nto crash the guest. (CVE-2014-3645, CVE-2014-3646, Moderate)\n\n* A use-after-free flaw was found in the way the Linux kernel's\nAdvanced Linux Sound Architecture (ALSA) implementation handled user\ncontrols. A local, privileged user could use this flaw to crash the\nsystem. (CVE-2014-4653, Moderate)\n\nRed Hat would like to thank Lars Bull of Google for reporting\nCVE-2014-3611, and the Advanced Threat Research team at Intel Security\nfor reporting CVE-2014-3645 and CVE-2014-3646.\n\nBug fixes :\n\n* A known issue that could prevent Chelsio adapters using the cxgb4\ndriver from being initialized on IBM POWER8 systems has been fixed.\nThese adapters can now be used on IBM POWER8 systems as expected.\n(BZ#1130548)\n\n* When bringing a hot-added CPU online, the kernel did not initialize\na CPU mask properly, which could result in a kernel panic. This update\ncorrects the bug by ensuring that the CPU mask is properly initialized\nand the correct NUMA node selected. (BZ#1134715)\n\n* The kernel could fail to bring a CPU online if the hardware\nsupported both, the acpi-cpufreq and intel_pstate modules. This update\nensures that the acpi-cpufreq module is not loaded in the intel_pstate\nmodule is loaded. (BZ#1134716)\n\n* Due to a bug in the time accounting of the kernel scheduler, a\ndivide error could occur when hot adding a CPU. To fix this problem,\nthe kernel scheduler time accounting has been reworked. (BZ#1134717)\n\n* The kernel did not handle exceptions caused by an invalid floating\npoint control (FPC) register, resulting in a kernel oops. This problem\nhas been fixed by placing the label to handle these exceptions to the\ncorrect place in the code. (BZ#1138733)\n\n* A previous change to the kernel for the PowerPC architecture changed\nimplementation of the compat_sys_sendfile() function. Consequently,\nthe 64-bit sendfile() system call stopped working for files larger\nthan 2 GB on PowerPC. This update restores previous behavior of\nsendfile() on PowerPC, and it again process files bigger than 2 GB as\nexpected. (BZ#1139126)\n\n* Previously, the kernel scheduler could schedule a CPU topology\nupdate even though the topology did not change. This could negatively\naffect the CPU load balancing, cause degradation of the system\nperformance, and eventually result in a kernel oops. This problem has\nbeen fixed by skipping the CPU topology update if the topology has not\nactually changed. (BZ#1140300)\n\n* Previously, recovery of a double-degraded RAID6 array could, under\ncertain circumstances, result in data corruption. This could happen\nbecause the md driver was using an optimization that is safe to use\nonly for single-degraded arrays. This update ensures that this\noptimization is skipped during the recovery of double-degraded RAID6\narrays. (BZ#1143850)\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The system\nmust be rebooted for this update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2014:1724\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-5077\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-4653\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3611\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3646\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-3645\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-s390x\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/07/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/10/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/10/29\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2014-3611\", \"CVE-2014-3645\", \"CVE-2014-3646\", \"CVE-2014-4653\", \"CVE-2014-5077\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2014:1724\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2014:1724\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"kernel-abi-whitelists-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-debug-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-debug-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-debug-debuginfo-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-debug-debuginfo-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-debug-devel-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-debug-devel-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-debuginfo-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-debuginfo-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-debuginfo-common-s390x-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-debuginfo-common-x86_64-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-devel-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-devel-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"kernel-doc-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-headers-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-headers-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-kdump-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-kdump-debuginfo-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-kdump-devel-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-tools-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-tools-debuginfo-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-devel-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"perf-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"perf-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"perf-debuginfo-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"perf-debuginfo-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"python-perf-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python-perf-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"python-perf-debuginfo-3.10.0-123.9.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python-perf-debuginfo-3.10.0-123.9.2.el7\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-abi-whitelists / kernel-debug / etc\");\n }\n}\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-06T09:29:50", "description": "Updated kernel packages that fix several security issues and bugs are\nnow available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes :\n\n* A race condition flaw was found in the way the Linux kernel's KVM\nsubsystem handled PIT (Programmable Interval Timer) emulation. A guest\nuser who has access to the PIT I/O ports could use this flaw to crash\nthe host. (CVE-2014-3611, Important)\n\n* A NULL pointer dereference flaw was found in the way the Linux\nkernel's Stream Control Transmission Protocol (SCTP) implementation\nhandled simultaneous connections between the same hosts. A remote\nattacker could use this flaw to crash the system. (CVE-2014-5077,\nImportant)\n\n* It was found that the Linux kernel's KVM subsystem did not handle\nthe VM exits gracefully for the invept (Invalidate Translations\nDerived from EPT) and invvpid (Invalidate Translations Based on VPID)\ninstructions. On hosts with an Intel processor and invept/invppid VM\nexit support, an unprivileged guest user could use these instructions\nto crash the guest. (CVE-2014-3645, CVE-2014-3646, Moderate)\n\n* A use-after-free flaw was found in the way the Linux kernel's\nAdvanced Linux Sound Architecture (ALSA) implementation handled user\ncontrols. A local, privileged user could use this flaw to crash the\nsystem. (CVE-2014-4653, Moderate)\n\nRed Hat would like to thank Lars Bull of Google for reporting\nCVE-2014-3611, and the Advanced Threat Research team at Intel Security\nfor reporting CVE-2014-3645 and CVE-2014-3646.\n\nBug fixes :\n\n* A known issue that could prevent Chelsio adapters using the cxgb4\ndriver from being initialized on IBM POWER8 systems has been fixed.\nThese adapters can now be used on IBM POWER8 systems as expected.\n(BZ#1130548)\n\n* When bringing a hot-added CPU online, the kernel did not initialize\na CPU mask properly, which could result in a kernel panic. This update\ncorrects the bug by ensuring that the CPU mask is properly initialized\nand the correct NUMA node selected. (BZ#1134715)\n\n* The kernel could fail to bring a CPU online if the hardware\nsupported both, the acpi-cpufreq and intel_pstate modules. This update\nensures that the acpi-cpufreq module is not loaded in the intel_pstate\nmodule is loaded. (BZ#1134716)\n\n* Due to a bug in the time accounting of the kernel scheduler, a\ndivide error could occur when hot adding a CPU. To fix this problem,\nthe kernel scheduler time accounting has been reworked. (BZ#1134717)\n\n* The kernel did not handle exceptions caused by an invalid floating\npoint control (FPC) register, resulting in a kernel oops. This problem\nhas been fixed by placing the label to handle these exceptions to the\ncorrect place in the code. (BZ#1138733)\n\n* A previous change to the kernel for the PowerPC architecture changed\nimplementation of the compat_sys_sendfile() function. Consequently,\nthe 64-bit sendfile() system call stopped working for files larger\nthan 2 GB on PowerPC. This update restores previous behavior of\nsendfile() on PowerPC, and it again process files bigger than 2 GB as\nexpected. (BZ#1139126)\n\n* Previously, the kernel scheduler could schedule a CPU topology\nupdate even though the topology did not change. This could negatively\naffect the CPU load balancing, cause degradation of the system\nperformance, and eventually result in a kernel oops. This problem has\nbeen fixed by skipping the CPU topology update if the topology has not\nactually changed. (BZ#1140300)\n\n* Previously, recovery of a double-degraded RAID6 array could, under\ncertain circumstances, result in data corruption. This could happen\nbecause the md driver was using an optimization that is safe to use\nonly for single-degraded arrays. This update ensures that this\noptimization is skipped during the recovery of double-degraded RAID6\narrays. (BZ#1143850)\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The system\nmust be rebooted for this update to take effect.", "edition": 27, "cvss3": {"score": 5.5, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}, "published": "2014-10-29T00:00:00", "title": "CentOS 7 : kernel (CESA-2014:1724)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3646", "CVE-2014-5077", "CVE-2014-3611", "CVE-2014-4653", "CVE-2014-3645"], "modified": "2014-10-29T00:00:00", "cpe": ["p-cpe:/a:centos:centos:perf", "p-cpe:/a:centos:centos:python-perf", "p-cpe:/a:centos:centos:kernel-doc", "cpe:/o:centos:centos:7", "p-cpe:/a:centos:centos:kernel-tools-libs-devel", "p-cpe:/a:centos:centos:kernel-tools", "p-cpe:/a:centos:centos:kernel-devel", "p-cpe:/a:centos:centos:kernel", "p-cpe:/a:centos:centos:kernel-debug", "p-cpe:/a:centos:centos:kernel-tools-libs", "p-cpe:/a:centos:centos:kernel-headers", "p-cpe:/a:centos:centos:kernel-abi-whitelists", "p-cpe:/a:centos:centos:kernel-debug-devel"], "id": "CENTOS_RHSA-2014-1724.NASL", "href": "https://www.tenable.com/plugins/nessus/78702", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2014:1724 and \n# CentOS Errata and Security Advisory 2014:1724 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(78702);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2014-3611\", \"CVE-2014-3645\", \"CVE-2014-3646\", \"CVE-2014-4653\", \"CVE-2014-5077\");\n script_xref(name:\"RHSA\", value:\"2014:1724\");\n\n script_name(english:\"CentOS 7 : kernel (CESA-2014:1724)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Updated kernel packages that fix several security issues and bugs are\nnow available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes :\n\n* A race condition flaw was found in the way the Linux kernel's KVM\nsubsystem handled PIT (Programmable Interval Timer) emulation. A guest\nuser who has access to the PIT I/O ports could use this flaw to crash\nthe host. (CVE-2014-3611, Important)\n\n* A NULL pointer dereference flaw was found in the way the Linux\nkernel's Stream Control Transmission Protocol (SCTP) implementation\nhandled simultaneous connections between the same hosts. A remote\nattacker could use this flaw to crash the system. (CVE-2014-5077,\nImportant)\n\n* It was found that the Linux kernel's KVM subsystem did not handle\nthe VM exits gracefully for the invept (Invalidate Translations\nDerived from EPT) and invvpid (Invalidate Translations Based on VPID)\ninstructions. On hosts with an Intel processor and invept/invppid VM\nexit support, an unprivileged guest user could use these instructions\nto crash the guest. (CVE-2014-3645, CVE-2014-3646, Moderate)\n\n* A use-after-free flaw was found in the way the Linux kernel's\nAdvanced Linux Sound Architecture (ALSA) implementation handled user\ncontrols. A local, privileged user could use this flaw to crash the\nsystem. (CVE-2014-4653, Moderate)\n\nRed Hat would like to thank Lars Bull of Google for reporting\nCVE-2014-3611, and the Advanced Threat Research team at Intel Security\nfor reporting CVE-2014-3645 and CVE-2014-3646.\n\nBug fixes :\n\n* A known issue that could prevent Chelsio adapters using the cxgb4\ndriver from being initialized on IBM POWER8 systems has been fixed.\nThese adapters can now be used on IBM POWER8 systems as expected.\n(BZ#1130548)\n\n* When bringing a hot-added CPU online, the kernel did not initialize\na CPU mask properly, which could result in a kernel panic. This update\ncorrects the bug by ensuring that the CPU mask is properly initialized\nand the correct NUMA node selected. (BZ#1134715)\n\n* The kernel could fail to bring a CPU online if the hardware\nsupported both, the acpi-cpufreq and intel_pstate modules. This update\nensures that the acpi-cpufreq module is not loaded in the intel_pstate\nmodule is loaded. (BZ#1134716)\n\n* Due to a bug in the time accounting of the kernel scheduler, a\ndivide error could occur when hot adding a CPU. To fix this problem,\nthe kernel scheduler time accounting has been reworked. (BZ#1134717)\n\n* The kernel did not handle exceptions caused by an invalid floating\npoint control (FPC) register, resulting in a kernel oops. This problem\nhas been fixed by placing the label to handle these exceptions to the\ncorrect place in the code. (BZ#1138733)\n\n* A previous change to the kernel for the PowerPC architecture changed\nimplementation of the compat_sys_sendfile() function. Consequently,\nthe 64-bit sendfile() system call stopped working for files larger\nthan 2 GB on PowerPC. This update restores previous behavior of\nsendfile() on PowerPC, and it again process files bigger than 2 GB as\nexpected. (BZ#1139126)\n\n* Previously, the kernel scheduler could schedule a CPU topology\nupdate even though the topology did not change. This could negatively\naffect the CPU load balancing, cause degradation of the system\nperformance, and eventually result in a kernel oops. This problem has\nbeen fixed by skipping the CPU topology update if the topology has not\nactually changed. (BZ#1140300)\n\n* Previously, recovery of a double-degraded RAID6 array could, under\ncertain circumstances, result in data corruption. This could happen\nbecause the md driver was using an optimization that is safe to use\nonly for single-degraded arrays. This update ensures that this\noptimization is skipped during the recovery of double-degraded RAID6\narrays. (BZ#1143850)\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The system\nmust be rebooted for this update to take effect.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2014-October/020710.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e010df0f\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-4653\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/07/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/10/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/10/29\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 7.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-abi-whitelists-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-debug-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-debug-devel-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-devel-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-doc-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-headers-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-tools-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-devel-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"perf-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"python-perf-3.10.0-123.9.2.el7\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-abi-whitelists / kernel-debug / kernel-debug-devel / etc\");\n}\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T12:49:15", "description": "From Red Hat Security Advisory 2014:1724 :\n\nUpdated kernel packages that fix several security issues and bugs are\nnow available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes :\n\n* A race condition flaw was found in the way the Linux kernel's KVM\nsubsystem handled PIT (Programmable Interval Timer) emulation. A guest\nuser who has access to the PIT I/O ports could use this flaw to crash\nthe host. (CVE-2014-3611, Important)\n\n* A NULL pointer dereference flaw was found in the way the Linux\nkernel's Stream Control Transmission Protocol (SCTP) implementation\nhandled simultaneous connections between the same hosts. A remote\nattacker could use this flaw to crash the system. (CVE-2014-5077,\nImportant)\n\n* It was found that the Linux kernel's KVM subsystem did not handle\nthe VM exits gracefully for the invept (Invalidate Translations\nDerived from EPT) and invvpid (Invalidate Translations Based on VPID)\ninstructions. On hosts with an Intel processor and invept/invppid VM\nexit support, an unprivileged guest user could use these instructions\nto crash the guest. (CVE-2014-3645, CVE-2014-3646, Moderate)\n\n* A use-after-free flaw was found in the way the Linux kernel's\nAdvanced Linux Sound Architecture (ALSA) implementation handled user\ncontrols. A local, privileged user could use this flaw to crash the\nsystem. (CVE-2014-4653, Moderate)\n\nRed Hat would like to thank Lars Bull of Google for reporting\nCVE-2014-3611, and the Advanced Threat Research team at Intel Security\nfor reporting CVE-2014-3645 and CVE-2014-3646.\n\nBug fixes :\n\n* A known issue that could prevent Chelsio adapters using the cxgb4\ndriver from being initialized on IBM POWER8 systems has been fixed.\nThese adapters can now be used on IBM POWER8 systems as expected.\n(BZ#1130548)\n\n* When bringing a hot-added CPU online, the kernel did not initialize\na CPU mask properly, which could result in a kernel panic. This update\ncorrects the bug by ensuring that the CPU mask is properly initialized\nand the correct NUMA node selected. (BZ#1134715)\n\n* The kernel could fail to bring a CPU online if the hardware\nsupported both, the acpi-cpufreq and intel_pstate modules. This update\nensures that the acpi-cpufreq module is not loaded in the intel_pstate\nmodule is loaded. (BZ#1134716)\n\n* Due to a bug in the time accounting of the kernel scheduler, a\ndivide error could occur when hot adding a CPU. To fix this problem,\nthe kernel scheduler time accounting has been reworked. (BZ#1134717)\n\n* The kernel did not handle exceptions caused by an invalid floating\npoint control (FPC) register, resulting in a kernel oops. This problem\nhas been fixed by placing the label to handle these exceptions to the\ncorrect place in the code. (BZ#1138733)\n\n* A previous change to the kernel for the PowerPC architecture changed\nimplementation of the compat_sys_sendfile() function. Consequently,\nthe 64-bit sendfile() system call stopped working for files larger\nthan 2 GB on PowerPC. This update restores previous behavior of\nsendfile() on PowerPC, and it again process files bigger than 2 GB as\nexpected. (BZ#1139126)\n\n* Previously, the kernel scheduler could schedule a CPU topology\nupdate even though the topology did not change. This could negatively\naffect the CPU load balancing, cause degradation of the system\nperformance, and eventually result in a kernel oops. This problem has\nbeen fixed by skipping the CPU topology update if the topology has not\nactually changed. (BZ#1140300)\n\n* Previously, recovery of a double-degraded RAID6 array could, under\ncertain circumstances, result in data corruption. This could happen\nbecause the md driver was using an optimization that is safe to use\nonly for single-degraded arrays. This update ensures that this\noptimization is skipped during the recovery of double-degraded RAID6\narrays. (BZ#1143850)\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The system\nmust be rebooted for this update to take effect.", "edition": 24, "cvss3": {"score": 5.5, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}, "published": "2014-10-29T00:00:00", "title": "Oracle Linux 7 : kernel (ELSA-2014-1724)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-3646", "CVE-2014-5077", "CVE-2014-3611", "CVE-2014-4653", "CVE-2014-3645"], "modified": "2014-10-29T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:kernel-debug", "p-cpe:/a:oracle:linux:kernel-devel", "p-cpe:/a:oracle:linux:kernel-doc", "p-cpe:/a:oracle:linux:kernel-tools", "p-cpe:/a:oracle:linux:perf", "p-cpe:/a:oracle:linux:kernel-debug-devel", "p-cpe:/a:oracle:linux:kernel-tools-libs", "p-cpe:/a:oracle:linux:kernel-headers", "p-cpe:/a:oracle:linux:kernel-abi-whitelists", "p-cpe:/a:oracle:linux:kernel", "cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:kernel-tools-libs-devel", "p-cpe:/a:oracle:linux:python-perf"], "id": "ORACLELINUX_ELSA-2014-1724.NASL", "href": "https://www.tenable.com/plugins/nessus/78721", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2014:1724 and \n# Oracle Linux Security Advisory ELSA-2014-1724 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(78721);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2014-3611\", \"CVE-2014-3645\", \"CVE-2014-3646\", \"CVE-2014-4653\", \"CVE-2014-5077\");\n script_bugtraq_id(68164, 68881, 70743, 70745, 70746);\n script_xref(name:\"RHSA\", value:\"2014:1724\");\n\n script_name(english:\"Oracle Linux 7 : kernel (ELSA-2014-1724)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"From Red Hat Security Advisory 2014:1724 :\n\nUpdated kernel packages that fix several security issues and bugs are\nnow available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes :\n\n* A race condition flaw was found in the way the Linux kernel's KVM\nsubsystem handled PIT (Programmable Interval Timer) emulation. A guest\nuser who has access to the PIT I/O ports could use this flaw to crash\nthe host. (CVE-2014-3611, Important)\n\n* A NULL pointer dereference flaw was found in the way the Linux\nkernel's Stream Control Transmission Protocol (SCTP) implementation\nhandled simultaneous connections between the same hosts. A remote\nattacker could use this flaw to crash the system. (CVE-2014-5077,\nImportant)\n\n* It was found that the Linux kernel's KVM subsystem did not handle\nthe VM exits gracefully for the invept (Invalidate Translations\nDerived from EPT) and invvpid (Invalidate Translations Based on VPID)\ninstructions. On hosts with an Intel processor and invept/invppid VM\nexit support, an unprivileged guest user could use these instructions\nto crash the guest. (CVE-2014-3645, CVE-2014-3646, Moderate)\n\n* A use-after-free flaw was found in the way the Linux kernel's\nAdvanced Linux Sound Architecture (ALSA) implementation handled user\ncontrols. A local, privileged user could use this flaw to crash the\nsystem. (CVE-2014-4653, Moderate)\n\nRed Hat would like to thank Lars Bull of Google for reporting\nCVE-2014-3611, and the Advanced Threat Research team at Intel Security\nfor reporting CVE-2014-3645 and CVE-2014-3646.\n\nBug fixes :\n\n* A known issue that could prevent Chelsio adapters using the cxgb4\ndriver from being initialized on IBM POWER8 systems has been fixed.\nThese adapters can now be used on IBM POWER8 systems as expected.\n(BZ#1130548)\n\n* When bringing a hot-added CPU online, the kernel did not initialize\na CPU mask properly, which could result in a kernel panic. This update\ncorrects the bug by ensuring that the CPU mask is properly initialized\nand the correct NUMA node selected. (BZ#1134715)\n\n* The kernel could fail to bring a CPU online if the hardware\nsupported both, the acpi-cpufreq and intel_pstate modules. This update\nensures that the acpi-cpufreq module is not loaded in the intel_pstate\nmodule is loaded. (BZ#1134716)\n\n* Due to a bug in the time accounting of the kernel scheduler, a\ndivide error could occur when hot adding a CPU. To fix this problem,\nthe kernel scheduler time accounting has been reworked. (BZ#1134717)\n\n* The kernel did not handle exceptions caused by an invalid floating\npoint control (FPC) register, resulting in a kernel oops. This problem\nhas been fixed by placing the label to handle these exceptions to the\ncorrect place in the code. (BZ#1138733)\n\n* A previous change to the kernel for the PowerPC architecture changed\nimplementation of the compat_sys_sendfile() function. Consequently,\nthe 64-bit sendfile() system call stopped working for files larger\nthan 2 GB on PowerPC. This update restores previous behavior of\nsendfile() on PowerPC, and it again process files bigger than 2 GB as\nexpected. (BZ#1139126)\n\n* Previously, the kernel scheduler could schedule a CPU topology\nupdate even though the topology did not change. This could negatively\naffect the CPU load balancing, cause degradation of the system\nperformance, and eventually result in a kernel oops. This problem has\nbeen fixed by skipping the CPU topology update if the topology has not\nactually changed. (BZ#1140300)\n\n* Previously, recovery of a double-degraded RAID6 array could, under\ncertain circumstances, result in data corruption. This could happen\nbecause the md driver was using an optimization that is safe to use\nonly for single-degraded arrays. This update ensures that this\noptimization is skipped during the recovery of double-degraded RAID6\narrays. (BZ#1143850)\n\nAll kernel users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The system\nmust be rebooted for this update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2014-October/004581.html\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/07/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/10/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/10/29\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 7\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2014-3611\", \"CVE-2014-3645\", \"CVE-2014-3646\", \"CVE-2014-4653\", \"CVE-2014-5077\"); \n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for ELSA-2014-1724\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nkernel_major_minor = get_kb_item(\"Host/uname/major_minor\");\nif (empty_or_null(kernel_major_minor)) exit(1, \"Unable to determine kernel major-minor level.\");\nexpected_kernel_major_minor = \"3.10\";\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, \"running kernel level \" + expected_kernel_major_minor + \", it is running kernel level \" + kernel_major_minor);\n\nflag = 0;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-abi-whitelists-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-abi-whitelists-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-debug-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-debug-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-debug-devel-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-debug-devel-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-devel-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-devel-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-doc-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-doc-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-headers-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-headers-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-tools-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-tools-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-tools-libs-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-tools-libs-devel-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-devel-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"perf-3.10.0-123.9.2.el7\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"python-perf-3.10.0-123.9.2.el7\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"affected kernel\");\n}\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}], "redhat": [{"lastseen": "2019-08-13T18:45:43", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3185", "CVE-2014-3611", "CVE-2014-3645", "CVE-2014-3646"], "description": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A race condition flaw was found in the way the Linux kernel's KVM\nsubsystem handled PIT (Programmable Interval Timer) emulation. A guest user\nwho has access to the PIT I/O ports could use this flaw to crash the host.\n(CVE-2014-3611, Important)\n\n* A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB Request\nBlocks buffers. An attacker with physical access to the system could use\nthis flaw to crash the system or, potentially, escalate their privileges on\nthe system. (CVE-2014-3185, Moderate)\n\n* It was found that the Linux kernel's KVM subsystem did not handle the VM\nexits gracefully for the invept (Invalidate Translations Derived from EPT)\nand invvpid (Invalidate Translations Based on VPID) instructions. On hosts\nwith an Intel processor and invept/invppid VM exit support, an unprivileged\nguest user could use these instructions to crash the guest. (CVE-2014-3645,\nCVE-2014-3646, Moderate)\n\nRed Hat would like to thank Lars Bull of Google for reporting\nCVE-2014-3611, and the Advanced Threat Research team at Intel Security for\nreporting CVE-2014-3645 and CVE-2014-3646.\n\nThis update also fixes the following bugs:\n\n* This update fixes several race conditions between PCI error recovery\ncallbacks and potential calls of the ifup and ifdown commands in the tg3\ndriver. When triggered, these race conditions could cause a kernel crash.\n(BZ#1142570)\n\n* Previously, GFS2 failed to unmount a sub-mounted GFS2 file system if its\nparent was also a GFS2 file system. This problem has been fixed by adding\nthe appropriate d_op->d_hash() routine call for the last component of the\nmount point path in the path name lookup mechanism code (namei).\n(BZ#1145193)\n\n* Due to previous changes in the virtio-net driver, a Red Hat Enterprise\nLinux 6.6 guest was unable to boot with the \"mgr_rxbuf=off\" option\nspecified. This was caused by providing the page_to_skb() function with an\nincorrect packet length in the driver's Rx path. This problem has been\nfixed and the guest in the described scenario can now boot successfully.\n(BZ#1148693)\n\n* When using one of the newer IPSec Authentication Header (AH) algorithms\nwith Openswan, a kernel panic could occur. This happened because the\nmaximum truncated ICV length was too small. To fix this problem, the\nMAX_AH_AUTH_LEN parameter has been set to 64. (BZ#1149083)\n\n* A bug in the IPMI driver caused the kernel to panic when an IPMI\ninterface was removed using the hotmod script. The IPMI driver has been\nfixed to properly clean the relevant data when removing an IPMI interface.\n(BZ#1149578)\n\n* Due to a bug in the IPMI driver, the kernel could panic when adding an\nIPMI interface that was previously removed using the hotmod script.\nThis update fixes this bug by ensuring that the relevant shadow structure\nis initialized at the right time. (BZ#1149580)\n\nAll kernel users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. The system must be\nrebooted for this update to take effect.\n", "modified": "2018-06-06T20:24:27", "published": "2014-11-11T05:00:00", "id": "RHSA-2014:1843", "href": "https://access.redhat.com/errata/RHSA-2014:1843", "type": "redhat", "title": "(RHSA-2014:1843) Important: kernel security and bug fix update", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:46:21", "bulletinFamily": "unix", "cvelist": ["CVE-2013-4483", "CVE-2014-3185", "CVE-2014-3611", "CVE-2014-3645", "CVE-2014-3646", "CVE-2014-7841", "CVE-2014-8160"], "description": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\n* A race condition flaw was found in the way the Linux kernel's KVM\nsubsystem handled PIT (Programmable Interval Timer) emulation. A guest user\nwho has access to the PIT I/O ports could use this flaw to crash the host.\n(CVE-2014-3611, Important)\n\n* A flaw was found in the way the Linux kernel's SCTP implementation\nvalidated INIT chunks when performing Address Configuration Change\n(ASCONF). A remote attacker could use this flaw to crash the system by\nsending a specially crafted SCTP packet to trigger a NULL pointer\ndereference on the system. (CVE-2014-7841, Important)\n\n* A flaw was found in the way the ipc_rcu_putref() function in the Linux\nkernel's IPC implementation handled reference counter decrementing.\nA local, unprivileged user could use this flaw to trigger an Out of Memory\n(OOM) condition and, potentially, crash the system. (CVE-2013-4483,\nModerate)\n\n* A memory corruption flaw was found in the way the USB ConnectTech\nWhiteHEAT serial driver processed completion commands sent via USB Request\nBlocks buffers. An attacker with physical access to the system could use\nthis flaw to crash the system or, potentially, escalate their privileges on\nthe system. (CVE-2014-3185, Moderate)\n\n* It was found that the Linux kernel's KVM subsystem did not handle the VM\nexits gracefully for the invept (Invalidate Translations Derived from EPT)\nand invvpid (Invalidate Translations Based on VPID) instructions. On hosts\nwith an Intel processor and invept/invppid VM exit support, an unprivileged\nguest user could use these instructions to crash the guest. (CVE-2014-3645,\nCVE-2014-3646, Moderate)\n\n* A flaw was found in the way the Linux kernel's netfilter subsystem\nhandled generic protocol tracking. As demonstrated in the Stream Control\nTransmission Protocol (SCTP) case, a remote attacker could use this flaw to\nbypass intended iptables rule restrictions when the associated connection\ntracking module was not loaded on the system. (CVE-2014-8160, Moderate)\n\nRed Hat would like to thank Lars Bull of Google for reporting\nCVE-2014-3611, Vladimir Davydov (Parallels) for reporting CVE-2013-4483,\nand the Advanced Threat Research team at Intel Security for reporting\nCVE-2014-3645 and CVE-2014-3646. The CVE-2014-7841 issue was discovered by\nLiu Wei of Red Hat.\n\nBug fixes:\n\n* When forwarding a packet, the iptables target TCPOPTSTRIP used the\ntcp_hdr() function to locate the option space. Consequently, TCPOPTSTRIP\nlocated the incorrect place in the packet, and therefore did not match\noptions for stripping. TCPOPTSTRIP now uses the TCP header itself to locate\nthe option space, and the options are now properly stripped. (BZ#1172026)\n\n* The ipset utility computed incorrect values of timeouts from an old IP\nset, and these values were then supplied to a new IP set. A resize on an IP\nset with a timeouts option enabled could then supply corrupted data from an\nold IP set. This bug has been fixed by properly reading timeout values from\nan old set before supplying them to a new set. (BZ#1172763)\n\n* Incorrect processing of errors from the BCM5719 LAN controller could\nresult in incoming packets being dropped. Now, received errors are handled\nproperly, and incoming packets are no longer randomly dropped. (BZ#1180405)\n\n* When the NVMe driver allocated a name-space queue, it was recognized as a\nrequest-based driver, whereas it was a BIO-based driver. While trying to\naccess data during the loading of NVMe along with a request-based DM\ndevice, the system could terminate unexpectedly or become unresponsive.\nNow, NVMe does not set the QUEUE_FLAG_STACKABLE flag during the allocation\nof a name-space queue, and the system no longer attempts to insert a\nrequest into the queue, preventing a crash. (BZ#1180554)\n\nAll kernel users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. The system must be\nrebooted for this update to take effect.\n", "modified": "2016-09-04T02:14:25", "published": "2015-03-03T05:00:00", "id": "RHSA-2015:0284", "href": "https://access.redhat.com/errata/RHSA-2015:0284", "type": "redhat", "title": "(RHSA-2015:0284) Important: kernel security and bug fix update", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-14T12:06:29", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3611", "CVE-2014-3645", "CVE-2014-3646", "CVE-2014-4653", "CVE-2014-5077"], "description": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* A race condition flaw was found in the way the Linux kernel's KVM\nsubsystem handled PIT (Programmable Interval Timer) emulation. A guest user\nwho has access to the PIT I/O ports could use this flaw to crash the host.\n(CVE-2014-3611, Important)\n\n* A NULL pointer dereference flaw was found in the way the Linux kernel's\nStream Control Transmission Protocol (SCTP) implementation handled\nsimultaneous connections between the same hosts. A remote attacker could\nuse this flaw to crash the system. (CVE-2014-5077, Important)\n\n* It was found that the Linux kernel's KVM subsystem did not handle the VM\nexits gracefully for the invept (Invalidate Translations Derived from EPT)\nand invvpid (Invalidate Translations Based on VPID) instructions. On hosts\nwith an Intel processor and invept/invppid VM exit support, an unprivileged\nguest user could use these instructions to crash the guest. (CVE-2014-3645,\nCVE-2014-3646, Moderate)\n\n* A use-after-free flaw was found in the way the Linux kernel's Advanced\nLinux Sound Architecture (ALSA) implementation handled user controls. A\nlocal, privileged user could use this flaw to crash the system.\n(CVE-2014-4653, Moderate)\n\nRed Hat would like to thank Lars Bull of Google for reporting\nCVE-2014-3611, and the Advanced Threat Research team at Intel Security for\nreporting CVE-2014-3645 and CVE-2014-3646.\n\nBug fixes:\n\n* A known issue that could prevent Chelsio adapters using the cxgb4 driver\nfrom being initialized on IBM POWER8 systems has been fixed. These\nadapters can now be used on IBM POWER8 systems as expected. (BZ#1130548)\n\n* When bringing a hot-added CPU online, the kernel did not initialize a\nCPU mask properly, which could result in a kernel panic. This update\ncorrects the bug by ensuring that the CPU mask is properly initialized and\nthe correct NUMA node selected. (BZ#1134715)\n\n* The kernel could fail to bring a CPU online if the hardware supported\nboth, the acpi-cpufreq and intel_pstate modules. This update ensures that\nthe acpi-cpufreq module is not loaded in the intel_pstate module is\nloaded. (BZ#1134716)\n\n* Due to a bug in the time accounting of the kernel scheduler, a divide\nerror could occur when hot adding a CPU. To fix this problem, the kernel\nscheduler time accounting has been reworked. (BZ#1134717)\n\n* The kernel did not handle exceptions caused by an invalid floating point\ncontrol (FPC) register, resulting in a kernel oops. This problem has been\nfixed by placing the label to handle these exceptions to the correct place\nin the code. (BZ#1138733)\n\n* A previous change to the kernel for the PowerPC architecture changed\nimplementation of the compat_sys_sendfile() function. Consequently, the\n64-bit sendfile() system call stopped working for files larger than 2 GB\non PowerPC. This update restores previous behavior of sendfile() on\nPowerPC, and it again process files bigger than 2 GB as expected.\n(BZ#1139126)\n\n* Previously, the kernel scheduler could schedule a CPU topology update\neven though the topology did not change. This could negatively affect the\nCPU load balancing, cause degradation of the system performance, and\neventually result in a kernel oops. This problem has been fixed by\nskipping the CPU topology update if the topology has not actually changed.\n(BZ#1140300)\n\n* Previously, recovery of a double-degraded RAID6 array could, under\ncertain circumstances, result in data corruption. This could happen\nbecause the md driver was using an optimization that is safe to use only\nfor single-degraded arrays. This update ensures that this optimization is\nskipped during the recovery of double-degraded RAID6 arrays. (BZ#1143850)\n\nAll kernel users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. The system must be\nrebooted for this update to take effect.\n", "modified": "2018-04-12T03:32:52", "published": "2014-10-28T04:00:00", "id": "RHSA-2014:1724", "href": "https://access.redhat.com/errata/RHSA-2014:1724", "type": "redhat", "title": "(RHSA-2014:1724) Important: kernel security and bug fix update", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:47:06", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3511", "CVE-2014-3567", "CVE-2014-3611", "CVE-2014-3645", "CVE-2014-3646", "CVE-2015-0235"], "description": "The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: a subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA heap-based buffer overflow was found in glibc's\n__nss_hostname_digits_dots() function, which is used by the gethostbyname()\nand gethostbyname2() glibc function calls. A remote attacker able to make\nan application call either of these functions could use this flaw to\nexecute arbitrary code with the permissions of the user running the\napplication. (CVE-2015-0235)\n\nA race condition flaw was found in the way the Linux kernel's KVM subsystem \nhandled PIT (Programmable Interval Timer) emulation. A guest user who has \naccess to the PIT I/O ports could use this flaw to crash the host. \n(CVE-2014-3611)\n\nA flaw was found in the way OpenSSL handled fragmented handshake packets.\nA man-in-the-middle attacker could use this flaw to force a TLS/SSL server\nusing OpenSSL to use TLS 1.0, even if both the client and the server\nsupported newer protocol versions. (CVE-2014-3511)\n\nA memory leak flaw was found in the way an OpenSSL handled failed session\nticket integrity checks. A remote attacker could exhaust all available\nmemory of an SSL/TLS or DTLS server by sending a large number of invalid\nsession tickets to that server. (CVE-2014-3567)\n\nIt was found that the Linux kernel's KVM subsystem did not handle the VM\nexits gracefully for the invept (Invalidate Translations Derived from EPT)\nand invvpid (Invalidate Translations Based on VPID) instructions. On hosts\nwith an Intel processor and invept/invppid VM exit support, an unprivileged\nguest user could use these instructions to crash the guest. (CVE-2014-3645,\nCVE-2014-3646)\n\nRed Hat would like to thank Qualys for reporting the CVE-2015-0235 issue,\nLars Bull of Google for reporting the CVE-2014-3611 issue, and the Advanced\nThreat Research team at Intel Security for reporting the CVE-2014-3645 and\nCVE-2014-3646 issues.\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package.\n", "modified": "2018-06-07T08:59:40", "published": "2015-02-04T05:00:00", "id": "RHSA-2015:0126", "href": "https://access.redhat.com/errata/RHSA-2015:0126", "type": "redhat", "title": "(RHSA-2015:0126) Critical: rhev-hypervisor6 security update ", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:45:39", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3610", "CVE-2014-3611"], "description": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built for\nthe standard Red Hat Enterprise Linux kernel.\n\nIt was found that KVM's Write to Model Specific Register (WRMSR)\ninstruction emulation would write non-canonical values passed in by the\nguest to certain MSRs in the host's context. A privileged guest user could\nuse this flaw to crash the host. (CVE-2014-3610)\n\nA race condition flaw was found in the way the Linux kernel's KVM subsystem\nhandled PIT (Programmable Interval Timer) emulation. A guest user who has\naccess to the PIT I/O ports could use this flaw to crash the host.\n(CVE-2014-3611)\n\nRed Hat would like to thank Lars Bull of Google and Nadav Amit for\nreporting the CVE-2014-3610 issue, and Lars Bull of Google for reporting\nthe CVE-2014-3611 issue.\n\nAll kvm users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. Note: The procedure in\nthe Solution section must be performed before this update will take effect.\n", "modified": "2017-09-08T12:11:02", "published": "2015-04-22T04:00:00", "id": "RHSA-2015:0869", "href": "https://access.redhat.com/errata/RHSA-2015:0869", "type": "redhat", "title": "(RHSA-2015:0869) Important: kvm security update", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}], "ubuntu": [{"lastseen": "2020-07-09T00:27:57", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3646", "CVE-2014-3611", "CVE-2014-3647", "CVE-2014-3610"], "description": "Nadav Amit reported that the KVM (Kernel Virtual Machine) mishandles \nnoncanonical addresses when emulating instructions that change the rip \n(Instruction Pointer). A guest user with access to I/O or the MMIO can use \nthis flaw to cause a denial of service (system crash) of the guest. \n(CVE-2014-3647)\n\nA flaw was discovered with the handling of the invept instruction in the \nKVM (Kernel Virtual Machine) subsystem of the Linux kernel. An unprivileged \nguest user could exploit this flaw to cause a denial of service (system \ncrash) on the guest. (CVE-2014-3646)\n\nLars Bull reported a race condition in the PIT (programmable interrupt \ntimer) emulation in the KVM (Kernel Virtual Machine) subsystem of the Linux \nkernel. A local guest user with access to PIT i/o ports could exploit this \nflaw to cause a denial of service (crash) on the host. (CVE-2014-3611)\n\nLars Bull and Nadav Amit reported a flaw in how KVM (the Kernel Virtual \nMachine) handles noncanonical writes to certain MSR registers. A privileged \nguest user can exploit this flaw to cause a denial of service (kernel \npanic) on the host. (CVE-2014-3610)", "edition": 5, "modified": "2014-10-31T00:00:00", "published": "2014-10-31T00:00:00", "id": "USN-2396-1", "href": "https://ubuntu.com/security/notices/USN-2396-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-07-02T11:37:22", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3646", "CVE-2014-3182", "CVE-2014-3611", "CVE-2014-3647", "CVE-2014-3610", "CVE-2014-7145"], "description": "Nadav Amit reported that the KVM (Kernel Virtual Machine) mishandles \nnoncanonical addresses when emulating instructions that change the rip \n(Instruction Pointer). A guest user with access to I/O or the MMIO can use \nthis flaw to cause a denial of service (system crash) of the guest. \n(CVE-2014-3647)\n\nA flaw was discovered with the handling of the invept instruction in the \nKVM (Kernel Virtual Machine) subsystem of the Linux kernel. An unprivileged \nguest user could exploit this flaw to cause a denial of service (system \ncrash) on the guest. (CVE-2014-3646)\n\nLars Bull reported a race condition in the PIT (programmable interrupt \ntimer) emulation in the KVM (Kernel Virtual Machine) subsystem of the Linux \nkernel. A local guest user with access to PIT i/o ports could exploit this \nflaw to cause a denial of service (crash) on the host. (CVE-2014-3611)\n\nLars Bull and Nadav Amit reported a flaw in how KVM (the Kernel Virtual \nMachine) handles noncanonical writes to certain MSR registers. A privileged \nguest user can exploit this flaw to cause a denial of service (kernel \npanic) on the host. (CVE-2014-3610)\n\nA bounds check error was discovered in the driver for the Logitech Unifying \nreceivers and devices. A physically proximate attacker could exploit this \nflaw to to cause a denial of service (invalid kfree) or to execute \narbitrary code. (CVE-2014-3182)\n\nRaphael Geissert reported a NULL pointer dereference in the Linux kernel's \nCIFS client. A remote CIFS server could cause a denial of service (system \ncrash) or possibly have other unspecified impact by deleting IPC$ share \nduring resolution of DFS referrals. (CVE-2014-7145)", "edition": 5, "modified": "2014-10-30T00:00:00", "published": "2014-10-30T00:00:00", "id": "USN-2394-1", "href": "https://ubuntu.com/security/notices/USN-2394-1", "title": "Linux kernel (Trusty HWE) vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-07-02T11:39:32", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3646", "CVE-2014-3182", "CVE-2014-3611", "CVE-2014-3647", "CVE-2014-3610", "CVE-2014-7145"], "description": "Nadav Amit reported that the KVM (Kernel Virtual Machine) mishandles \nnoncanonical addresses when emulating instructions that change the rip \n(Instruction Pointer). A guest user with access to I/O or the MMIO can use \nthis flaw to cause a denial of service (system crash) of the guest. \n(CVE-2014-3647)\n\nA flaw was discovered with the handling of the invept instruction in the \nKVM (Kernel Virtual Machine) subsystem of the Linux kernel. An unprivileged \nguest user could exploit this flaw to cause a denial of service (system \ncrash) on the guest. (CVE-2014-3646)\n\nLars Bull reported a race condition in the PIT (programmable interrupt \ntimer) emulation in the KVM (Kernel Virtual Machine) subsystem of the Linux \nkernel. A local guest user with access to PIT i/o ports could exploit this \nflaw to cause a denial of service (crash) on the host. (CVE-2014-3611)\n\nLars Bull and Nadav Amit reported a flaw in how KVM (the Kernel Virtual \nMachine) handles noncanonical writes to certain MSR registers. A privileged \nguest user can exploit this flaw to cause a denial of service (kernel \npanic) on the host. (CVE-2014-3610)\n\nA bounds check error was discovered in the driver for the Logitech Unifying \nreceivers and devices. A physically proximate attacker could exploit this \nflaw to to cause a denial of service (invalid kfree) or to execute \narbitrary code. (CVE-2014-3182)\n\nRaphael Geissert reported a NULL pointer dereference in the Linux kernel's \nCIFS client. A remote CIFS server could cause a denial of service (system \ncrash) or possibly have other unspecified impact by deleting IPC$ share \nduring resolution of DFS referrals. (CVE-2014-7145)", "edition": 5, "modified": "2014-10-30T00:00:00", "published": "2014-10-30T00:00:00", "id": "USN-2395-1", "href": "https://ubuntu.com/security/notices/USN-2395-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-07-18T01:39:15", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3646", "CVE-2014-3673", "CVE-2014-3688", "CVE-2014-3611", "CVE-2014-3647", "CVE-2014-3610", "CVE-2014-3645", "CVE-2014-7975", "CVE-2014-7207", "CVE-2014-4608", "CVE-2014-3690", "CVE-2014-3687"], "description": "Nadav Amit reported that the KVM (Kernel Virtual Machine) mishandles \nnoncanonical addresses when emulating instructions that change the rip \n(Instruction Pointer). A guest user with access to I/O or the MMIO can use \nthis flaw to cause a denial of service (system crash) of the guest. \n(CVE-2014-3647)\n\nA flaw was discovered with the handling of the invept instruction in the \nKVM (Kernel Virtual Machine) subsystem of the Linux kernel. An unprivileged \nguest user could exploit this flaw to cause a denial of service (system \ncrash) on the guest. (CVE-2014-3646)\n\nA flaw was discovered with invept instruction support when using nested EPT \nin the KVM (Kernel Virtual Machine). An unprivileged guest user could \nexploit this flaw to cause a denial of service (system crash) on the guest. \n(CVE-2014-3645)\n\nLars Bull reported a race condition in the PIT (programmable interrupt \ntimer) emulation in the KVM (Kernel Virtual Machine) subsystem of the Linux \nkernel. A local guest user with access to PIT i/o ports could exploit this \nflaw to cause a denial of service (crash) on the host. (CVE-2014-3611)\n\nLars Bull and Nadav Amit reported a flaw in how KVM (the Kernel Virtual \nMachine) handles noncanonical writes to certain MSR registers. A privileged \nguest user can exploit this flaw to cause a denial of service (kernel \npanic) on the host. (CVE-2014-3610)\n\nA flaw in the handling of malformed ASCONF chunks by SCTP (Stream Control \nTransmission Protocol) implementation in the Linux kernel was discovered. A \nremote attacker could exploit this flaw to cause a denial of service \n(system crash). (CVE-2014-3673)\n\nA flaw in the handling of duplicate ASCONF chunks by SCTP (Stream Control \nTransmission Protocol) implementation in the Linux kernel was discovered. A \nremote attacker could exploit this flaw to cause a denial of service \n(panic). (CVE-2014-3687)\n\nIt was discovered that excessive queuing by SCTP (Stream Control \nTransmission Protocol) implementation in the Linux kernel can cause memory \npressure. A remote attacker could exploit this flaw to cause a denial of \nservice. (CVE-2014-3688)\n\nA flaw was discovered in how the Linux kernel's KVM (Kernel Virtual \nMachine) subsystem handles the CR4 control register at VM entry on Intel \nprocessors. A local host OS user can exploit this to cause a denial of \nservice (kill arbitrary processes, or system disruption) by leveraging \n/dev/kvm access. (CVE-2014-3690)\n\nDon Bailey discovered a flaw in the LZO decompress algorithm used by the \nLinux kernel. An attacker could exploit this flaw to cause a denial of \nservice (memory corruption or OOPS). (CVE-2014-4608)\n\nIt was discovered the Linux kernel's implementation of IPv6 did not \nproperly validate arguments in the ipv6_select_ident function. A local user \ncould exploit this flaw to cause a denial of service (system crash) by \nleveraging tun or macvtap device access. (CVE-2014-7207)\n\nAndy Lutomirski discovered that the Linux kernel was not checking the \nCAP_SYS_ADMIN when remounting filesystems to read-only. A local user could \nexploit this flaw to cause a denial of service (loss of writability). \n(CVE-2014-7975)", "edition": 6, "modified": "2014-11-25T00:00:00", "published": "2014-11-25T00:00:00", "id": "USN-2418-1", "href": "https://ubuntu.com/security/notices/USN-2418-1", "title": "Linux kernel (OMAP4) vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-07-15T01:41:23", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3646", "CVE-2014-3673", "CVE-2014-3688", "CVE-2014-3611", "CVE-2014-3647", "CVE-2014-3610", "CVE-2014-3645", "CVE-2014-7975", "CVE-2014-7207", "CVE-2014-4608", "CVE-2014-3690", "CVE-2014-3687"], "description": "Nadav Amit reported that the KVM (Kernel Virtual Machine) mishandles \nnoncanonical addresses when emulating instructions that change the rip \n(Instruction Pointer). A guest user with access to I/O or the MMIO can use \nthis flaw to cause a denial of service (system crash) of the guest. \n(CVE-2014-3647)\n\nA flaw was discovered with the handling of the invept instruction in the \nKVM (Kernel Virtual Machine) subsystem of the Linux kernel. An unprivileged \nguest user could exploit this flaw to cause a denial of service (system \ncrash) on the guest. (CVE-2014-3646)\n\nA flaw was discovered with invept instruction support when using nested EPT \nin the KVM (Kernel Virtual Machine). An unprivileged guest user could \nexploit this flaw to cause a denial of service (system crash) on the guest. \n(CVE-2014-3645)\n\nLars Bull reported a race condition in the PIT (programmable interrupt \ntimer) emulation in the KVM (Kernel Virtual Machine) subsystem of the Linux \nkernel. A local guest user with access to PIT i/o ports could exploit this \nflaw to cause a denial of service (crash) on the host. (CVE-2014-3611)\n\nLars Bull and Nadav Amit reported a flaw in how KVM (the Kernel Virtual \nMachine) handles noncanonical writes to certain MSR registers. A privileged \nguest user can exploit this flaw to cause a denial of service (kernel \npanic) on the host. (CVE-2014-3610)\n\nA flaw in the handling of malformed ASCONF chunks by SCTP (Stream Control \nTransmission Protocol) implementation in the Linux kernel was discovered. A \nremote attacker could exploit this flaw to cause a denial of service \n(system crash). (CVE-2014-3673)\n\nA flaw in the handling of duplicate ASCONF chunks by SCTP (Stream Control \nTransmission Protocol) implementation in the Linux kernel was discovered. A \nremote attacker could exploit this flaw to cause a denial of service \n(panic). (CVE-2014-3687)\n\nIt was discovered that excessive queuing by SCTP (Stream Control \nTransmission Protocol) implementation in the Linux kernel can cause memory \npressure. A remote attacker could exploit this flaw to cause a denial of \nservice. (CVE-2014-3688)\n\nA flaw was discovered in how the Linux kernel's KVM (Kernel Virtual \nMachine) subsystem handles the CR4 control register at VM entry on Intel \nprocessors. A local host OS user can exploit this to cause a denial of \nservice (kill arbitrary processes, or system disruption) by leveraging \n/dev/kvm access. (CVE-2014-3690)\n\nDon Bailey discovered a flaw in the LZO decompress algorithm used by the \nLinux kernel. An attacker could exploit this flaw to cause a denial of \nservice (memory corruption or OOPS). (CVE-2014-4608)\n\nIt was discovered the Linux kernel's implementation of IPv6 did not \nproperly validate arguments in the ipv6_select_ident function. A local user \ncould exploit this flaw to cause a denial of service (system crash) by \nleveraging tun or macvtap device access. (CVE-2014-7207)\n\nAndy Lutomirski discovered that the Linux kernel was not checking the \nCAP_SYS_ADMIN when remounting filesystems to read-only. A local user could \nexploit this flaw to cause a denial of service (loss of writability). \n(CVE-2014-7975)", "edition": 6, "modified": "2014-11-25T00:00:00", "published": "2014-11-25T00:00:00", "id": "USN-2417-1", "href": "https://ubuntu.com/security/notices/USN-2417-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-07-09T00:21:05", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3611", "CVE-2014-3610", "CVE-2014-9322"], "description": "Andy Lutomirski discovered that the Linux kernel does not properly handle \nfaults associated with the Stack Segment (SS) register in the x86 \narchitecture. A local attacker could exploit this flaw to gain \nadministrative privileges. (CVE-2014-9322)\n\nLars Bull reported a race condition in the PIT (programmable interrupt \ntimer) emulation in the KVM (Kernel Virtual Machine) subsystem of the Linux \nkernel. A local guest user with access to PIT i/o ports could exploit this \nflaw to cause a denial of service (crash) on the host. (CVE-2014-3611)\n\nLars Bull and Nadav Amit reported a flaw in how KVM (the Kernel Virtual \nMachine) handles noncanonical writes to certain MSR registers. A privileged \nguest user can exploit this flaw to cause a denial of service (kernel \npanic) on the host. (CVE-2014-3610)", "edition": 5, "modified": "2015-01-13T00:00:00", "published": "2015-01-13T00:00:00", "id": "USN-2462-1", "href": "https://ubuntu.com/security/notices/USN-2462-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-09T00:28:43", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3185", "CVE-2014-6410", "CVE-2014-3184"], "description": "Ben Hawkes reported some off by one errors for report descriptors in the \nLinux kernel's HID stack. A physically proximate attacker could exploit \nthese flaws to cause a denial of service (out-of-bounds write) via a \nspecially crafted device. (CVE-2014-3184)\n\nSeveral bounds check flaws allowing for buffer overflows were discovered in \nthe Linux kernel's Whiteheat USB serial driver. A physically proximate \nattacker could exploit these flaws to cause a denial of service (system \ncrash) via a specially crafted device. (CVE-2014-3185)\n\nA flaw was discovered in the Linux kernel's UDF filesystem (used on some \nCD-ROMs and DVDs) when processing indirect ICBs. An attacker who can cause \nCD, DVD or image file with a specially crafted inode to be mounted can \ncause a denial of service (infinite loop or stack consumption). \n(CVE-2014-6410)", "edition": 5, "modified": "2014-10-09T00:00:00", "published": "2014-10-09T00:00:00", "id": "USN-2375-1", "href": "https://ubuntu.com/security/notices/USN-2375-1", "title": "Linux kernel (EC2) vulnerabilities", "type": "ubuntu", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-09T00:27:57", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3185", "CVE-2014-6410", "CVE-2014-3184"], "description": "Ben Hawkes reported some off by one errors for report descriptors in the \nLinux kernel's HID stack. A physically proximate attacker could exploit \nthese flaws to cause a denial of service (out-of-bounds write) via a \nspecially crafted device. (CVE-2014-3184)\n\nSeveral bounds check flaws allowing for buffer overflows were discovered in \nthe Linux kernel's Whiteheat USB serial driver. A physically proximate \nattacker could exploit these flaws to cause a denial of service (system \ncrash) via a specially crafted device. (CVE-2014-3185)\n\nA flaw was discovered in the Linux kernel's UDF filesystem (used on some \nCD-ROMs and DVDs) when processing indirect ICBs. An attacker who can cause \nCD, DVD or image file with a specially crafted inode to be mounted can \ncause a denial of service (infinite loop or stack consumption). \n(CVE-2014-6410)", "edition": 5, "modified": "2014-10-09T00:00:00", "published": "2014-10-09T00:00:00", "id": "USN-2374-1", "href": "https://ubuntu.com/security/notices/USN-2374-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-09T00:24:21", "bulletinFamily": "unix", "cvelist": ["CVE-2014-9420", "CVE-2014-3611", "CVE-2014-3610", "CVE-2014-9322", "CVE-2014-8133"], "description": "Andy Lutomirski discovered that the Linux kernel does not properly handle \nfaults associated with the Stack Segment (SS) register in the x86 \narchitecture. A local attacker could exploit this flaw to gain \nadministrative privileges. (CVE-2014-9322)\n\nLars Bull reported a race condition in the PIT (programmable interrupt \ntimer) emulation in the KVM (Kernel Virtual Machine) subsystem of the Linux \nkernel. A local guest user with access to PIT i/o ports could exploit this \nflaw to cause a denial of service (crash) on the host. (CVE-2014-3611)\n\nLars Bull and Nadav Amit reported a flaw in how KVM (the Kernel Virtual \nMachine) handles noncanonical writes to certain MSR registers. A privileged \nguest user can exploit this flaw to cause a denial of service (kernel \npanic) on the host. (CVE-2014-3610)\n\nAndy Lutomirski discovered an information leak in the Linux kernel's Thread \nLocal Storage (TLS) implementation allowing users to bypass the espfix to \nobtain information that could be used to bypass the Address Space Layout \nRandomization (ASLR) protection mechanism. A local user could exploit this \nflaw to obtain potentially sensitive information from kernel memory. \n(CVE-2014-8133)\n\nPrasad J Pandit reported a flaw in the rock_continue function of the Linux \nkernel's ISO 9660 CDROM file system. A local user could exploit this flaw \nto cause a denial of service (system crash or hang). (CVE-2014-9420)", "edition": 5, "modified": "2015-02-04T00:00:00", "published": "2015-02-04T00:00:00", "id": "USN-2491-1", "href": "https://ubuntu.com/security/notices/USN-2491-1", "title": "Linux kernel (EC2) vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "debian": [{"lastseen": "2019-05-30T02:21:54", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3646", "CVE-2014-3673", "CVE-2014-3688", "CVE-2014-3611", "CVE-2014-3647", "CVE-2014-3610", "CVE-2014-3645", "CVE-2014-7207", "CVE-2014-3690", "CVE-2014-3687"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3060-1 security@debian.org\nhttp://www.debian.org/security/ Salvatore Bonaccorso\nOctober 31, 2014 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : linux\nCVE ID : CVE-2014-3610 CVE-2014-3611 CVE-2014-3645 CVE-2014-3646 \n CVE-2014-3647 CVE-2014-3673 CVE-2014-3687 CVE-2014-3688\n CVE-2014-3690 CVE-2014-7207\nDebian Bug : 766195\n\nSeveral vulnerabilities have been discovered in the Linux kernel that\nmay lead to a denial of service:\n\nCVE-2014-3610\n\n Lars Bull of Google and Nadav Amit reported a flaw in how KVM\n handles noncanonical writes to certain MSR registers. A privileged\n guest user can exploit this flaw to cause a denial of service\n (kernel panic) on the host.\n\nCVE-2014-3611\n\n Lars Bull of Google reported a race condition in in the PIT\n emulation code in KVM. A local guest user with access to PIT i/o\n ports could exploit this flaw to cause a denial of service (crash)\n on the host.\n\nCVE-2014-3645 / CVE-2014-3646\n\n The Advanced Threat Research team at Intel Security discovered\n that the KVM subsystem did not handle the VM exits gracefully\n for the invept (Invalidate Translations Derived from EPT) and\n invvpid (Invalidate Translations Based on VPID) instructions. On\n hosts with an Intel processor and invept/invppid VM exit\n support, an unprivileged guest user could use these instructions\n to crash the guest.\n\nCVE-2014-3647\n\n Nadav Amit reported that KVM mishandles noncanonical addresses when\n emulating instructions that change rip, potentially causing a failed\n VM-entry. A guest user with access to I/O or the MMIO can use this\n flaw to cause a denial of service (system crash) of the guest.\n\nCVE-2014-3673\n\n Liu Wei of Red Hat discovered a flaw in net/core/skbuff.c leading to\n a kernel panic when receiving malformed ASCONF chunks. A remote\n attacker could use this flaw to crash the system.\n\nCVE-2014-3687\n\n A flaw in the sctp stack was discovered leading to a kernel panic\n when receiving duplicate ASCONF chunks. A remote attacker could use\n this flaw to crash the system.\n\nCVE-2014-3688\n\n It was found that the sctp stack is prone to a remotely triggerable\n memory pressure issue caused by excessive queueing. A remote\n attacker could use this flaw to cause denial-of-service conditions\n on the system.\n\nCVE-2014-3690\n\n Andy Lutomirski discovered that incorrect register handling in KVM\n may lead to denial of service.\n\nCVE-2014-7207\n\n Several Debian developers reported an issue in the IPv6 networking\n subsystem. A local user with access to tun or macvtap devices, or a\n virtual machine connected to such a device, can cause a denial of\n service (system crash).\n\nThis update includes a bug fix related to CVE-2014-7207 that disables\nUFO (UDP Fragmentation Offload) in the macvtap, tun, and virtio_net\ndrivers. This will cause migration of a running VM from a host running\nan earlier kernel version to a host running this kernel version to fail,\nif the VM has been assigned a virtio network device. In order to migrate\nsuch a VM, it must be shut down first.\n\nFor the stable distribution (wheezy), these problems have been fixed in\nversion 3.2.63-2+deb7u1.\n\nWe recommend that you upgrade your linux packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 3, "modified": "2014-10-31T15:41:59", "published": "2014-10-31T15:41:59", "id": "DEBIAN:DSA-3060-1:394A4", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2014/msg00248.html", "title": "[SECURITY] [DSA 3060-1] linux security update", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-11-11T13:19:57", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3688", "CVE-2014-7841", "CVE-2014-8709", "CVE-2014-3185", "CVE-2014-8884", "CVE-2014-6410", "CVE-2014-3687"], "description": "Package : linux-2.6\nVersion : 2.6.32-48squeeze10\nCVE ID : CVE-2014-3185 CVE-2014-3687 CVE-2014-3688 CVE-2014-6410\n CVE-2014-7841 CVE-2014-8709 CVE-2014-8884\n\nNon-maintainer upload by the Squeeze LTS and Kernel Teams.\n\nNew upstream stable release 2.6.32.65, see\nhttp://lkml.org/lkml/2014/12/13/81 for more information.\n\nThe stable release 2.6.32.65 includes the following new commits compared\nto the previous 2.6.32-48squeeze9 package:\n\n - USB: whiteheat: Added bounds checking for bulk command response\n (CVE-2014-3185)\n - net: sctp: fix panic on duplicate ASCONF chunks (CVE-2014-3687)\n - net: sctp: fix remote memory pressure from excessive queueing\n (CVE-2014-3688)\n - udf: Avoid infinite loop when processing indirect ICBs (CVE-2014-6410)\n - net: sctp: fix NULL pointer dereference in af->from_addr_param on\n malformed packet (CVE-2014-7841)\n - mac80211: fix fragmentation code, particularly for encryption\n (CVE-2014-8709)\n - ttusb-dec: buffer overflow in ioctl (CVE-2014-8884)\n\nWe recommend that you upgrade your linux-2.6 packages.\n\n\n\nWe apologize for a minor cosmetic glitch:\n\nThe following commits were already included in 2.6.32-48squeeze9 despite\nclaims in debian/changelog they were only fixed in 2.6.32-48squeez10:\n\n - vlan: Don't propagate flag changes on down interfaces.\n - sctp: Fix double-free introduced by bad backport in 2.6.32.62\n - md/raid6: Fix misapplied backport in 2.6.32.64\n - block: add missing blk_queue_dead() checks\n - block: Fix blk_execute_rq_nowait() dead queue handling\n - proc connector: Delete spurious memset in proc_exit_connector()\n", "edition": 7, "modified": "2014-12-21T17:46:09", "published": "2014-12-21T17:46:09", "id": "DEBIAN:DLA-118-1:98410", "href": "https://lists.debian.org/debian-lts-announce/2014/debian-lts-announce-201412/msg00020.html", "title": "[SECURITY] [DLA 118-1] linux-2.6 security update", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:55", "bulletinFamily": "software", "cvelist": ["CVE-2014-3646", "CVE-2014-3673", "CVE-2014-3688", "CVE-2014-3611", "CVE-2014-3647", "CVE-2014-3610", "CVE-2014-3645", "CVE-2014-7207", "CVE-2014-3690", "CVE-2014-3687"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA512\r\n\r\n- -------------------------------------------------------------------------\r\nDebian Security Advisory DSA-3060-1 security@debian.org\r\nhttp://www.debian.org/security/ Salvatore Bonaccorso\r\nOctober 31, 2014 http://www.debian.org/security/faq\r\n- -------------------------------------------------------------------------\r\n\r\nPackage : linux\r\nCVE ID : CVE-2014-3610 CVE-2014-3611 CVE-2014-3645 CVE-2014-3646 \r\n CVE-2014-3647 CVE-2014-3673 CVE-2014-3687 CVE-2014-3688\r\n CVE-2014-3690 CVE-2014-7207\r\nDebian Bug : 766195\r\n\r\nSeveral vulnerabilities have been discovered in the Linux kernel that\r\nmay lead to a denial of service:\r\n\r\nCVE-2014-3610\r\n\r\n Lars Bull of Google and Nadav Amit reported a flaw in how KVM\r\n handles noncanonical writes to certain MSR registers. A privileged\r\n guest user can exploit this flaw to cause a denial of service\r\n (kernel panic) on the host.\r\n\r\nCVE-2014-3611\r\n\r\n Lars Bull of Google reported a race condition in in the PIT\r\n emulation code in KVM. A local guest user with access to PIT i/o\r\n ports could exploit this flaw to cause a denial of service (crash)\r\n on the host.\r\n\r\nCVE-2014-3645 / CVE-2014-3646\r\n\r\n The Advanced Threat Research team at Intel Security discovered\r\n that the KVM subsystem did not handle the VM exits gracefully\r\n for the invept (Invalidate Translations Derived from EPT) and\r\n invvpid (Invalidate Translations Based on VPID) instructions. On\r\n hosts with an Intel processor and invept/invppid VM exit\r\n support, an unprivileged guest user could use these instructions\r\n to crash the guest.\r\n\r\nCVE-2014-3647\r\n\r\n Nadav Amit reported that KVM mishandles noncanonical addresses when\r\n emulating instructions that change rip, potentially causing a failed\r\n VM-entry. A guest user with access to I/O or the MMIO can use this\r\n flaw to cause a denial of service (system crash) of the guest.\r\n\r\nCVE-2014-3673\r\n\r\n Liu Wei of Red Hat discovered a flaw in net/core/skbuff.c leading to\r\n a kernel panic when receiving malformed ASCONF chunks. A remote\r\n attacker could use this flaw to crash the system.\r\n\r\nCVE-2014-3687\r\n\r\n A flaw in the sctp stack was discovered leading to a kernel panic\r\n when receiving duplicate ASCONF chunks. A remote attacker could use\r\n this flaw to crash the system.\r\n\r\nCVE-2014-3688\r\n\r\n It was found that the sctp stack is prone to a remotely triggerable\r\n memory pressure issue caused by excessive queueing. A remote\r\n attacker could use this flaw to cause denial-of-service conditions\r\n on the system.\r\n\r\nCVE-2014-3690\r\n\r\n Andy Lutomirski discovered that incorrect register handling in KVM\r\n may lead to denial of service.\r\n\r\nCVE-2014-7207\r\n\r\n Several Debian developers reported an issue in the IPv6 networking\r\n subsystem. A local user with access to tun or macvtap devices, or a\r\n virtual machine connected to such a device, can cause a denial of\r\n service (system crash).\r\n\r\nThis update includes a bug fix related to CVE-2014-7207 that disables\r\nUFO (UDP Fragmentation Offload) in the macvtap, tun, and virtio_net\r\ndrivers. This will cause migration of a running VM from a host running\r\nan earlier kernel version to a host running this kernel version to fail,\r\nif the VM has been assigned a virtio network device. In order to migrate\r\nsuch a VM, it must be shut down first.\r\n\r\nFor the stable distribution (wheezy), these problems have been fixed in\r\nversion 3.2.63-2+deb7u1.\r\n\r\nWe recommend that you upgrade your linux packages.\r\n\r\nFurther information about Debian Security Advisories, how to apply\r\nthese updates to your system and frequently asked questions can be\r\nfound at: https://www.debian.org/security/\r\n\r\nMailing list: debian-security-announce@lists.debian.org\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1\r\n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\r\nZi2/SaZlg6UFhCxOhGP/\r\n=buiF\r\n-----END PGP SIGNATURE-----\r\n\r\n", "edition": 1, "modified": "2014-11-03T00:00:00", "published": "2014-11-03T00:00:00", "id": "SECURITYVULNS:DOC:31325", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:31325", "title": "[SECURITY] [DSA 3060-1] linux security update", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:55", "bulletinFamily": "software", "cvelist": ["CVE-2014-3646", "CVE-2014-3611", "CVE-2014-3647", "CVE-2014-3610", "CVE-2014-7145"], "description": "\r\n\r\n==========================================================================\r\nUbuntu Security Notice USN-2394-1\r\nOctober 30, 2014\r\n\r\nlinux-lts-trusty vulnerabilities\r\n==========================================================================\r\n\r\nA security issue affects these releases of Ubuntu and its derivatives:\r\n\r\n- Ubuntu 12.04 LTS\r\n\r\nSummary:\r\n\r\nSeveral security issues were fixed in the kernel.\r\n\r\nSoftware Description:\r\n- linux-lts-trusty: Linux hardware enablement kernel from Trusty\r\n\r\nDetails:\r\n\r\nNadav Amit reported that the KVM (Kernel Virtual Machine) mishandles\r\nnoncanonical addresses when emulating instructions that change the rip\r\n(Instruction Pointer). A guest user with access to I/O or the MMIO can use\r\nthis flaw to cause a denial of service (system crash) of the guest.\r\n(CVE-2014-3647)\r\n\r\nA flaw was discovered with the handling of the invept instruction in the\r\nKVM (Kernel Virtual Machine) subsystem of the Linux kernel. An unprivileged\r\nguest user could exploit this flaw to cause a denial of service (system\r\ncrash) on the guest. (CVE-2014-3646)\r\n\r\nLars Bull reported a race condition in the PIT (programmable interrupt\r\ntimer) emulation in the KVM (Kernel Virtual Machine) subsystem of the Linux\r\nkernel. A local guest user with access to PIT i/o ports could exploit this\r\nflaw to cause a denial of service (crash) on the host. (CVE-2014-3611)\r\n\r\nLars Bull and Nadav Amit reported a flaw in how KVM (the Kernel Virtual\r\nMachine) handles noncanonical writes to certain MSR registers. A privileged\r\nguest user can exploit this flaw to cause a denial of service (kernel\r\npanic) on the host. (CVE-2014-3610)\r\n\r\nRaphael Geissert reported a NULL pointer dereference in the Linux kernel's\r\nCIFS client. A remote CIFS server could cause a denial of service (system\r\ncrash) or possibly have other unspecified impact by deleting IPC$ share\r\nduring resolution of DFS referrals. (CVE-2014-7145)\r\n\r\nUpdate instructions:\r\n\r\nThe problem can be corrected by updating your system to the following\r\npackage versions:\r\n\r\nUbuntu 12.04 LTS:\r\n linux-image-3.13.0-39-generic 3.13.0-39.66~precise1\r\n linux-image-3.13.0-39-generic-lpae 3.13.0-39.66~precise1\r\n\r\nAfter a standard system update you need to reboot your computer to make\r\nall the necessary changes.\r\n\r\nATTENTION: Due to an unavoidable ABI change the kernel updates have\r\nbeen given a new version number, which requires you to recompile and\r\nreinstall all third party kernel modules you might have installed. If\r\nyou use linux-restricted-modules, you have to update that package as\r\nwell to get modules which work with the new kernel version. Unless you\r\nmanually uninstalled the standard kernel metapackages (e.g. linux-generic,\r\nlinux-server, linux-powerpc), a standard system upgrade will automatically\r\nperform this as well.\r\n\r\nReferences:\r\n http://www.ubuntu.com/usn/usn-2394-1\r\n CVE-2014-3610, CVE-2014-3611, CVE-2014-3646, CVE-2014-3647,\r\n CVE-2014-7145\r\n\r\nPackage Information:\r\n https://launchpad.net/ubuntu/+source/linux-lts-trusty/3.13.0-39.66~precise1\r\n\r\n\r\n\r\n\r\n-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\r\n\r\n", "edition": 1, "modified": "2014-11-03T00:00:00", "published": "2014-11-03T00:00:00", "id": "SECURITYVULNS:DOC:31324", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:31324", "title": "[USN-2394-1] Linux kernel (Trusty HWE) vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:55", "bulletinFamily": "software", "cvelist": ["CVE-2014-3646", "CVE-2014-8369", "CVE-2014-7825", "CVE-2014-3673", "CVE-2014-3611", "CVE-2014-3647", "CVE-2014-3610", "CVE-2014-3645", "CVE-2014-3601", "CVE-2014-3690", "CVE-2014-7826", "CVE-2014-3687", "CVE-2014-7970"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n\r\n Mandriva Linux Security Advisory MDVSA-2014:230\r\n http://www.mandriva.com/en/support/security/\r\n _______________________________________________________________________\r\n\r\n Package : kernel\r\n Date : November 27, 2014\r\n Affected: Business Server 1.0\r\n _______________________________________________________________________\r\n\r\n Problem Description:\r\n\r\n Multiple vulnerabilities has been found and corrected in the Linux\r\n kernel:\r\n \r\n The WRMSR processing functionality in the KVM subsystem in the\r\n Linux kernel through 3.17.2 does not properly handle the writing of a\r\n non-canonical address to a model-specific register, which allows guest\r\n OS users to cause a denial of service (host OS crash) by leveraging\r\n guest OS privileges, related to the wrmsr_interception function in\r\n arch/x86/kvm/svm.c and the handle_wrmsr function in arch/x86/kvm/vmx.c\r\n (CVE-2014-3610).\r\n \r\n Race condition in the __kvm_migrate_pit_timer function in\r\n arch/x86/kvm/i8254.c in the KVM subsystem in the Linux kernel through\r\n 3.17.2 allows guest OS users to cause a denial of service (host OS\r\n crash) by leveraging incorrect PIT emulation (CVE-2014-3611).\r\n \r\n arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before\r\n 3.12 does not have an exit handler for the INVEPT instruction, which\r\n allows guest OS users to cause a denial of service (guest OS crash)\r\n via a crafted application (CVE-2014-3645).\r\n \r\n arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through\r\n 3.17.2 does not have an exit handler for the INVVPID instruction,\r\n which allows guest OS users to cause a denial of service (guest OS\r\n crash) via a crafted application (CVE-2014-3646).\r\n \r\n arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel\r\n through 3.17.2 does not properly perform RIP changes, which allows\r\n guest OS users to cause a denial of service (guest OS crash) via a\r\n crafted application (CVE-2014-3647).\r\n \r\n The SCTP implementation in the Linux kernel through 3.17.2 allows\r\n remote attackers to cause a denial of service (system crash) via\r\n a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and\r\n net/sctp/sm_statefuns.c (CVE-2014-3673).\r\n \r\n The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c\r\n in the SCTP implementation in the Linux kernel through 3.17.2 allows\r\n remote attackers to cause a denial of service (panic) via duplicate\r\n ASCONF chunks that trigger an incorrect uncork within the side-effect\r\n interpreter (CVE-2014-3687).\r\n \r\n arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before\r\n 3.17.2 on Intel processors does not ensure that the value in the CR4\r\n control register remains the same after a VM entry, which allows host\r\n OS users to kill arbitrary processes or cause a denial of service\r\n (system disruption) by leveraging /dev/kvm access, as demonstrated by\r\n PR_SET_TSC prctl calls within a modified copy of QEMU (CVE-2014-3690).\r\n \r\n kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2\r\n does not properly handle private syscall numbers during use of the\r\n perf subsystem, which allows local users to cause a denial of service\r\n (out-of-bounds read and OOPS) or bypass the ASLR protection mechanism\r\n via a crafted application (CVE-2014-7825).\r\n \r\n kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2\r\n does not properly handle private syscall numbers during use of the\r\n ftrace subsystem, which allows local users to gain privileges or\r\n cause a denial of service (invalid pointer dereference) via a crafted\r\n application (CVE-2014-7826).\r\n \r\n The pivot_root implementation in fs/namespace.c in the Linux kernel\r\n through 3.17 does not properly interact with certain locations of\r\n a chroot directory, which allows local users to cause a denial of\r\n service (mount-tree loop) via . (dot) values in both arguments to\r\n the pivot_root system call (CVE-2014-7970).\r\n \r\n The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux\r\n kernel through 3.17.2 miscalculates the number of pages during\r\n the handling of a mapping failure, which allows guest OS users to\r\n cause a denial of service (host OS page unpinning) or possibly have\r\n unspecified other impact by leveraging guest OS privileges. NOTE: this\r\n vulnerability exists because of an incorrect fix for CVE-2014-3601\r\n (CVE-2014-8369).\r\n \r\n The updated packages provides a solution for these security issues.\r\n _______________________________________________________________________\r\n\r\n References:\r\n\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3610\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3611\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3645\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3646\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3647\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3673\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3687\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3690\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7825\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7826\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7970\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8369\r\n _______________________________________________________________________\r\n\r\n Updated Packages:\r\n\r\n Mandriva Business Server 1/X86_64:\r\n 844335653b0d9e326bd0a216f3ea302d mbs1/x86_64/cpupower-3.4.104-2.1.mbs1.x86_64.rpm\r\n 0944cdafdcb39a677b01248786a2a57b mbs1/x86_64/kernel-firmware-3.4.104-2.1.mbs1.noarch.rpm\r\n ba7ff021bc473448d12f34507ed3c421 mbs1/x86_64/kernel-headers-3.4.104-2.1.mbs1.x86_64.rpm\r\n c5da0b82ad77b075f6ce0390cafe4529 mbs1/x86_64/kernel-server-3.4.104-2.1.mbs1.x86_64.rpm\r\n 818764027cea7651b6eed4bdaefcb689 mbs1/x86_64/kernel-server-devel-3.4.104-2.1.mbs1.x86_64.rpm\r\n fb73af4d10dbfb744772697aeded569d mbs1/x86_64/kernel-source-3.4.104-2.mbs1.noarch.rpm\r\n cb9483eb41b264e9c0844098912dc303 mbs1/x86_64/lib64cpupower0-3.4.104-2.1.mbs1.x86_64.rpm\r\n bca76ebdff84f3fcb662ed40f337dab2 mbs1/x86_64/lib64cpupower-devel-3.4.104-2.1.mbs1.x86_64.rpm\r\n dd64b01e869b7cfb3c565310d4bcd445 mbs1/x86_64/perf-3.4.104-2.1.mbs1.x86_64.rpm \r\n 06db298a74aae5b928698a4ab1c5caf9 mbs1/SRPMS/cpupower-3.4.104-2.1.mbs1.src.rpm\r\n 096237c036ac96f145cce3045968ee53 mbs1/SRPMS/kernel-firmware-3.4.104-2.1.mbs1.src.rpm\r\n b28b50590a939c293d1f5b47a210a4d3 mbs1/SRPMS/kernel-headers-3.4.104-2.1.mbs1.src.rpm\r\n d6b2dd0334645247996a487d5b946fdc mbs1/SRPMS/kernel-server-3.4.104-2.1.mbs1.src.rpm\r\n 7457a1bb39e640bebe34b68857e04b54 mbs1/SRPMS/kernel-source-3.4.104-2.mbs1.src.rpm\r\n 45b43544167a6e121148276e9ddb6a49 mbs1/SRPMS/perf-3.4.104-2.1.mbs1.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/en/support/security/advisories/\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.12 (GNU/Linux)\r\n\r\niD8DBQFUdtH/mqjQ0CJFipgRAmCdAJ9EMBSGdIrGawNjl72V8cYCHhZhMgCg5g4t\r\nuKrF0GIY2y6H1sJCQMF3rZU=\r\n=MIBL\r\n-----END PGP SIGNATURE-----\r\n\r\n", "edition": 1, "modified": "2014-11-30T00:00:00", "published": "2014-11-30T00:00:00", "id": "SECURITYVULNS:DOC:31407", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:31407", "title": "[ MDVSA-2014:230 ] kernel", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:57", "bulletinFamily": "software", "cvelist": ["CVE-2014-3646", "CVE-2014-8369", "CVE-2014-7825", "CVE-2014-3673", "CVE-2014-3688", "CVE-2014-3611", "CVE-2014-3647", "CVE-2014-3610", "CVE-2014-3645", "CVE-2014-7207", "CVE-2014-3690", "CVE-2014-7145", "CVE-2014-7826", "CVE-2014-3687", "CVE-2014-7970"], "description": "Multiple KVM vulnerabilities, CIFS client DoS, remote DoS vulnerabilities, trace_syscalls privilege escalation and protection bypass.", "edition": 1, "modified": "2014-11-30T00:00:00", "published": "2014-11-30T00:00:00", "id": "SECURITYVULNS:VULN:14068", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:14068", "title": "Linux kernel multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "archlinux": [{"lastseen": "2016-09-02T18:44:37", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3646", "CVE-2014-8369", "CVE-2014-7825", "CVE-2014-3611", "CVE-2014-3647", "CVE-2014-3610", "CVE-2014-3601", "CVE-2014-7826"], "description": "CVE-2014-3610: The WRMSR processing functionality in the KVM subsystem\nin the Linux kernel does not properly handle the writing of a\nnon-canonical address to a model-specific register, which allows guest\nOS users to cause a denial of service (host OS crash) by leveraging\nguest OS privileges, related to the wrmsr_interception function in\narch/x86/kvm/svm.c and the handle_wrmsr function in arch/x86/kvm/vmx.c.\n\nCVE-2014-3611: Race condition in the __kvm_migrate_pit_timer function in\narch/x86/kvm/i8254.c in the KVM subsystem in the Linux kernel allows\nguest OS users to cause a denial of service (host OS crash) by\nleveraging incorrect PIT emulation.\n\nCVE-2014-3646: arch/x86/kvm/vmx.c in the KVM subsystem in the Linux\nkernel does not have an exit handler for the INVVPID instruction, which\nallows guest OS users to cause a denial of service (guest OS crash) via\na crafted application.\n\nCVE-2014-3647: arch/x86/kvm/emulate.c in the KVM subsystem in the Linux\nkernel does not properly perform RIP changes, which allows guest OS\nusers to cause a denial of service (guest OS crash) via a crafted\napplication.\n\nCVE-2014-7825: kernel/trace/trace_syscalls.c in the Linux kernel does\nnot properly handle private syscall numbers during use of the perf\nsubsystem, which allows local users to cause a denial of service\n(out-of-bounds read and OOPS) or bypass the ASLR protection mechanism\nvia a crafted application.\n\nCVE-2014-7826: kernel/trace/trace_syscalls.c in the Linux kernel through\n3.17.2 does not properly handle private syscall numbers during use of\nthe ftrace subsystem, which allows local users to gain privileges or\ncause a denial of service (invalid pointer dereference) via a crafted\napplication.\n\nCVE-2014-8369: The kvm_iommu_map_pages function in virt/kvm/iommu.c in\nthe Linux kernel miscalculates the number of pages during the handling\nof a mapping failure, which allows guest OS users to cause a denial of\nservice (host OS page unpinning) or possibly have unspecified other\nimpact by leveraging guest OS privileges. NOTE: this vulnerability\nexists because of an incorrect fix for CVE-2014-3601.", "modified": "2014-11-17T00:00:00", "published": "2014-11-17T00:00:00", "id": "ASA-201411-15", "href": "https://lists.archlinux.org/pipermail/arch-security/2014-November/000140.html", "type": "archlinux", "title": "linux-lts: local denial of service, privilege escalation", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2016-09-02T18:44:40", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3646", "CVE-2014-8369", "CVE-2014-8481", "CVE-2014-7825", "CVE-2014-3611", "CVE-2014-3647", "CVE-2014-3610", "CVE-2014-8480", "CVE-2014-3601", "CVE-2014-7826"], "description": "CVE-2014-3610: The WRMSR processing functionality in the KVM subsystem\nin the Linux kernel does not properly handle the writing of a\nnon-canonical address to a model-specific register, which allows guest\nOS users to cause a denial of service (host OS crash) by leveraging\nguest OS privileges, related to the wrmsr_interception function in\narch/x86/kvm/svm.c and the handle_wrmsr function in arch/x86/kvm/vmx.c.\n\nCVE-2014-3611: Race condition in the __kvm_migrate_pit_timer function in\narch/x86/kvm/i8254.c in the KVM subsystem in the Linux kernel allows\nguest OS users to cause a denial of service (host OS crash) by\nleveraging incorrect PIT emulation.\n\nCVE-2014-3646: arch/x86/kvm/vmx.c in the KVM subsystem in the Linux\nkernel does not have an exit handler for the INVVPID instruction, which\nallows guest OS users to cause a denial of service (guest OS crash) via\na crafted application.\n\nCVE-2014-3647: arch/x86/kvm/emulate.c in the KVM subsystem in the Linux\nkernel does not properly perform RIP changes, which allows guest OS\nusers to cause a denial of service (guest OS crash) via a crafted\napplication.\n\nCVE-2014-7825: kernel/trace/trace_syscalls.c in the Linux kernel does\nnot properly handle private syscall numbers during use of the perf\nsubsystem, which allows local users to cause a denial of service\n(out-of-bounds read and OOPS) or bypass the ASLR protection mechanism\nvia a crafted application.\n\nCVE-2014-7826: kernel/trace/trace_syscalls.c in the Linux kernel through\n3.17.2 does not properly handle private syscall numbers during use of\nthe ftrace subsystem, which allows local users to gain privileges or\ncause a denial of service (invalid pointer dereference) via a crafted\napplication.\n\nCVE-2014-8369: The kvm_iommu_map_pages function in virt/kvm/iommu.c in\nthe Linux kernel miscalculates the number of pages during the handling\nof a mapping failure, which allows guest OS users to cause a denial of\nservice (host OS page unpinning) or possibly have unspecified other\nimpact by leveraging guest OS privileges. NOTE: this vulnerability\nexists because of an incorrect fix for CVE-2014-3601.\n\nCVE-2014-8480: The instruction decoder in arch/x86/kvm/emulate.c in the\nKVM subsystem in the Linux kernel lacks intended decoder-table flags for\ncertain RIP-relative instructions, which allows guest OS users to cause\na denial of service (NULL pointer dereference and host OS crash) via a\ncrafted application.\n\nCVE-2014-8481: The instruction decoder in arch/x86/kvm/emulate.c in the\nKVM subsystem in the Linux kernel does not properly handle invalid\ninstructions, which allows guest OS users to cause a denial of service\n(NULL pointer dereference and host OS crash) via a crafted application\nthat triggers (1) an improperly fetched instruction or (2) an\ninstruction that occupies too many bytes. NOTE: this vulnerability\nexists because of an incomplete fix for CVE-2014-8480.", "modified": "2014-11-17T00:00:00", "published": "2014-11-17T00:00:00", "id": "ASA-201411-14", "href": "https://lists.archlinux.org/pipermail/arch-security/2014-November/000139.html", "type": "archlinux", "title": "linux: local denial of service, privilege escalation", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "fedora": [{"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3610", "CVE-2014-3611", "CVE-2014-3646", "CVE-2014-3673", "CVE-2014-3687", "CVE-2014-3688", "CVE-2014-3690", "CVE-2014-8369", "CVE-2014-8480", "CVE-2014-8481"], "description": "The kernel meta package ", "modified": "2014-11-03T05:23:10", "published": "2014-11-03T05:23:10", "id": "FEDORA:DFF016087D0B", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 21 Update: kernel-3.17.2-300.fc21", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "suse": [{"lastseen": "2016-09-04T11:42:33", "bulletinFamily": "unix", "cvelist": ["CVE-2014-3673", "CVE-2014-9090", "CVE-2014-7841", "CVE-2014-3611", "CVE-2014-3647", "CVE-2014-3610", "CVE-2014-9322", "CVE-2014-3185", "CVE-2013-6405", "CVE-2014-8133", "CVE-2014-7826"], "description": "The SUSE Linux Enterprise 12 kernel was updated to 3.12.31 to receive\n various security and bugfixes.\n\n Security issues fixed: CVE-2014-9322: A local privilege escalation in the\n x86_64 32bit compatibility signal handling was fixed, which could be used\n by local attackers to crash the machine or execute code.\n\n CVE-2014-9090: Various issues in LDT handling in 32bit compatibility mode\n on the x86_64 platform were fixed, where local attackers could crash the\n machine.\n\n CVE-2014-8133: Insufficient validation of TLS register usage could leak\n information from the kernel stack to userspace.\n\n CVE-2014-7826: kernel/trace/trace_syscalls.c in the Linux kernel did not\n properly handle private syscall numbers during use of the ftrace\n subsystem, which allowed local users to gain privileges or cause a denial\n of service (invalid pointer dereference) via a crafted application.\n\n CVE-2014-3647: Nadav Amit reported that the KVM (Kernel Virtual Machine)\n mishandled noncanonical addresses when emulating instructions that change\n the rip (Instruction Pointer). A guest user with access to I/O or the MMIO\n could use this flaw to cause a denial of service (system crash) of the\n guest.\n\n CVE-2014-3611: A race condition flaw was found in the way the Linux\n kernel's KVM subsystem handled PIT (Programmable Interval Timer)\n emulation. A guest user who has access to the PIT I/O ports could use this\n flaw to crash the host.\n\n CVE-2014-3610: If the guest writes a noncanonical value to certain MSR\n registers, KVM will write that value to the MSR in the host context and a\n #GP will be raised leading to kernel panic. A privileged guest user could\n have used this flaw to crash the host.\n\n CVE-2014-7841: A remote attacker could have used a flaw in SCTP to crash\n the system by sending a maliciously prepared SCTP packet in order to\n trigger a NULL pointer dereference on the server.\n\n CVE-2014-3673: The SCTP implementation in the Linux kernel allowed remote\n attackers to cause a denial of service (system crash) via a malformed\n ASCONF chunk, related to net/sctp/sm_make_chunk.c and\n net/sctp/sm_statefuns.c.\n\n CVE-2014-3185: Multiple buffer overflows in the command_port_read_callback\n function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial\n Driver in the Linux kernel allowed physically proximate attackers to\n execute arbitrary code or cause a denial of service (memory corruption and\n system crash) via a crafted device that provides a large amount of (1)\n EHCI or (2) XHCI data associated with a bulk response.\n\n\n\n Bugs fixed: BTRFS:\n - btrfs: fix race that makes btrfs_lookup_extent_info miss skinny extent\n items (bnc#904077).\n - btrfs: fix invalid leaf slot access in btrfs_lookup_extent()\n (bnc#904077).\n - btrfs: avoid returning -ENOMEM in convert_extent_bit() too early\n (bnc#902016).\n - btrfs: make find_first_extent_bit be able to cache any state\n (bnc#902016).\n - btrfs: deal with convert_extent_bit errors to avoid fs corruption\n (bnc#902016).\n - btrfs: be aware of btree inode write errors to avoid fs corruption\n (bnc#899551).\n - btrfs: add missing end_page_writeback on submit_extent_page failure\n (bnc#899551).\n - btrfs: fix crash of btrfs_release_extent_buffer_page (bnc#899551).\n - btrfs: ensure readers see new data after a clone operation (bnc#898234).\n - btrfs: avoid visiting all extent items when cloning a range (bnc#898234).\n - btrfs: fix clone to deal with holes when NO_HOLES feature is enabled\n (bnc#898234).\n - btrfs: make fsync work after cloning into a file (bnc#898234).\n - btrfs: fix use-after-free when cloning a trailing file hole (bnc#898234).\n - btrfs: clone, don't create invalid hole extent map (bnc#898234).\n - btrfs: limit the path size in send to PATH_MAX (bnc#897770).\n - btrfs: send, fix more issues related to directory renames (bnc#897770).\n - btrfs: send, remove dead code from __get_cur_name_and_parent\n (bnc#897770).\n - btrfs: send, account for orphan directories when building path strings\n (bnc#897770).\n - btrfs: send, avoid unnecessary inode item lookup in the btree\n (bnc#897770).\n - btrfs: send, fix incorrect ref access when using extrefs (bnc#897770).\n - btrfs: send, build path string only once in send_hole (bnc#897770).\n - btrfs: part 2, fix incremental send's decision to delay a dir\n move/rename (bnc#897770).\n - btrfs: fix incremental send's decision to delay a dir move/rename\n (bnc#897770).\n - btrfs: remove unnecessary inode generation lookup in send (bnc#897770).\n - btrfs: avoid unnecessary utimes update in incremental send (bnc#897770).\n - btrfs: fix send issuing outdated paths for utimes, chown and chmod\n (bnc#897770).\n - btrfs: fix send attempting to rmdir non-empty directories (bnc#897770).\n - btrfs: send, don't send rmdir for same target multiple times\n (bnc#897770).\n - btrfs: incremental send, fix invalid path after dir rename (bnc#897770).\n - btrfs: fix assert screwup for the pending move stuff (bnc#897770).\n - btrfs: make some tree searches in send.c more efficient (bnc#897770).\n - btrfs: use right extent item position in send when finding extent clones\n (bnc#897770).\n - btrfs: more send support for parent/child dir relationship inversion\n (bnc#897770).\n - btrfs: fix send dealing with file renames and directory moves\n (bnc#897770).\n - btrfs: add missing error check in incremental send (bnc#897770).\n - btrfs: make send's file extent item search more efficient (bnc#897770).\n - btrfs: fix infinite path build loops in incremental send (bnc#897770).\n - btrfs: send, don't delay dir move if there's a new parent inode\n (bnc#897770).\n - btrfs: add helper btrfs_fdatawrite_range (bnc#902010).\n - btrfs: correctly flush compressed data before/after direct IO\n (bnc#902010).\n - btrfs: make inode.c:compress_file_range() return void (bnc#902010).\n - btrfs: report error after failure inlining extent in compressed write\n path (bnc#902010).\n - btrfs: don't ignore compressed bio write errors (bnc#902010).\n - btrfs: make inode.c:submit_compressed_extents() return void (bnc#902010).\n - btrfs: process all async extents on compressed write failure\n (bnc#902010).\n - btrfs: don't leak pages and memory on compressed write error\n (bnc#902010).\n - btrfs: fix hang on compressed write error (bnc#902010).\n - btrfs: set page and mapping error on compressed write failure\n (bnc#902010).\n - btrfs: fix kfree on list_head in btrfs_lookup_csums_range error cleanup\n (bnc#904115).\n\n\n Hyper-V:\n - hyperv: Fix a bug in netvsc_send().\n - hyperv: Fix a bug in netvsc_start_xmit().\n - drivers: hv: vmbus: Enable interrupt driven flow control.\n - drivers: hv: vmbus: Properly protect calls to smp_processor_id().\n - drivers: hv: vmbus: Cleanup hv_post_message().\n - drivers: hv: vmbus: Cleanup vmbus_close_internal().\n - drivers: hv: vmbus: Fix a bug in vmbus_open().\n - drivers: hv: vmbus: Cleanup vmbus_establish_gpadl().\n - drivers: hv: vmbus: Cleanup vmbus_teardown_gpadl().\n - drivers: hv: vmbus: Cleanup vmbus_post_msg().\n - storvsc: get rid of overly verbose warning messages.\n - hyperv: NULL dereference on error.\n - hyperv: Increase the buffer length for netvsc_channel_cb().\n\n zSeries / S390:\n - s390: pass march flag to assembly files as well (bnc#903279, LTC#118177).\n - kernel: reduce function tracer overhead (bnc#903279, LTC#118177).\n - SUNRPC: Handle EPIPE in xprt_connect_status (bnc#901090).\n - SUNRPC: Ensure that we handle ENOBUFS errors correctly (bnc#901090).\n - SUNRPC: Ensure call_connect_status() deals correctly with SOFTCONN tasks\n (bnc#901090).\n - SUNRPC: Ensure that call_connect times out correctly (bnc#901090).\n - SUNRPC: Handle connect errors ECONNABORTED and EHOSTUNREACH (bnc#901090).\n - SUNRPC: Ensure xprt_connect_status handles all potential connection\n errors (bnc#901090).\n - SUNRPC: call_connect_status should recheck bind and connect status on\n error (bnc#901090).\n\n kGraft:\n - kgr: force patching process to succeed (fate#313296).\n - kgr: usb-storage, mark kthread safe (fate#313296 bnc#899908).\n - Refresh patches.suse/kgr-0039-kgr-fix-ugly-race.patch. Fix few bugs, and\n also races (immutable vs mark_processes vs other threads).\n - kgr: always use locked bit ops for thread_info->flags (fate#313296).\n - kgr: lower the workqueue scheduling timeout (fate#313296 bnc#905087).\n - kgr: mark even more kthreads (fate#313296 bnc#904871).\n - rpm/kernel-binary.spec.in: Provide name-version-release for kgraft\n packages (bnc#901925)\n\n Other:\n - NFSv4: test SECINFO RPC_AUTH_GSS pseudoflavors for support (bnc#905758).\n\n - Enable cmac(aes) and cmac(3des_ede) for FIPS mode (bnc#905296\n bnc#905772).\n\n - scsi_dh_alua: disable ALUA handling for non-disk devices (bnc#876633).\n\n - powerpc/vphn: NUMA node code expects big-endian (bsc#900126).\n\n - net: fix checksum features handling in netif_skb_features() (bnc#891259).\n\n - be2net: Fix invocation of be_close() after be_clear() (bnc#895468).\n\n - PCI: pciehp: Clear Data Link Layer State Changed during init\n (bnc#898297).\n - PCI: pciehp: Use symbolic constants, not hard-coded bitmask (bnc#898297).\n - PCI: pciehp: Use link change notifications for hot-plug and removal\n (bnc#898297).\n - PCI: pciehp: Make check_link_active() non-static (bnc#898297).\n - PCI: pciehp: Enable link state change notifications (bnc#898297).\n\n - ALSA: hda - Treat zero connection as non-error (bnc#902898).\n\n - bcache: add mutex lock for bch_is_open (bnc#902893).\n\n - futex: Fix a race condition between REQUEUE_PI and task death (bcn\n #851603 (futex scalability series)).\n\n - Linux 3.12.31 (bnc#895983 bnc#897912).\n\n - futex: Ensure get_futex_key_refs() always implies a barrier (bcn #851603\n (futex scalability series)).\n\n - usbback: don't access request fields in shared ring more than once.\n - Update Xen patches to 3.12.30.\n\n - locking/rwsem: Avoid double checking before try acquiring write lock\n (Locking scalability.).\n\n - zcrypt: toleration of new crypto adapter hardware (bnc#894057,\n LTC#117041).\n - zcrypt: support for extended number of ap domains (bnc#894057,\n LTC#117041).\n\n - kABI: protect linux/fs.h include in mm/internal.h.\n\n - Linux 3.12.30 (FATE#315482 bnc#862957 bnc#863526 bnc#870498).\n\n - Update patches.fixes/xfs-mark-all-internal-workqueues-as-freezable.patch\n (bnc#899785).\n\n - xfs: mark all internal workqueues as freezable.\n\n - drm/i915: Move DP port disable to post_disable for pch platforms\n (bnc#899787).\n\n - pagecachelimit: reduce lru_lock congestion for heavy parallel reclaim\n fix (bnc#895680).\n\n - Linux 3.12.29 (bnc#879255 bnc#880892 bnc#887046 bnc#887418 bnc#891619\n bnc#892612 bnc#892650 bnc#897101).\n\n - iommu/vt-d: Work around broken RMRR firmware entries (bnc#892860).\n - iommu/vt-d: Store bus information in RMRR PCI device path (bnc#892860).\n - iommu/vt-d: Only remove domain when device is removed (bnc#883139).\n - driver core: Add BUS_NOTIFY_REMOVED_DEVICE event (bnc#883139).\n\n - Update config files: Re-enable CONFIG_FUNCTION_PROFILER (bnc#899489)\n Option FUNCTION_PROFILER was enabled in debug and trace kernels so far,\n but it was accidentally disabled before tracing features were merged\n into the default kernel and the trace flavor was discarded. So all\n kernels are missing the feature now. Re-enable it.\n\n - xfs: xlog_cil_force_lsn doesn't always wait correctly.\n\n - scsi: clear 'host_scribble' upon successful abort (bnc#894863).\n\n - module: warn if module init + probe takes long (bnc#889297 bnc#877622\n bnc#889295 bnc#893454).\n\n - mm, THP: don't hold mmap_sem in khugepaged when allocating THP\n (bnc#880767, VM Performance).\n\n - pagecache_limit: batch large nr_to_scan targets (bnc#895221).\n\n - iommu/vt-d: Check return value of acpi_bus_get_device() (bnc#903307).\n\n - rpm/kernel-binary.spec.in: Fix including the secure boot cert in\n /etc/uefi/certs\n\n - sched: Reduce contention in update_cfs_rq_blocked_load() (Scheduler/core\n performance).\n\n - x86: use optimized ioresource lookup in ioremap function (Boot time\n optimisations (bnc#895387)).\n - x86: optimize resource lookups for ioremap (Boot time\n optimisations (bnc#895387)).\n\n - usb: Do not re-read descriptors for wired devices in\n usb_authorize_device() (bnc#904354).\n\n - netxen: Fix link event handling (bnc#873228).\n\n - x86, cpu: Detect more TLB configuration -xen (TLB Performance).\n\n - x86/mm: Fix RCU splat from new TLB tracepoints (TLB Performance).\n - x86/mm: Set TLB flush tunable to sane value (33) (TLB Performance).\n - x86/mm: New tunable for single vs full TLB flush (TLB Performance).\n - x86/mm: Add tracepoints for TLB flushes (TLB Performance).\n - x86/mm: Unify remote INVLPG code (TLB Performance).\n - x86/mm: Fix missed global TLB flush stat (TLB Performance).\n - x86/mm: Rip out complicated, out-of-date, buggy TLB flushing (TLB\n Performance).\n - x86, cpu: Detect more TLB configuration (TLB Performance).\n - mm, x86: Revisit tlb_flushall_shift tuning for page flushes except on\n IvyBridge (TLB Performance).\n - x86/mm: Clean up the TLB flushing code (TLB Performance).\n - mm: free compound page with correct order (VM Functionality).\n\n - bnx2x: Utilize FW 7.10.51 (bnc#887382).\n - bnx2x: Remove unnecessary internal mem config (bnc#887382).\n\n - rtnetlink: fix oops in rtnl_link_get_slave_info_data_size (bnc#901774).\n\n - dm: do not call dm_sync_table() when creating new devices (bnc#901809).\n\n - [media] uvc: Fix destruction order in uvc_delete() (bnc#897736).\n\n - uas: replace WARN_ON_ONCE() with lockdep_assert_held() (FATE#315595).\n\n - cxgb4/cxgb4vf: Add Devicde ID for two more adapter (bsc#903999).\n - cxgb4/cxgb4vf: Add device ID for new adapter and remove for dbg adapter\n (bsc#903999).\n - cxgb4: Adds device ID for few more Chelsio T4 Adapters (bsc#903999).\n - cxgb4: Check if rx checksum offload is enabled, while reading hardware\n calculated checksum (bsc#903999).\n\n - xen-pciback: drop SR-IOV VFs when PF driver unloads (bsc#901839).\n\n This update also includes fixes contained in the Linux 3.12.stable release\n series, not seperately listed here.\n\n", "edition": 1, "modified": "2015-01-16T14:05:04", "published": "2015-01-16T14:05:04", "id": "SUSE-SU-2015:0068-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00011.html", "type": "suse", "title": "Security update for the Linux Kernel (important)", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}]}