ID OPENVAS:881469 Type openvas Reporter Copyright (c) 2012 Greenbone Networks GmbH Modified 2018-01-09T00:00:00
Description
Check for the Version of kernel
###############################################################################
# OpenVAS Vulnerability Test
#
# CentOS Update for kernel CESA-2012:1156 centos6
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
include("revisions-lib.inc");
tag_insight = "The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issues:
* An integer overflow flaw was found in the i915_gem_execbuffer2() function
in the Intel i915 driver in the Linux kernel. A local, unprivileged user
could use this flaw to cause a denial of service. This issue only affected
32-bit systems. (CVE-2012-2383, Moderate)
* A missing initialization flaw was found in the sco_sock_getsockopt_old()
function in the Linux kernel's Bluetooth implementation. A local,
unprivileged user could use this flaw to cause an information leak.
(CVE-2011-1078, Low)
Red Hat would like to thank Vasiliy Kulikov of Openwall for reporting the
CVE-2011-1078 issue.
This update also fixes several bugs. Documentation for these changes will
be available shortly from the Technical Notes document linked to in the
References section.
Users should upgrade to these updated packages, which contain backported
patches to correct these issues, and fix the bugs noted in the Technical
Notes. The system must be rebooted for this update to take effect.";
tag_affected = "kernel on CentOS 6";
tag_solution = "Please Install the Updated Packages.";
if(description)
{
script_xref(name : "URL" , value : "http://lists.centos.org/pipermail/centos-announce/2012-August/018803.html");
script_id(881469);
script_version("$Revision: 8336 $");
script_tag(name:"last_modification", value:"$Date: 2018-01-09 08:01:48 +0100 (Tue, 09 Jan 2018) $");
script_tag(name:"creation_date", value:"2012-08-17 10:21:26 +0530 (Fri, 17 Aug 2012)");
script_cve_id("CVE-2011-1078", "CVE-2012-2383");
script_tag(name:"cvss_base", value:"4.9");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:N/I:N/A:C");
script_xref(name: "CESA", value: "2012:1156");
script_name("CentOS Update for kernel CESA-2012:1156 centos6 ");
script_tag(name: "summary" , value: "Check for the Version of kernel");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2012 Greenbone Networks GmbH");
script_family("CentOS Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/centos", "ssh/login/rpms");
script_tag(name : "affected" , value : tag_affected);
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "insight" , value : tag_insight);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("pkg-lib-rpm.inc");
release = get_kb_item("ssh/login/release");
res = "";
if(release == NULL){
exit(0);
}
if(release == "CentOS6")
{
if ((res = isrpmvuln(pkg:"kernel", rpm:"kernel~2.6.32~279.5.1.el6", rls:"CentOS6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"kernel-debug", rpm:"kernel-debug~2.6.32~279.5.1.el6", rls:"CentOS6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"kernel-debug-devel", rpm:"kernel-debug-devel~2.6.32~279.5.1.el6", rls:"CentOS6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"kernel-devel", rpm:"kernel-devel~2.6.32~279.5.1.el6", rls:"CentOS6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"kernel-doc", rpm:"kernel-doc~2.6.32~279.5.1.el6", rls:"CentOS6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"kernel-firmware", rpm:"kernel-firmware~2.6.32~279.5.1.el6", rls:"CentOS6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"kernel-headers", rpm:"kernel-headers~2.6.32~279.5.1.el6", rls:"CentOS6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"perf", rpm:"perf~2.6.32~279.5.1.el6", rls:"CentOS6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"python-perf", rpm:"python-perf~2.6.32~279.5.1.el6", rls:"CentOS6")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99); # Not vulnerable.
exit(0);
}
{"id": "OPENVAS:881469", "type": "openvas", "bulletinFamily": "scanner", "title": "CentOS Update for kernel CESA-2012:1156 centos6 ", "description": "Check for the Version of kernel", "published": "2012-08-17T00:00:00", "modified": "2018-01-09T00:00:00", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=881469", "reporter": "Copyright (c) 2012 Greenbone Networks GmbH", "references": ["2012:1156", "http://lists.centos.org/pipermail/centos-announce/2012-August/018803.html"], "cvelist": ["CVE-2011-1078", "CVE-2012-2383"], "lastseen": "2018-01-11T11:07:38", "viewCount": 1, "enchantments": {"score": {"value": 7.6, "vector": "NONE", "modified": "2018-01-11T11:07:38", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2012-1156", "CVE-2012-2383", "CVE-2011-1078"]}, {"type": "openvas", "idList": ["OPENVAS:841044", "OPENVAS:840725", "OPENVAS:870808", "OPENVAS:841038", "OPENVAS:1361412562310840725", "OPENVAS:1361412562310841044", "OPENVAS:1361412562310881469", "OPENVAS:1361412562310841038", "OPENVAS:1361412562310870808", "OPENVAS:1361412562310123845"]}, {"type": "nessus", "idList": ["UBUNTU_USN-1473-1.NASL", "ORACLELINUX_ELSA-2012-1156.NASL", "REDHAT-RHSA-2012-1156.NASL", "REDHAT-RHSA-2012-1200.NASL", "CENTOS_RHSA-2012-1156.NASL", "UBUNTU_USN-1474-1.NASL", "SUSE_11_KERNEL-120714.NASL", "UBUNTU_USN-1472-1.NASL", "UBUNTU_USN-1471-1.NASL", "SL_20120814_KERNEL_ON_SL6_X.NASL"]}, {"type": "redhat", "idList": ["RHSA-2012:1200", "RHSA-2011:0500", "RHSA-2011:0833", "RHSA-2012:1156"]}, {"type": "oraclelinux", "idList": ["ELSA-2011-0833", "ELSA-2012-1156", "ELSA-2012-2022", "ELSA-2011-1065"]}, {"type": "centos", "idList": ["CESA-2012:1156", "CESA-2011:0833"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:12462", "SECURITYVULNS:VULN:13641", "SECURITYVULNS:VULN:11656", "SECURITYVULNS:DOC:26416", "SECURITYVULNS:DOC:30403", "SECURITYVULNS:DOC:28266"]}, {"type": "ubuntu", "idList": ["USN-1476-1", "USN-1473-1", "USN-1471-1", "USN-1167-1", "USN-1256-1", "USN-1189-1", "USN-1472-1", "USN-1141-1", "USN-1474-1", "USN-1160-1"]}, {"type": "suse", "idList": ["SUSE-SA:2011:031", "SUSE-SU-2011:0832-1"]}, {"type": "debian", "idList": ["DEBIAN:DSA-2240-1:38C7A", "DEBIAN:DSA-2264-1:87A7B"]}, {"type": "vmware", "idList": ["VMSA-2012-0001"]}], "modified": "2018-01-11T11:07:38", "rev": 2}, "vulnersScore": 7.6}, "pluginID": "881469", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for kernel CESA-2012:1156 centos6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n This update fixes the following security issues:\n \n * An integer overflow flaw was found in the i915_gem_execbuffer2() function\n in the Intel i915 driver in the Linux kernel. A local, unprivileged user\n could use this flaw to cause a denial of service. This issue only affected\n 32-bit systems. (CVE-2012-2383, Moderate)\n \n * A missing initialization flaw was found in the sco_sock_getsockopt_old()\n function in the Linux kernel's Bluetooth implementation. A local,\n unprivileged user could use this flaw to cause an information leak.\n (CVE-2011-1078, Low)\n \n Red Hat would like to thank Vasiliy Kulikov of Openwall for reporting the\n CVE-2011-1078 issue.\n \n This update also fixes several bugs. Documentation for these changes will\n be available shortly from the Technical Notes document linked to in the\n References section.\n \n Users should upgrade to these updated packages, which contain backported\n patches to correct these issues, and fix the bugs noted in the Technical\n Notes. The system must be rebooted for this update to take effect.\";\n\ntag_affected = \"kernel on CentOS 6\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2012-August/018803.html\");\n script_id(881469);\n script_version(\"$Revision: 8336 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-09 08:01:48 +0100 (Tue, 09 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-17 10:21:26 +0530 (Fri, 17 Aug 2012)\");\n script_cve_id(\"CVE-2011-1078\", \"CVE-2012-2383\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"CESA\", value: \"2012:1156\");\n script_name(\"CentOS Update for kernel CESA-2012:1156 centos6 \");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.32~279.5.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.32~279.5.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.32~279.5.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.32~279.5.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.32~279.5.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-firmware\", rpm:\"kernel-firmware~2.6.32~279.5.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.32~279.5.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~2.6.32~279.5.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~2.6.32~279.5.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "naslFamily": "CentOS Local Security Checks"}
{"cve": [{"lastseen": "2020-12-09T19:39:05", "description": "The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.", "edition": 5, "cvss3": {}, "published": "2012-06-21T23:55:00", "title": "CVE-2011-1078", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 1.9, "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-1078"], "modified": "2015-05-06T01:59:00", "cpe": ["cpe:/o:linux:linux_kernel:2.6.38.8", "cpe:/o:linux:linux_kernel:2.6.38", "cpe:/o:linux:linux_kernel:2.6.38.3", "cpe:/o:linux:linux_kernel:2.6.38.1", "cpe:/o:linux:linux_kernel:2.6.38.5", "cpe:/o:linux:linux_kernel:2.6.38.2", "cpe:/o:linux:linux_kernel:2.6.38.6", "cpe:/o:linux:linux_kernel:2.6.38.4", "cpe:/o:linux:linux_kernel:2.6.38.7"], "id": "CVE-2011-1078", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-1078", "cvss": {"score": 1.9, "vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:2.6.38.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.38.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.38.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.38:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.38:rc8:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.38.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.38.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.38.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.38.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.38:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.38.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.38:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:47:19", "description": "Integer overflow in the i915_gem_execbuffer2 function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted ioctl call.", "edition": 5, "cvss3": {}, "published": "2012-06-13T10:24:00", "title": "CVE-2012-2383", "type": "cve", "cwe": ["CWE-189"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-2383"], "modified": "2016-08-23T02:05:00", "cpe": ["cpe:/o:linux:linux_kernel:3.3", "cpe:/o:linux:linux_kernel:3.3.4", "cpe:/o:linux:linux_kernel:3.3.2", "cpe:/o:linux:linux_kernel:3.3.3", "cpe:/o:linux:linux_kernel:3.3.1"], "id": "CVE-2012-2383", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2383", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2019-05-29T18:36:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1078", "CVE-2012-2383"], "description": "Oracle Linux Local Security Checks ELSA-2012-1156", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310123845", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123845", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2012-1156", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2012-1156.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123845\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:09:19 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2012-1156\");\n script_tag(name:\"insight\", value:\"ELSA-2012-1156 - kernel security and bug fix update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2012-1156\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2012-1156.html\");\n script_cve_id(\"CVE-2011-1078\", \"CVE-2012-2383\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux6\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.32~279.5.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.32~279.5.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.32~279.5.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.32~279.5.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.32~279.5.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-firmware\", rpm:\"kernel-firmware~2.6.32~279.5.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.32~279.5.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~2.6.32~279.5.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~2.6.32~279.5.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:38:35", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1078", "CVE-2012-2383"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2012-08-17T00:00:00", "id": "OPENVAS:1361412562310881469", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881469", "type": "openvas", "title": "CentOS Update for kernel CESA-2012:1156 centos6", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for kernel CESA-2012:1156 centos6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2012-August/018803.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881469\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-17 10:21:26 +0530 (Fri, 17 Aug 2012)\");\n script_cve_id(\"CVE-2011-1078\", \"CVE-2012-2383\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name:\"CESA\", value:\"2012:1156\");\n script_name(\"CentOS Update for kernel CESA-2012:1156 centos6\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS6\");\n script_tag(name:\"affected\", value:\"kernel on CentOS 6\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n This update fixes the following security issues:\n\n * An integer overflow flaw was found in the i915_gem_execbuffer2() function\n in the Intel i915 driver in the Linux kernel. A local, unprivileged user\n could use this flaw to cause a denial of service. This issue only affected\n 32-bit systems. (CVE-2012-2383, Moderate)\n\n * A missing initialization flaw was found in the sco_sock_getsockopt_old()\n function in the Linux kernel's Bluetooth implementation. A local,\n unprivileged user could use this flaw to cause an information leak.\n (CVE-2011-1078, Low)\n\n Red Hat would like to thank Vasiliy Kulikov of Openwall for reporting the\n CVE-2011-1078 issue.\n\n This update also fixes several bugs. Documentation for these changes will\n be available shortly from the Technical Notes document linked to in the\n References section.\n\n Users should upgrade to these updated packages, which contain backported\n patches to correct these issues, and fix the bugs noted in the Technical\n Notes. The system must be rebooted for this update to take effect.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.32~279.5.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.32~279.5.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.32~279.5.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.32~279.5.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.32~279.5.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-firmware\", rpm:\"kernel-firmware~2.6.32~279.5.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.32~279.5.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~2.6.32~279.5.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~2.6.32~279.5.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2018-01-08T12:57:52", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1078", "CVE-2012-2383"], "description": "Check for the Version of kernel", "modified": "2018-01-08T00:00:00", "published": "2012-08-17T00:00:00", "id": "OPENVAS:870808", "href": "http://plugins.openvas.org/nasl.php?oid=870808", "type": "openvas", "title": "RedHat Update for kernel RHSA-2012:1156-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for kernel RHSA-2012:1156-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n This update fixes the following security issues:\n\n * An integer overflow flaw was found in the i915_gem_execbuffer2() function\n in the Intel i915 driver in the Linux kernel. A local, unprivileged user\n could use this flaw to cause a denial of service. This issue only affected\n 32-bit systems. (CVE-2012-2383, Moderate)\n\n * A missing initialization flaw was found in the sco_sock_getsockopt_old()\n function in the Linux kernel's Bluetooth implementation. A local,\n unprivileged user could use this flaw to cause an information leak.\n (CVE-2011-1078, Low)\n\n This update also fixes several bugs. Documentation for these changes will\n be available shortly from the Technical Notes document linked to in the\n References section.\n\n Users should upgrade to these updated packages, which contain backported\n patches to correct these issues, and fix the bugs noted in the Technical\n Notes. The system must be rebooted for this update to take effect.\";\n\ntag_affected = \"kernel on Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2012-August/msg00012.html\");\n script_id(870808);\n script_version(\"$Revision: 8313 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-08 08:02:11 +0100 (Mon, 08 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-17 10:20:57 +0530 (Fri, 17 Aug 2012)\");\n script_cve_id(\"CVE-2011-1078\", \"CVE-2012-2383\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"RHSA\", value: \"2012:1156-01\");\n script_name(\"RedHat Update for kernel RHSA-2012:1156-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo-common-i686\", rpm:\"kernel-debuginfo-common-i686~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perf-debuginfo\", rpm:\"perf-debuginfo~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-perf-debuginfo\", rpm:\"python-perf-debuginfo~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-firmware\", rpm:\"kernel-firmware~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo-common-x86_64\", rpm:\"kernel-debuginfo-common-x86_64~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:38:44", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1078", "CVE-2012-2383"], "description": "The remote host is missing an update for the ", "modified": "2018-11-23T00:00:00", "published": "2012-08-17T00:00:00", "id": "OPENVAS:1361412562310870808", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870808", "type": "openvas", "title": "RedHat Update for kernel RHSA-2012:1156-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for kernel RHSA-2012:1156-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2012-August/msg00012.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870808\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-17 10:20:57 +0530 (Fri, 17 Aug 2012)\");\n script_cve_id(\"CVE-2011-1078\", \"CVE-2012-2383\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name:\"RHSA\", value:\"2012:1156-01\");\n script_name(\"RedHat Update for kernel RHSA-2012:1156-01\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_6\");\n script_tag(name:\"affected\", value:\"kernel on Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n This update fixes the following security issues:\n\n * An integer overflow flaw was found in the i915_gem_execbuffer2() function\n in the Intel i915 driver in the Linux kernel. A local, unprivileged user\n could use this flaw to cause a denial of service. This issue only affected\n 32-bit systems. (CVE-2012-2383, Moderate)\n\n * A missing initialization flaw was found in the sco_sock_getsockopt_old()\n function in the Linux kernel's Bluetooth implementation. A local,\n unprivileged user could use this flaw to cause an information leak.\n (CVE-2011-1078, Low)\n\n This update also fixes several bugs. Documentation for these changes will\n be available shortly from the Technical Notes document linked to in the\n References section.\n\n Users should upgrade to these updated packages, which contain backported\n patches to correct these issues, and fix the bugs noted in the Technical\n Notes. The system must be rebooted for this update to take effect.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo-common-i686\", rpm:\"kernel-debuginfo-common-i686~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perf-debuginfo\", rpm:\"perf-debuginfo~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-perf-debuginfo\", rpm:\"python-perf-debuginfo~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-firmware\", rpm:\"kernel-firmware~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo-common-x86_64\", rpm:\"kernel-debuginfo-common-x86_64~2.6.32~279.5.1.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2017-12-04T11:21:02", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-2133", "CVE-2012-2319", "CVE-2012-2313", "CVE-2012-2384", "CVE-2012-2383", "CVE-2012-2121"], "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1474-1", "modified": "2017-12-01T00:00:00", "published": "2012-06-15T00:00:00", "id": "OPENVAS:841038", "href": "http://plugins.openvas.org/nasl.php?oid=841038", "type": "openvas", "title": "Ubuntu Update for linux-ti-omap4 USN-1474-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1474_1.nasl 7960 2017-12-01 06:58:16Z santu $\n#\n# Ubuntu Update for linux-ti-omap4 USN-1474-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A flaw was discovered in the Linux kernel's KVM (kernel virtual machine).\n An administrative user in the guest OS could leverage this flaw to cause a\n denial of service in the host OS. (CVE-2012-2121)\n\n Schacher Raindel discovered a flaw in the Linux kernel's memory handling\n when hugetlb is enabled. An unprivileged local attacker could exploit this\n flaw to cause a denial of service and potentially gain higher privileges.\n (CVE-2012-2133)\n\n Stephan Mueller reported a flaw in the Linux kernel's dl2k network driver's\n handling of ioctls. An unprivileged local user could leverage this flaw to\n cause a denial of service. (CVE-2012-2313)\n\n Timo Warns reported multiple flaws in the Linux kernel's hfsplus\n filesystem. An unprivileged local user could exploit these flaws to gain\n root system priviliges. (CVE-2012-2319)\n\n Xi Wang discovered a flaw in the Linux kernel's i915 graphics driver\n handling of cliprect on 32 bit systems. An unprivileged local attacker\n could leverage this flaw to cause a denial of service or potentially gain\n root privileges. (CVE-2012-2383)\n\n Xi Wang discovered a flaw in the Linux kernel's i915 graphics driver\n handling of buffer_count on 32 bit systems. An unprivileged local attacker\n could leverage this flaw to cause a denial of service or potentially gain\n root privileges. (CVE-2012-2384)\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1474-1\";\ntag_affected = \"linux-ti-omap4 on Ubuntu 12.04 LTS\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1474-1/\");\n script_id(841038);\n script_version(\"$Revision: 7960 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 07:58:16 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-06-15 09:46:43 +0530 (Fri, 15 Jun 2012)\");\n script_cve_id(\"CVE-2012-2121\", \"CVE-2012-2133\", \"CVE-2012-2313\", \"CVE-2012-2319\",\n \"CVE-2012-2383\", \"CVE-2012-2384\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"USN\", value: \"1474-1\");\n script_name(\"Ubuntu Update for linux-ti-omap4 USN-1474-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-1414-omap4\", ver:\"3.2.0-1414.19\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:39:11", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-2133", "CVE-2012-2319", "CVE-2012-2313", "CVE-2012-2384", "CVE-2012-2383", "CVE-2012-2121"], "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1473-1", "modified": "2019-03-13T00:00:00", "published": "2012-06-15T00:00:00", "id": "OPENVAS:1361412562310841044", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841044", "type": "openvas", "title": "Ubuntu Update for linux USN-1473-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1473_1.nasl 14132 2019-03-13 09:25:59Z cfischer $\n#\n# Ubuntu Update for linux USN-1473-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-1473-1/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.841044\");\n script_version(\"$Revision: 14132 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 10:25:59 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-06-15 09:47:16 +0530 (Fri, 15 Jun 2012)\");\n script_cve_id(\"CVE-2012-2121\", \"CVE-2012-2133\", \"CVE-2012-2313\", \"CVE-2012-2319\",\n \"CVE-2012-2383\", \"CVE-2012-2384\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"USN\", value:\"1473-1\");\n script_name(\"Ubuntu Update for linux USN-1473-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU12\\.04 LTS\");\n script_tag(name:\"summary\", value:\"Ubuntu Update for Linux kernel vulnerabilities USN-1473-1\");\n script_tag(name:\"affected\", value:\"linux on Ubuntu 12.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"A flaw was discovered in the Linux kernel's KVM (kernel virtual machine).\n An administrative user in the guest OS could leverage this flaw to cause a\n denial of service in the host OS. (CVE-2012-2121)\n\n Schacher Raindel discovered a flaw in the Linux kernel's memory handling\n when hugetlb is enabled. An unprivileged local attacker could exploit this\n flaw to cause a denial of service and potentially gain higher privileges.\n (CVE-2012-2133)\n\n Stephan Mueller reported a flaw in the Linux kernel's dl2k network driver's\n handling of ioctls. An unprivileged local user could leverage this flaw to\n cause a denial of service. (CVE-2012-2313)\n\n Timo Warns reported multiple flaws in the Linux kernel's hfsplus\n filesystem. An unprivileged local user could exploit these flaws to gain\n root system privileges. (CVE-2012-2319)\n\n Xi Wang discovered a flaw in the Linux kernel's i915 graphics driver\n handling of cliprect on 32 bit systems. An unprivileged local attacker\n could leverage this flaw to cause a denial of service or potentially gain\n root privileges. (CVE-2012-2383)\n\n Xi Wang discovered a flaw in the Linux kernel's i915 graphics driver\n handling of buffer_count on 32 bit systems. An unprivileged local attacker\n could leverage this flaw to cause a denial of service or potentially gain\n root privileges. (CVE-2012-2384)\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-25-generic\", ver:\"3.2.0-25.40\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-25-generic-pae\", ver:\"3.2.0-25.40\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-25-highbank\", ver:\"3.2.0-25.40\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-25-omap\", ver:\"3.2.0-25.40\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-25-powerpc-smp\", ver:\"3.2.0-25.40\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-25-powerpc64-smp\", ver:\"3.2.0-25.40\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-25-virtual\", ver:\"3.2.0-25.40\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-12-04T11:21:02", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-2133", "CVE-2012-2319", "CVE-2012-2313", "CVE-2012-2384", "CVE-2012-2383", "CVE-2012-2121"], "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1473-1", "modified": "2017-12-01T00:00:00", "published": "2012-06-15T00:00:00", "id": "OPENVAS:841044", "href": "http://plugins.openvas.org/nasl.php?oid=841044", "type": "openvas", "title": "Ubuntu Update for linux USN-1473-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1473_1.nasl 7960 2017-12-01 06:58:16Z santu $\n#\n# Ubuntu Update for linux USN-1473-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A flaw was discovered in the Linux kernel's KVM (kernel virtual machine).\n An administrative user in the guest OS could leverage this flaw to cause a\n denial of service in the host OS. (CVE-2012-2121)\n\n Schacher Raindel discovered a flaw in the Linux kernel's memory handling\n when hugetlb is enabled. An unprivileged local attacker could exploit this\n flaw to cause a denial of service and potentially gain higher privileges.\n (CVE-2012-2133)\n\n Stephan Mueller reported a flaw in the Linux kernel's dl2k network driver's\n handling of ioctls. An unprivileged local user could leverage this flaw to\n cause a denial of service. (CVE-2012-2313)\n\n Timo Warns reported multiple flaws in the Linux kernel's hfsplus\n filesystem. An unprivileged local user could exploit these flaws to gain\n root system priviliges. (CVE-2012-2319)\n\n Xi Wang discovered a flaw in the Linux kernel's i915 graphics driver\n handling of cliprect on 32 bit systems. An unprivileged local attacker\n could leverage this flaw to cause a denial of service or potentially gain\n root privileges. (CVE-2012-2383)\n\n Xi Wang discovered a flaw in the Linux kernel's i915 graphics driver\n handling of buffer_count on 32 bit systems. An unprivileged local attacker\n could leverage this flaw to cause a denial of service or potentially gain\n root privileges. (CVE-2012-2384)\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1473-1\";\ntag_affected = \"linux on Ubuntu 12.04 LTS\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1473-1/\");\n script_id(841044);\n script_version(\"$Revision: 7960 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 07:58:16 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-06-15 09:47:16 +0530 (Fri, 15 Jun 2012)\");\n script_cve_id(\"CVE-2012-2121\", \"CVE-2012-2133\", \"CVE-2012-2313\", \"CVE-2012-2319\",\n \"CVE-2012-2383\", \"CVE-2012-2384\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"USN\", value: \"1473-1\");\n script_name(\"Ubuntu Update for linux USN-1473-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-25-generic\", ver:\"3.2.0-25.40\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-25-generic-pae\", ver:\"3.2.0-25.40\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-25-highbank\", ver:\"3.2.0-25.40\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-25-omap\", ver:\"3.2.0-25.40\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-25-powerpc-smp\", ver:\"3.2.0-25.40\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-25-powerpc64-smp\", ver:\"3.2.0-25.40\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-25-virtual\", ver:\"3.2.0-25.40\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:38:43", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-2133", "CVE-2012-2319", "CVE-2012-2313", "CVE-2012-2384", "CVE-2012-2383", "CVE-2012-2121"], "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1474-1", "modified": "2019-03-13T00:00:00", "published": "2012-06-15T00:00:00", "id": "OPENVAS:1361412562310841038", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841038", "type": "openvas", "title": "Ubuntu Update for linux-ti-omap4 USN-1474-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1474_1.nasl 14132 2019-03-13 09:25:59Z cfischer $\n#\n# Ubuntu Update for linux-ti-omap4 USN-1474-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-1474-1/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.841038\");\n script_version(\"$Revision: 14132 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 10:25:59 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-06-15 09:46:43 +0530 (Fri, 15 Jun 2012)\");\n script_cve_id(\"CVE-2012-2121\", \"CVE-2012-2133\", \"CVE-2012-2313\", \"CVE-2012-2319\",\n \"CVE-2012-2383\", \"CVE-2012-2384\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"USN\", value:\"1474-1\");\n script_name(\"Ubuntu Update for linux-ti-omap4 USN-1474-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU12\\.04 LTS\");\n script_tag(name:\"summary\", value:\"Ubuntu Update for Linux kernel vulnerabilities USN-1474-1\");\n script_tag(name:\"affected\", value:\"linux-ti-omap4 on Ubuntu 12.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"A flaw was discovered in the Linux kernel's KVM (kernel virtual machine).\n An administrative user in the guest OS could leverage this flaw to cause a\n denial of service in the host OS. (CVE-2012-2121)\n\n Schacher Raindel discovered a flaw in the Linux kernel's memory handling\n when hugetlb is enabled. An unprivileged local attacker could exploit this\n flaw to cause a denial of service and potentially gain higher privileges.\n (CVE-2012-2133)\n\n Stephan Mueller reported a flaw in the Linux kernel's dl2k network driver's\n handling of ioctls. An unprivileged local user could leverage this flaw to\n cause a denial of service. (CVE-2012-2313)\n\n Timo Warns reported multiple flaws in the Linux kernel's hfsplus\n filesystem. An unprivileged local user could exploit these flaws to gain\n root system privileges. (CVE-2012-2319)\n\n Xi Wang discovered a flaw in the Linux kernel's i915 graphics driver\n handling of cliprect on 32 bit systems. An unprivileged local attacker\n could leverage this flaw to cause a denial of service or potentially gain\n root privileges. (CVE-2012-2383)\n\n Xi Wang discovered a flaw in the Linux kernel's i915 graphics driver\n handling of buffer_count on 32 bit systems. An unprivileged local attacker\n could leverage this flaw to cause a denial of service or potentially gain\n root privileges. (CVE-2012-2384)\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.2.0-1414-omap4\", ver:\"3.2.0-1414.19\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:38:45", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-4131", "CVE-2012-2133", "CVE-2012-2319", "CVE-2012-2313", "CVE-2012-2384", "CVE-2012-2383", "CVE-2012-2121"], "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1471-1", "modified": "2019-03-13T00:00:00", "published": "2012-06-15T00:00:00", "id": "OPENVAS:1361412562310841042", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841042", "type": "openvas", "title": "Ubuntu Update for linux-lts-backport-oneiric USN-1471-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1471_1.nasl 14132 2019-03-13 09:25:59Z cfischer $\n#\n# Ubuntu Update for linux-lts-backport-oneiric USN-1471-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-1471-1/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.841042\");\n script_version(\"$Revision: 14132 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 10:25:59 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-06-15 09:47:05 +0530 (Fri, 15 Jun 2012)\");\n script_cve_id(\"CVE-2011-4131\", \"CVE-2012-2121\", \"CVE-2012-2133\", \"CVE-2012-2313\",\n \"CVE-2012-2319\", \"CVE-2012-2383\", \"CVE-2012-2384\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"USN\", value:\"1471-1\");\n script_name(\"Ubuntu Update for linux-lts-backport-oneiric USN-1471-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU10\\.04 LTS\");\n script_tag(name:\"summary\", value:\"Ubuntu Update for Linux kernel vulnerabilities USN-1471-1\");\n script_tag(name:\"affected\", value:\"linux-lts-backport-oneiric on Ubuntu 10.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"Andy Adamson discovered a flaw in the Linux kernel's NFSv4 implementation.\n A remote NFS server (attacker) could exploit this flaw to cause a denial of\n service. (CVE-2011-4131)\n\n A flaw was discovered in the Linux kernel's KVM (kernel virtual machine).\n An administrative user in the guest OS could leverage this flaw to cause a\n denial of service in the host OS. (CVE-2012-2121)\n\n Schacher Raindel discovered a flaw in the Linux kernel's memory handling\n when hugetlb is enabled. An unprivileged local attacker could exploit this\n flaw to cause a denial of service and potentially gain higher privileges.\n (CVE-2012-2133)\n\n Stephan Mueller reported a flaw in the Linux kernel's dl2k network driver's\n handling of ioctls. An unprivileged local user could leverage this flaw to\n cause a denial of service. (CVE-2012-2313)\n\n Timo Warns reported multiple flaws in the Linux kernel's hfsplus\n filesystem. An unprivileged local user could exploit these flaws to gain\n root system privileges. (CVE-2012-2319)\n\n Xi Wang discovered a flaw in the Linux kernel's i915 graphics driver\n handling of cliprect on 32 bit systems. An unprivileged local attacker\n could leverage this flaw to cause a denial of service or potentially gain\n root privileges. (CVE-2012-2383)\n\n Xi Wang discovered a flaw in the Linux kernel's i915 graphics driver\n handling of buffer_count on 32 bit systems. An unprivileged local attacker\n could leverage this flaw to cause a denial of service or potentially gain\n root privileges. (CVE-2012-2384)\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.0.0-21-generic\", ver:\"3.0.0-21.35~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.0.0-21-generic-pae\", ver:\"3.0.0-21.35~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.0.0-21-server\", ver:\"3.0.0-21.35~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.0.0-21-virtual\", ver:\"3.0.0-21.35~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-12-04T11:19:50", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-4131", "CVE-2012-2133", "CVE-2012-2319", "CVE-2012-2313", "CVE-2012-2384", "CVE-2012-2383", "CVE-2012-2121"], "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1476-1", "modified": "2017-12-01T00:00:00", "published": "2012-06-19T00:00:00", "id": "OPENVAS:841050", "href": "http://plugins.openvas.org/nasl.php?oid=841050", "type": "openvas", "title": "Ubuntu Update for linux-ti-omap4 USN-1476-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1476_1.nasl 7960 2017-12-01 06:58:16Z santu $\n#\n# Ubuntu Update for linux-ti-omap4 USN-1476-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Andy Adamson discovered a flaw in the Linux kernel's NFSv4 implementation.\n A remote NFS server (attacker) could exploit this flaw to cause a denial of\n service. (CVE-2011-4131)\n\n A flaw was discovered in the Linux kernel's KVM (kernel virtual machine).\n An administrative user in the guest OS could leverage this flaw to cause a\n denial of service in the host OS. (CVE-2012-2121)\n\n Schacher Raindel discovered a flaw in the Linux kernel's memory handling\n when hugetlb is enabled. An unprivileged local attacker could exploit this\n flaw to cause a denial of service and potentially gain higher privileges.\n (CVE-2012-2133)\n\n Stephan Mueller reported a flaw in the Linux kernel's dl2k network driver's\n handling of ioctls. An unprivileged local user could leverage this flaw to\n cause a denial of service. (CVE-2012-2313)\n\n Timo Warns reported multiple flaws in the Linux kernel's hfsplus\n filesystem. An unprivileged local user could exploit these flaws to gain\n root system priviliges. (CVE-2012-2319)\n\n Xi Wang discovered a flaw in the Linux kernel's i915 graphics driver\n handling of cliprect on 32 bit systems. An unprivileged local attacker\n could leverage this flaw to cause a denial of service or potentially gain\n root privileges. (CVE-2012-2383)\n\n Xi Wang discovered a flaw in the Linux kernel's i915 graphics driver\n handling of buffer_count on 32 bit systems. An unprivileged local attacker\n could leverage this flaw to cause a denial of service or potentially gain\n root privileges. (CVE-2012-2384)\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1476-1\";\ntag_affected = \"linux-ti-omap4 on Ubuntu 11.10\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1476-1/\");\n script_id(841050);\n script_version(\"$Revision: 7960 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 07:58:16 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-06-19 09:42:24 +0530 (Tue, 19 Jun 2012)\");\n script_cve_id(\"CVE-2011-4131\", \"CVE-2012-2121\", \"CVE-2012-2133\", \"CVE-2012-2313\",\n \"CVE-2012-2319\", \"CVE-2012-2383\", \"CVE-2012-2384\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"USN\", value: \"1476-1\");\n script_name(\"Ubuntu Update for linux-ti-omap4 USN-1476-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU11.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.0.0-1211-omap4\", ver:\"3.0.0-1211.23\", rls:\"UBUNTU11.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2020-09-25T09:14:15", "description": "Updated kernel packages that fix two security issues and several bugs\nare now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n* An integer overflow flaw was found in the i915_gem_execbuffer2()\nfunction in the Intel i915 driver in the Linux kernel. A local,\nunprivileged user could use this flaw to cause a denial of service.\nThis issue only affected 32-bit systems. (CVE-2012-2383, Moderate)\n\n* A missing initialization flaw was found in the\nsco_sock_getsockopt_old() function in the Linux kernel's Bluetooth\nimplementation. A local, unprivileged user could use this flaw to\ncause an information leak. (CVE-2011-1078, Low)\n\nRed Hat would like to thank Vasiliy Kulikov of Openwall for reporting\nthe CVE-2011-1078 issue.\n\nThis update also fixes several bugs. Documentation for these changes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues, and fix the bugs noted in\nthe Technical Notes. The system must be rebooted for this update to\ntake effect.", "edition": 25, "published": "2012-08-15T00:00:00", "title": "RHEL 6 : kernel (RHSA-2012:1156)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1078", "CVE-2012-2383"], "modified": "2012-08-15T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "cpe:/o:redhat:enterprise_linux:6.3", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-s390x", "p-cpe:/a:redhat:enterprise_linux:kernel-firmware", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel", "p-cpe:/a:redhat:enterprise_linux:perf-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:python-perf", "cpe:/o:redhat:enterprise_linux:6", "p-cpe:/a:redhat:enterprise_linux:perf", "p-cpe:/a:redhat:enterprise_linux:kernel-doc", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-i686"], "id": "REDHAT-RHSA-2012-1156.NASL", "href": "https://www.tenable.com/plugins/nessus/61546", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2012:1156. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(61546);\n script_version (\"1.21\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/09/24\");\n\n script_cve_id(\"CVE-2011-1078\", \"CVE-2012-2383\");\n script_bugtraq_id(46616, 53971);\n script_xref(name:\"RHSA\", value:\"2012:1156\");\n\n script_name(english:\"RHEL 6 : kernel (RHSA-2012:1156)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix two security issues and several bugs\nare now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n* An integer overflow flaw was found in the i915_gem_execbuffer2()\nfunction in the Intel i915 driver in the Linux kernel. A local,\nunprivileged user could use this flaw to cause a denial of service.\nThis issue only affected 32-bit systems. (CVE-2012-2383, Moderate)\n\n* A missing initialization flaw was found in the\nsco_sock_getsockopt_old() function in the Linux kernel's Bluetooth\nimplementation. A local, unprivileged user could use this flaw to\ncause an information leak. (CVE-2011-1078, Low)\n\nRed Hat would like to thank Vasiliy Kulikov of Openwall for reporting\nthe CVE-2011-1078 issue.\n\nThis update also fixes several bugs. Documentation for these changes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues, and fix the bugs noted in\nthe Technical Notes. The system must be rebooted for this update to\ntake effect.\"\n );\n # https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b5caa05f\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2012:1156\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2011-1078\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2012-2383\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-i686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-s390x\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/06/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/08/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2011-1078\", \"CVE-2012-2383\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2012:1156\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2012:1156\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-debug-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-debug-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debug-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-debug-debuginfo-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-debug-debuginfo-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debug-debuginfo-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-debug-devel-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-debug-devel-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debug-devel-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-debuginfo-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-debuginfo-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debuginfo-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-debuginfo-common-i686-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-debuginfo-common-s390x-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debuginfo-common-x86_64-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-devel-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-devel-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-devel-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"kernel-doc-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"kernel-firmware-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-headers-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-headers-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-headers-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-kdump-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-kdump-debuginfo-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-kdump-devel-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"perf-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"perf-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"perf-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"perf-debuginfo-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"perf-debuginfo-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"perf-debuginfo-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"python-perf-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"python-perf-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"python-perf-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"python-perf-debuginfo-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"python-perf-debuginfo-2.6.32-279.5.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"python-perf-debuginfo-2.6.32-279.5.1.el6\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-debug / kernel-debug-debuginfo / kernel-debug-devel / etc\");\n }\n}\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-09-25T09:49:40", "description": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n - An integer overflow flaw was found in the\n i915_gem_execbuffer2() function in the Intel i915 driver\n in the Linux kernel. A local, unprivileged user could\n use this flaw to cause a denial of service. This issue\n only affected 32-bit systems. (CVE-2012-2383, Moderate)\n\n - A missing initialization flaw was found in the\n sco_sock_getsockopt_old() function in the Linux kernel's\n Bluetooth implementation. A local, unprivileged user\n could use this flaw to cause an information leak.\n (CVE-2011-1078, Low)\n\nThis update also fixes several bugs.\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues. The system must be\nrebooted for this update to take effect.", "edition": 16, "published": "2012-08-16T00:00:00", "title": "Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20120814)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1078", "CVE-2012-2383"], "modified": "2012-08-16T00:00:00", "cpe": ["p-cpe:/a:fermilab:scientific_linux:kernel", "p-cpe:/a:fermilab:scientific_linux:kernel-debug", "p-cpe:/a:fermilab:scientific_linux:kernel-firmware", "p-cpe:/a:fermilab:scientific_linux:kernel-headers", "p-cpe:/a:fermilab:scientific_linux:python-perf", "p-cpe:/a:fermilab:scientific_linux:kernel-devel", "p-cpe:/a:fermilab:scientific_linux:kernel-debug-devel", "x-cpe:/o:fermilab:scientific_linux", "p-cpe:/a:fermilab:scientific_linux:kernel-doc", "p-cpe:/a:fermilab:scientific_linux:perf"], "id": "SL_20120814_KERNEL_ON_SL6_X.NASL", "href": "https://www.tenable.com/plugins/nessus/61560", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(61560);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/09/24\");\n\n script_cve_id(\"CVE-2011-1078\", \"CVE-2012-2383\");\n\n script_name(english:\"Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20120814)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n - An integer overflow flaw was found in the\n i915_gem_execbuffer2() function in the Intel i915 driver\n in the Linux kernel. A local, unprivileged user could\n use this flaw to cause a denial of service. This issue\n only affected 32-bit systems. (CVE-2012-2383, Moderate)\n\n - A missing initialization flaw was found in the\n sco_sock_getsockopt_old() function in the Linux kernel's\n Bluetooth implementation. A local, unprivileged user\n could use this flaw to cause an information leak.\n (CVE-2011-1078, Low)\n\nThis update also fixes several bugs.\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues. The system must be\nrebooted for this update to take effect.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1208&L=scientific-linux-errata&T=0&P=1592\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5811e2eb\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/06/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/08/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/16\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nos_ver = pregmatch(pattern: \"Scientific Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Scientific Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Scientific Linux 6.x\", \"Scientific Linux \" + os_ver);\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL6\", reference:\"kernel-2.6.32-279.5.1.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"kernel-debug-2.6.32-279.5.1.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"kernel-debug-devel-2.6.32-279.5.1.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"kernel-devel-2.6.32-279.5.1.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"kernel-doc-2.6.32-279.5.1.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"kernel-firmware-2.6.32-279.5.1.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"kernel-headers-2.6.32-279.5.1.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"perf-2.6.32-279.5.1.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"python-perf-2.6.32-279.5.1.el6\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-debug / kernel-debug-devel / kernel-devel / etc\");\n}\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-09-25T08:55:24", "description": "From Red Hat Security Advisory 2012:1156 :\n\nUpdated kernel packages that fix two security issues and several bugs\nare now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n* An integer overflow flaw was found in the i915_gem_execbuffer2()\nfunction in the Intel i915 driver in the Linux kernel. A local,\nunprivileged user could use this flaw to cause a denial of service.\nThis issue only affected 32-bit systems. (CVE-2012-2383, Moderate)\n\n* A missing initialization flaw was found in the\nsco_sock_getsockopt_old() function in the Linux kernel's Bluetooth\nimplementation. A local, unprivileged user could use this flaw to\ncause an information leak. (CVE-2011-1078, Low)\n\nRed Hat would like to thank Vasiliy Kulikov of Openwall for reporting\nthe CVE-2011-1078 issue.\n\nThis update also fixes several bugs. Documentation for these changes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues, and fix the bugs noted in\nthe Technical Notes. The system must be rebooted for this update to\ntake effect.", "edition": 21, "published": "2013-07-12T00:00:00", "title": "Oracle Linux 6 : kernel (ELSA-2012-1156)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1078", "CVE-2012-2383"], "modified": "2013-07-12T00:00:00", "cpe": ["cpe:/o:oracle:linux:6", "p-cpe:/a:oracle:linux:kernel-debug", "p-cpe:/a:oracle:linux:kernel-devel", "p-cpe:/a:oracle:linux:kernel-doc", "p-cpe:/a:oracle:linux:perf", "p-cpe:/a:oracle:linux:kernel-debug-devel", "p-cpe:/a:oracle:linux:kernel-headers", "p-cpe:/a:oracle:linux:kernel", "p-cpe:/a:oracle:linux:kernel-firmware", "p-cpe:/a:oracle:linux:python-perf"], "id": "ORACLELINUX_ELSA-2012-1156.NASL", "href": "https://www.tenable.com/plugins/nessus/68597", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2012:1156 and \n# Oracle Linux Security Advisory ELSA-2012-1156 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(68597);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/09/24\");\n\n script_cve_id(\"CVE-2011-1078\", \"CVE-2012-2383\");\n script_bugtraq_id(46616, 53971);\n script_xref(name:\"RHSA\", value:\"2012:1156\");\n\n script_name(english:\"Oracle Linux 6 : kernel (ELSA-2012-1156)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2012:1156 :\n\nUpdated kernel packages that fix two security issues and several bugs\nare now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n* An integer overflow flaw was found in the i915_gem_execbuffer2()\nfunction in the Intel i915 driver in the Linux kernel. A local,\nunprivileged user could use this flaw to cause a denial of service.\nThis issue only affected 32-bit systems. (CVE-2012-2383, Moderate)\n\n* A missing initialization flaw was found in the\nsco_sock_getsockopt_old() function in the Linux kernel's Bluetooth\nimplementation. A local, unprivileged user could use this flaw to\ncause an information leak. (CVE-2011-1078, Low)\n\nRed Hat would like to thank Vasiliy Kulikov of Openwall for reporting\nthe CVE-2011-1078 issue.\n\nThis update also fixes several bugs. Documentation for these changes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues, and fix the bugs noted in\nthe Technical Notes. The system must be rebooted for this update to\ntake effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2012-August/002982.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/06/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/08/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 6\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2011-1078\", \"CVE-2012-2383\"); \n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for ELSA-2012-1156\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nkernel_major_minor = get_kb_item(\"Host/uname/major_minor\");\nif (empty_or_null(kernel_major_minor)) exit(1, \"Unable to determine kernel major-minor level.\");\nexpected_kernel_major_minor = \"2.6\";\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, \"running kernel level \" + expected_kernel_major_minor + \", it is running kernel level \" + kernel_major_minor);\n\nflag = 0;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-2.6.32-279.5.1.el6\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-debug-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-debug-2.6.32-279.5.1.el6\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-debug-devel-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-debug-devel-2.6.32-279.5.1.el6\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-devel-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-devel-2.6.32-279.5.1.el6\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-doc-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-doc-2.6.32-279.5.1.el6\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-firmware-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-firmware-2.6.32-279.5.1.el6\")) flag++;\nif (rpm_exists(release:\"EL6\", rpm:\"kernel-headers-2.6.32\") && rpm_check(release:\"EL6\", reference:\"kernel-headers-2.6.32-279.5.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"perf-2.6.32-279.5.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"python-perf-2.6.32-279.5.1.el6\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"affected kernel\");\n}\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-06T09:27:54", "description": "Updated kernel packages that fix two security issues and several bugs\nare now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n* An integer overflow flaw was found in the i915_gem_execbuffer2()\nfunction in the Intel i915 driver in the Linux kernel. A local,\nunprivileged user could use this flaw to cause a denial of service.\nThis issue only affected 32-bit systems. (CVE-2012-2383, Moderate)\n\n* A missing initialization flaw was found in the\nsco_sock_getsockopt_old() function in the Linux kernel's Bluetooth\nimplementation. A local, unprivileged user could use this flaw to\ncause an information leak. (CVE-2011-1078, Low)\n\nRed Hat would like to thank Vasiliy Kulikov of Openwall for reporting\nthe CVE-2011-1078 issue.\n\nThis update also fixes several bugs. Documentation for these changes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues, and fix the bugs noted in\nthe Technical Notes. The system must be rebooted for this update to\ntake effect.", "edition": 25, "published": "2012-08-16T00:00:00", "title": "CentOS 6 : kernel (CESA-2012:1156)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1078", "CVE-2012-2383"], "modified": "2012-08-16T00:00:00", "cpe": ["cpe:/o:centos:centos:6", "p-cpe:/a:centos:centos:perf", "p-cpe:/a:centos:centos:python-perf", "p-cpe:/a:centos:centos:kernel-doc", "p-cpe:/a:centos:centos:kernel-devel", "p-cpe:/a:centos:centos:kernel", "p-cpe:/a:centos:centos:kernel-debug", "p-cpe:/a:centos:centos:kernel-headers", "p-cpe:/a:centos:centos:kernel-firmware", "p-cpe:/a:centos:centos:kernel-debug-devel"], "id": "CENTOS_RHSA-2012-1156.NASL", "href": "https://www.tenable.com/plugins/nessus/61554", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2012:1156 and \n# CentOS Errata and Security Advisory 2012:1156 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(61554);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2011-1078\", \"CVE-2012-2383\");\n script_bugtraq_id(46616, 53971);\n script_xref(name:\"RHSA\", value:\"2012:1156\");\n\n script_name(english:\"CentOS 6 : kernel (CESA-2012:1156)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix two security issues and several bugs\nare now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues :\n\n* An integer overflow flaw was found in the i915_gem_execbuffer2()\nfunction in the Intel i915 driver in the Linux kernel. A local,\nunprivileged user could use this flaw to cause a denial of service.\nThis issue only affected 32-bit systems. (CVE-2012-2383, Moderate)\n\n* A missing initialization flaw was found in the\nsco_sock_getsockopt_old() function in the Linux kernel's Bluetooth\nimplementation. A local, unprivileged user could use this flaw to\ncause an information leak. (CVE-2011-1078, Low)\n\nRed Hat would like to thank Vasiliy Kulikov of Openwall for reporting\nthe CVE-2011-1078 issue.\n\nThis update also fixes several bugs. Documentation for these changes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to correct these issues, and fix the bugs noted in\nthe Technical Notes. The system must be rebooted for this update to\ntake effect.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2012-August/018803.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9b329e19\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2012-2383\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/06/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/08/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/16\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 6.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-2.6.32-279.5.1.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-debug-2.6.32-279.5.1.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-debug-devel-2.6.32-279.5.1.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-devel-2.6.32-279.5.1.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-doc-2.6.32-279.5.1.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-firmware-2.6.32-279.5.1.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-headers-2.6.32-279.5.1.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"perf-2.6.32-279.5.1.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"python-perf-2.6.32-279.5.1.el6\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-debug / kernel-debug-devel / kernel-devel / etc\");\n}\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-09-25T09:14:16", "description": "An updated rhev-hypervisor6 package that fixes multiple security\nissues and various bugs is now available.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe rhev-hypervisor6 package provides a Red Hat Enterprise\nVirtualization Hypervisor ISO disk image. The Red Hat Enterprise\nVirtualization Hypervisor is a dedicated Kernel-based Virtual Machine\n(KVM) hypervisor. It includes everything necessary to run and manage\nvirtual machines: A subset of the Red Hat Enterprise Linux operating\nenvironment and the Red Hat Enterprise Virtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available\nfor the Intel 64 and AMD64 architectures with virtualization\nextensions.\n\nMultiple errors in glibc's formatted printing functionality could\nallow an attacker to bypass FORTIFY_SOURCE protections and execute\narbitrary code using a format string flaw in an application, even\nthough these protections are expected to limit the impact of such\nflaws to an application abort. (CVE-2012-3404, CVE-2012-3405,\nCVE-2012-3406)\n\nThis updated package provides updated components that include fixes\nfor various security issues. These issues have no security impact on\nRed Hat Enterprise Virtualization Hypervisor itself, however. The\nsecurity fixes included in this update address the following CVE\nnumbers :\n\nCVE-2012-3817 (bind issue)\n\nCVE-2012-3571 and CVE-2012-3954 (dhcp issues)\n\nCVE-2011-1078 and CVE-2012-2383 (kernel issues)\n\nCVE-2012-1013 and CVE-2012-1015 (krb5 issues)\n\nCVE-2012-0441 (nss issue)\n\nCVE-2012-2668 (openldap issue)\n\nCVE-2012-2337 (sudo issue)\n\nUsers of Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package, which fixes these issues.", "edition": 26, "published": "2014-11-08T00:00:00", "title": "RHEL 6 : rhev-hypervisor6 (RHSA-2012:1200)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-2668", "CVE-2011-1078", "CVE-2012-3404", "CVE-2012-1013", "CVE-2012-3954", "CVE-2012-3405", "CVE-2012-3817", "CVE-2012-2337", "CVE-2012-3571", "CVE-2012-0441", "CVE-2012-2383", "CVE-2012-1015", "CVE-2012-3406"], "modified": "2014-11-08T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:rhev-hypervisor6", "cpe:/o:redhat:enterprise_linux:6"], "id": "REDHAT-RHSA-2012-1200.NASL", "href": "https://www.tenable.com/plugins/nessus/78931", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2012:1200. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(78931);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/09/24\");\n\n script_cve_id(\"CVE-2012-3404\", \"CVE-2012-3405\", \"CVE-2012-3406\");\n script_bugtraq_id(54374);\n script_xref(name:\"RHSA\", value:\"2012:1200\");\n\n script_name(english:\"RHEL 6 : rhev-hypervisor6 (RHSA-2012:1200)\");\n script_summary(english:\"Checks the rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An updated rhev-hypervisor6 package that fixes multiple security\nissues and various bugs is now available.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe rhev-hypervisor6 package provides a Red Hat Enterprise\nVirtualization Hypervisor ISO disk image. The Red Hat Enterprise\nVirtualization Hypervisor is a dedicated Kernel-based Virtual Machine\n(KVM) hypervisor. It includes everything necessary to run and manage\nvirtual machines: A subset of the Red Hat Enterprise Linux operating\nenvironment and the Red Hat Enterprise Virtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available\nfor the Intel 64 and AMD64 architectures with virtualization\nextensions.\n\nMultiple errors in glibc's formatted printing functionality could\nallow an attacker to bypass FORTIFY_SOURCE protections and execute\narbitrary code using a format string flaw in an application, even\nthough these protections are expected to limit the impact of such\nflaws to an application abort. (CVE-2012-3404, CVE-2012-3405,\nCVE-2012-3406)\n\nThis updated package provides updated components that include fixes\nfor various security issues. These issues have no security impact on\nRed Hat Enterprise Virtualization Hypervisor itself, however. The\nsecurity fixes included in this update address the following CVE\nnumbers :\n\nCVE-2012-3817 (bind issue)\n\nCVE-2012-3571 and CVE-2012-3954 (dhcp issues)\n\nCVE-2011-1078 and CVE-2012-2383 (kernel issues)\n\nCVE-2012-1013 and CVE-2012-1015 (krb5 issues)\n\nCVE-2012-0441 (nss issue)\n\nCVE-2012-2668 (openldap issue)\n\nCVE-2012-2337 (sudo issue)\n\nUsers of Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package, which fixes these issues.\"\n );\n # https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2be17ee0\"\n );\n # https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b5caa05f\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2012:1200\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2012-3406\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2012-3405\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2012-3404\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected rhev-hypervisor6 package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhev-hypervisor6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/02/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/08/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/11/08\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2012:1200\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", reference:\"rhev-hypervisor6-6.3-20120815.0.el6_3\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"rhev-hypervisor6\");\n }\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-01T06:37:59", "description": "A flaw was discovered in the Linux kernel's KVM (kernel virtual\nmachine). An administrative user in the guest OS could leverage this\nflaw to cause a denial of service in the host OS. (CVE-2012-2121)\n\nSchacher Raindel discovered a flaw in the Linux kernel's memory\nhandling when hugetlb is enabled. An unprivileged local attacker\ncould exploit this flaw to cause a denial of service and potentially\ngain higher privileges. (CVE-2012-2133)\n\nStephan Mueller reported a flaw in the Linux kernel's dl2k network\ndriver's handling of ioctls. An unprivileged local user could\nleverage this flaw to cause a denial of service. (CVE-2012-2313)\n\nTimo Warns reported multiple flaws in the Linux kernel's hfsplus\nfilesystem. An unprivileged local user could exploit these flaws to\ngain root system priviliges. (CVE-2012-2319)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver\nhandling of cliprect on 32 bit systems. An unprivileged local\nattacker could leverage this flaw to cause a denial of service or\npotentially gain root privileges. (CVE-2012-2383)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver\nhandling of buffer_count on 32 bit systems. An unprivileged local\nattacker could leverage this flaw to cause a denial of service or\npotentially gain root privileges. (CVE-2012-2384)", "edition": 24, "published": "2012-06-14T00:00:00", "title": "USN-1474-1 : linux-ti-omap4 vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-2133", "CVE-2012-2319", "CVE-2012-2313", "CVE-2012-2384", "CVE-2012-2383", "CVE-2012-2121"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux"], "id": "UBUNTU_USN-1474-1.NASL", "href": "https://www.tenable.com/plugins/nessus/59496", "sourceData": "# This script was automatically generated from Ubuntu Security\n# Notice USN-1474-1. It is released under the Nessus Script \n# Licence.\n#\n# Ubuntu Security Notices are (C) Canonical, Inc.\n# See http://www.ubuntu.com/usn/\n# Ubuntu(R) is a registered trademark of Canonical, Inc.\n\nif (!defined_func(\"bn_random\")) exit(0);\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(59496);\n script_version(\"$Revision: 1.2 $\");\n script_cvs_date(\"$Date: 2016/12/01 20:56:51 $\");\n\n script_cve_id(\"CVE-2012-2121\", \"CVE-2012-2133\", \"CVE-2012-2313\", \"CVE-2012-2319\", \"CVE-2012-2383\", \"CVE-2012-2384\");\n script_xref(name:\"USN\", value:\"1474-1\");\n\n script_name(english:\"USN-1474-1 : linux-ti-omap4 vulnerabilities\");\n script_summary(english:\"Checks dpkg output for updated package(s)\");\n\n script_set_attribute(attribute:\"synopsis\", value: \n\"The remote Ubuntu host is missing one or more security-related\npatches.\");\n script_set_attribute(attribute:\"description\", value:\n\"A flaw was discovered in the Linux kernel's KVM (kernel virtual\nmachine). An administrative user in the guest OS could leverage this\nflaw to cause a denial of service in the host OS. (CVE-2012-2121)\n\nSchacher Raindel discovered a flaw in the Linux kernel's memory\nhandling when hugetlb is enabled. An unprivileged local attacker\ncould exploit this flaw to cause a denial of service and potentially\ngain higher privileges. (CVE-2012-2133)\n\nStephan Mueller reported a flaw in the Linux kernel's dl2k network\ndriver's handling of ioctls. An unprivileged local user could\nleverage this flaw to cause a denial of service. (CVE-2012-2313)\n\nTimo Warns reported multiple flaws in the Linux kernel's hfsplus\nfilesystem. An unprivileged local user could exploit these flaws to\ngain root system priviliges. (CVE-2012-2319)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver\nhandling of cliprect on 32 bit systems. An unprivileged local\nattacker could leverage this flaw to cause a denial of service or\npotentially gain root privileges. (CVE-2012-2383)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver\nhandling of buffer_count on 32 bit systems. An unprivileged local\nattacker could leverage this flaw to cause a denial of service or\npotentially gain root privileges. (CVE-2012-2384)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.ubuntu.com/usn/usn-1474-1/\");\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package(s).\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/06/13\");\n\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux\");\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/06/14\");\n script_end_attributes();\n \n script_category(ACT_GATHER_INFO);\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_copyright(\"Ubuntu Security Notice (C) 2012 Canonical, Inc. / NASL script (C) 2012-2016 Tenable Network Security, Inc.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude(\"ubuntu.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/Ubuntu/release\")) exit(0, \"The host is not running Ubuntu.\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) exit(1, \"Could not obtain the list of installed packages.\");\n\nflag = 0;\n\nif (ubuntu_check(osver:\"12.04\", pkgname:\"linux-image-3.2.0-1414-omap4\", pkgver:\"3.2.0-1414.19\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:ubuntu_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T06:37:59", "description": "A flaw was discovered in the Linux kernel's KVM (kernel virtual\nmachine). An administrative user in the guest OS could leverage this\nflaw to cause a denial of service in the host OS. (CVE-2012-2121)\n\nSchacher Raindel discovered a flaw in the Linux kernel's memory\nhandling when hugetlb is enabled. An unprivileged local attacker could\nexploit this flaw to cause a denial of service and potentially gain\nhigher privileges. (CVE-2012-2133)\n\nStephan Mueller reported a flaw in the Linux kernel's dl2k network\ndriver's handling of ioctls. An unprivileged local user could leverage\nthis flaw to cause a denial of service. (CVE-2012-2313)\n\nTimo Warns reported multiple flaws in the Linux kernel's hfsplus\nfilesystem. An unprivileged local user could exploit these flaws to\ngain root system priviliges. (CVE-2012-2319)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver\nhandling of cliprect on 32 bit systems. An unprivileged local attacker\ncould leverage this flaw to cause a denial of service or potentially\ngain root privileges. (CVE-2012-2383)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver\nhandling of buffer_count on 32 bit systems. An unprivileged local\nattacker could leverage this flaw to cause a denial of service or\npotentially gain root privileges. (CVE-2012-2384).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 26, "published": "2012-06-14T00:00:00", "title": "Ubuntu 12.04 LTS : linux vulnerabilities (USN-1473-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-2133", "CVE-2012-2319", "CVE-2012-2313", "CVE-2012-2384", "CVE-2012-2383", "CVE-2012-2121"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-virtual", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-generic-pae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-highbank", "cpe:/o:canonical:ubuntu_linux:12.04:-:lts"], "id": "UBUNTU_USN-1473-1.NASL", "href": "https://www.tenable.com/plugins/nessus/59495", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1473-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(59495);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2019/09/19 12:54:28\");\n\n script_cve_id(\"CVE-2012-2121\", \"CVE-2012-2133\", \"CVE-2012-2313\", \"CVE-2012-2319\", \"CVE-2012-2383\", \"CVE-2012-2384\");\n script_bugtraq_id(53162, 53233, 53401, 53965, 53971);\n script_xref(name:\"USN\", value:\"1473-1\");\n\n script_name(english:\"Ubuntu 12.04 LTS : linux vulnerabilities (USN-1473-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A flaw was discovered in the Linux kernel's KVM (kernel virtual\nmachine). An administrative user in the guest OS could leverage this\nflaw to cause a denial of service in the host OS. (CVE-2012-2121)\n\nSchacher Raindel discovered a flaw in the Linux kernel's memory\nhandling when hugetlb is enabled. An unprivileged local attacker could\nexploit this flaw to cause a denial of service and potentially gain\nhigher privileges. (CVE-2012-2133)\n\nStephan Mueller reported a flaw in the Linux kernel's dl2k network\ndriver's handling of ioctls. An unprivileged local user could leverage\nthis flaw to cause a denial of service. (CVE-2012-2313)\n\nTimo Warns reported multiple flaws in the Linux kernel's hfsplus\nfilesystem. An unprivileged local user could exploit these flaws to\ngain root system priviliges. (CVE-2012-2319)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver\nhandling of cliprect on 32 bit systems. An unprivileged local attacker\ncould leverage this flaw to cause a denial of service or potentially\ngain root privileges. (CVE-2012-2383)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver\nhandling of buffer_count on 32 bit systems. An unprivileged local\nattacker could leverage this flaw to cause a denial of service or\npotentially gain root privileges. (CVE-2012-2384).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/1473-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-generic-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-highbank\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.2-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.04:-:lts\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/05/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/06/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/06/14\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2012-2019 Canonical, Inc. / NASL script (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(12\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 12.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2012-2121\", \"CVE-2012-2133\", \"CVE-2012-2313\", \"CVE-2012-2319\", \"CVE-2012-2383\", \"CVE-2012-2384\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-1473-1\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"12.04\", pkgname:\"linux-image-3.2.0-25-generic\", pkgver:\"3.2.0-25.40\")) flag++;\nif (ubuntu_check(osver:\"12.04\", pkgname:\"linux-image-3.2.0-25-generic-pae\", pkgver:\"3.2.0-25.40\")) flag++;\nif (ubuntu_check(osver:\"12.04\", pkgname:\"linux-image-3.2.0-25-highbank\", pkgver:\"3.2.0-25.40\")) flag++;\nif (ubuntu_check(osver:\"12.04\", pkgname:\"linux-image-3.2.0-25-virtual\", pkgver:\"3.2.0-25.40\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-3.2-generic / linux-image-3.2-generic-pae / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T06:37:59", "description": "Andy Adamson discovered a flaw in the Linux kernel's NFSv4\nimplementation. A remote NFS server (attacker) could exploit this flaw\nto cause a denial of service. (CVE-2011-4131)\n\nA flaw was discovered in the Linux kernel's KVM (kernel virtual\nmachine). An administrative user in the guest OS could leverage this\nflaw to cause a denial of service in the host OS. (CVE-2012-2121)\n\nSchacher Raindel discovered a flaw in the Linux kernel's memory\nhandling when hugetlb is enabled. An unprivileged local attacker could\nexploit this flaw to cause a denial of service and potentially gain\nhigher privileges. (CVE-2012-2133)\n\nStephan Mueller reported a flaw in the Linux kernel's dl2k network\ndriver's handling of ioctls. An unprivileged local user could leverage\nthis flaw to cause a denial of service. (CVE-2012-2313)\n\nTimo Warns reported multiple flaws in the Linux kernel's hfsplus\nfilesystem. An unprivileged local user could exploit these flaws to\ngain root system priviliges. (CVE-2012-2319)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver\nhandling of cliprect on 32 bit systems. An unprivileged local attacker\ncould leverage this flaw to cause a denial of service or potentially\ngain root privileges. (CVE-2012-2383)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver\nhandling of buffer_count on 32 bit systems. An unprivileged local\nattacker could leverage this flaw to cause a denial of service or\npotentially gain root privileges. (CVE-2012-2384).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 26, "published": "2012-06-13T00:00:00", "title": "Ubuntu 11.10 : linux vulnerabilities (USN-1472-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-4131", "CVE-2012-2133", "CVE-2012-2319", "CVE-2012-2313", "CVE-2012-2384", "CVE-2012-2383", "CVE-2012-2121"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:11.10", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.0-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.0-virtual", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.0-generic-pae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.0-server"], "id": "UBUNTU_USN-1472-1.NASL", "href": "https://www.tenable.com/plugins/nessus/59476", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1472-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(59476);\n script_version(\"1.11\");\n script_cvs_date(\"Date: 2019/09/19 12:54:28\");\n\n script_cve_id(\"CVE-2011-4131\", \"CVE-2012-2121\", \"CVE-2012-2133\", \"CVE-2012-2313\", \"CVE-2012-2319\", \"CVE-2012-2383\", \"CVE-2012-2384\");\n script_bugtraq_id(53401);\n script_xref(name:\"USN\", value:\"1472-1\");\n\n script_name(english:\"Ubuntu 11.10 : linux vulnerabilities (USN-1472-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Andy Adamson discovered a flaw in the Linux kernel's NFSv4\nimplementation. A remote NFS server (attacker) could exploit this flaw\nto cause a denial of service. (CVE-2011-4131)\n\nA flaw was discovered in the Linux kernel's KVM (kernel virtual\nmachine). An administrative user in the guest OS could leverage this\nflaw to cause a denial of service in the host OS. (CVE-2012-2121)\n\nSchacher Raindel discovered a flaw in the Linux kernel's memory\nhandling when hugetlb is enabled. An unprivileged local attacker could\nexploit this flaw to cause a denial of service and potentially gain\nhigher privileges. (CVE-2012-2133)\n\nStephan Mueller reported a flaw in the Linux kernel's dl2k network\ndriver's handling of ioctls. An unprivileged local user could leverage\nthis flaw to cause a denial of service. (CVE-2012-2313)\n\nTimo Warns reported multiple flaws in the Linux kernel's hfsplus\nfilesystem. An unprivileged local user could exploit these flaws to\ngain root system priviliges. (CVE-2012-2319)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver\nhandling of cliprect on 32 bit systems. An unprivileged local attacker\ncould leverage this flaw to cause a denial of service or potentially\ngain root privileges. (CVE-2012-2383)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver\nhandling of buffer_count on 32 bit systems. An unprivileged local\nattacker could leverage this flaw to cause a denial of service or\npotentially gain root privileges. (CVE-2012-2384).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/1472-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.0-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.0-generic-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.0-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.0-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:11.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/05/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/06/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/06/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2012-2019 Canonical, Inc. / NASL script (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(11\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 11.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2011-4131\", \"CVE-2012-2121\", \"CVE-2012-2133\", \"CVE-2012-2313\", \"CVE-2012-2319\", \"CVE-2012-2383\", \"CVE-2012-2384\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-1472-1\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"11.10\", pkgname:\"linux-image-3.0.0-21-generic\", pkgver:\"3.0.0-21.35\")) flag++;\nif (ubuntu_check(osver:\"11.10\", pkgname:\"linux-image-3.0.0-21-generic-pae\", pkgver:\"3.0.0-21.35\")) flag++;\nif (ubuntu_check(osver:\"11.10\", pkgname:\"linux-image-3.0.0-21-server\", pkgver:\"3.0.0-21.35\")) flag++;\nif (ubuntu_check(osver:\"11.10\", pkgname:\"linux-image-3.0.0-21-virtual\", pkgver:\"3.0.0-21.35\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-3.0-generic / linux-image-3.0-generic-pae / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T06:37:58", "description": "Andy Adamson discovered a flaw in the Linux kernel's NFSv4\nimplementation. A remote NFS server (attacker) could exploit this flaw\nto cause a denial of service. (CVE-2011-4131)\n\nA flaw was discovered in the Linux kernel's KVM (kernel virtual\nmachine). An administrative user in the guest OS could leverage this\nflaw to cause a denial of service in the host OS. (CVE-2012-2121)\n\nSchacher Raindel discovered a flaw in the Linux kernel's memory\nhandling when hugetlb is enabled. An unprivileged local attacker could\nexploit this flaw to cause a denial of service and potentially gain\nhigher privileges. (CVE-2012-2133)\n\nStephan Mueller reported a flaw in the Linux kernel's dl2k network\ndriver's handling of ioctls. An unprivileged local user could leverage\nthis flaw to cause a denial of service. (CVE-2012-2313)\n\nTimo Warns reported multiple flaws in the Linux kernel's hfsplus\nfilesystem. An unprivileged local user could exploit these flaws to\ngain root system priviliges. (CVE-2012-2319)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver\nhandling of cliprect on 32 bit systems. An unprivileged local attacker\ncould leverage this flaw to cause a denial of service or potentially\ngain root privileges. (CVE-2012-2383)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver\nhandling of buffer_count on 32 bit systems. An unprivileged local\nattacker could leverage this flaw to cause a denial of service or\npotentially gain root privileges. (CVE-2012-2384).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 26, "published": "2012-06-13T00:00:00", "title": "Ubuntu 10.04 LTS : linux-lts-backport-oneiric vulnerabilities (USN-1471-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-4131", "CVE-2012-2133", "CVE-2012-2319", "CVE-2012-2313", "CVE-2012-2384", "CVE-2012-2383", "CVE-2012-2121"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-3.0-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.0-virtual", "cpe:/o:canonical:ubuntu_linux:10.04:-:lts", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.0-generic-pae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.0-server"], "id": "UBUNTU_USN-1471-1.NASL", "href": "https://www.tenable.com/plugins/nessus/59475", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1471-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(59475);\n script_version(\"1.11\");\n script_cvs_date(\"Date: 2019/09/19 12:54:28\");\n\n script_cve_id(\"CVE-2011-4131\", \"CVE-2012-2121\", \"CVE-2012-2133\", \"CVE-2012-2313\", \"CVE-2012-2319\", \"CVE-2012-2383\", \"CVE-2012-2384\");\n script_bugtraq_id(53401);\n script_xref(name:\"USN\", value:\"1471-1\");\n\n script_name(english:\"Ubuntu 10.04 LTS : linux-lts-backport-oneiric vulnerabilities (USN-1471-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Andy Adamson discovered a flaw in the Linux kernel's NFSv4\nimplementation. A remote NFS server (attacker) could exploit this flaw\nto cause a denial of service. (CVE-2011-4131)\n\nA flaw was discovered in the Linux kernel's KVM (kernel virtual\nmachine). An administrative user in the guest OS could leverage this\nflaw to cause a denial of service in the host OS. (CVE-2012-2121)\n\nSchacher Raindel discovered a flaw in the Linux kernel's memory\nhandling when hugetlb is enabled. An unprivileged local attacker could\nexploit this flaw to cause a denial of service and potentially gain\nhigher privileges. (CVE-2012-2133)\n\nStephan Mueller reported a flaw in the Linux kernel's dl2k network\ndriver's handling of ioctls. An unprivileged local user could leverage\nthis flaw to cause a denial of service. (CVE-2012-2313)\n\nTimo Warns reported multiple flaws in the Linux kernel's hfsplus\nfilesystem. An unprivileged local user could exploit these flaws to\ngain root system priviliges. (CVE-2012-2319)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver\nhandling of cliprect on 32 bit systems. An unprivileged local attacker\ncould leverage this flaw to cause a denial of service or potentially\ngain root privileges. (CVE-2012-2383)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver\nhandling of buffer_count on 32 bit systems. An unprivileged local\nattacker could leverage this flaw to cause a denial of service or\npotentially gain root privileges. (CVE-2012-2384).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/1471-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.0-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.0-generic-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.0-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.0-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.04:-:lts\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/05/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/06/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/06/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2012-2019 Canonical, Inc. / NASL script (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(10\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 10.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2011-4131\", \"CVE-2012-2121\", \"CVE-2012-2133\", \"CVE-2012-2313\", \"CVE-2012-2319\", \"CVE-2012-2383\", \"CVE-2012-2384\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-1471-1\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-image-3.0.0-21-generic\", pkgver:\"3.0.0-21.35~lucid1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-image-3.0.0-21-generic-pae\", pkgver:\"3.0.0-21.35~lucid1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-image-3.0.0-21-server\", pkgver:\"3.0.0-21.35~lucid1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-image-3.0.0-21-virtual\", pkgver:\"3.0.0-21.35~lucid1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-3.0-generic / linux-image-3.0-generic-pae / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T06:37:59", "description": "Andy Adamson discovered a flaw in the Linux kernel's NFSv4\nimplementation. A remote NFS server (attacker) could exploit this\nflaw to cause a denial of service. (CVE-2011-4131)\n\nA flaw was discovered in the Linux kernel's KVM (kernel virtual\nmachine). An administrative user in the guest OS could leverage this\nflaw to cause a denial of service in the host OS. (CVE-2012-2121)\n\nSchacher Raindel discovered a flaw in the Linux kernel's memory\nhandling when hugetlb is enabled. An unprivileged local attacker\ncould exploit this flaw to cause a denial of service and potentially\ngain higher privileges. (CVE-2012-2133)\n\nStephan Mueller reported a flaw in the Linux kernel's dl2k network\ndriver's handling of ioctls. An unprivileged local user could\nleverage this flaw to cause a denial of service. (CVE-2012-2313)\n\nTimo Warns reported multiple flaws in the Linux kernel's hfsplus\nfilesystem. An unprivileged local user could exploit these flaws to\ngain root system priviliges. (CVE-2012-2319)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver\nhandling of cliprect on 32 bit systems. An unprivileged local\nattacker could leverage this flaw to cause a denial of service or\npotentially gain root privileges. (CVE-2012-2383)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver\nhandling of buffer_count on 32 bit systems. An unprivileged local\nattacker could leverage this flaw to cause a denial of service or\npotentially gain root privileges. (CVE-2012-2384)", "edition": 24, "published": "2012-06-18T00:00:00", "title": "USN-1476-1 : linux-ti-omap4 vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-4131", "CVE-2012-2133", "CVE-2012-2319", "CVE-2012-2313", "CVE-2012-2384", "CVE-2012-2383", "CVE-2012-2121"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux"], "id": "UBUNTU_USN-1476-1.NASL", "href": "https://www.tenable.com/plugins/nessus/59553", "sourceData": "# This script was automatically generated from Ubuntu Security\n# Notice USN-1476-1. It is released under the Nessus Script \n# Licence.\n#\n# Ubuntu Security Notices are (C) Canonical, Inc.\n# See http://www.ubuntu.com/usn/\n# Ubuntu(R) is a registered trademark of Canonical, Inc.\n\nif (!defined_func(\"bn_random\")) exit(0);\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(59553);\n script_version(\"$Revision: 1.3 $\");\n script_cvs_date(\"$Date: 2016/12/01 20:56:51 $\");\n\n script_cve_id(\"CVE-2011-4131\", \"CVE-2012-2121\", \"CVE-2012-2133\", \"CVE-2012-2313\", \"CVE-2012-2319\", \"CVE-2012-2383\", \"CVE-2012-2384\");\n script_xref(name:\"USN\", value:\"1476-1\");\n\n script_name(english:\"USN-1476-1 : linux-ti-omap4 vulnerabilities\");\n script_summary(english:\"Checks dpkg output for updated package(s)\");\n\n script_set_attribute(attribute:\"synopsis\", value: \n\"The remote Ubuntu host is missing one or more security-related\npatches.\");\n script_set_attribute(attribute:\"description\", value:\n\"Andy Adamson discovered a flaw in the Linux kernel's NFSv4\nimplementation. A remote NFS server (attacker) could exploit this\nflaw to cause a denial of service. (CVE-2011-4131)\n\nA flaw was discovered in the Linux kernel's KVM (kernel virtual\nmachine). An administrative user in the guest OS could leverage this\nflaw to cause a denial of service in the host OS. (CVE-2012-2121)\n\nSchacher Raindel discovered a flaw in the Linux kernel's memory\nhandling when hugetlb is enabled. An unprivileged local attacker\ncould exploit this flaw to cause a denial of service and potentially\ngain higher privileges. (CVE-2012-2133)\n\nStephan Mueller reported a flaw in the Linux kernel's dl2k network\ndriver's handling of ioctls. An unprivileged local user could\nleverage this flaw to cause a denial of service. (CVE-2012-2313)\n\nTimo Warns reported multiple flaws in the Linux kernel's hfsplus\nfilesystem. An unprivileged local user could exploit these flaws to\ngain root system priviliges. (CVE-2012-2319)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver\nhandling of cliprect on 32 bit systems. An unprivileged local\nattacker could leverage this flaw to cause a denial of service or\npotentially gain root privileges. (CVE-2012-2383)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver\nhandling of buffer_count on 32 bit systems. An unprivileged local\nattacker could leverage this flaw to cause a denial of service or\npotentially gain root privileges. (CVE-2012-2384)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.ubuntu.com/usn/usn-1476-1/\");\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package(s).\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/06/15\");\n\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux\");\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/06/18\");\n script_end_attributes();\n \n script_category(ACT_GATHER_INFO);\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_copyright(\"Ubuntu Security Notice (C) 2012 Canonical, Inc. / NASL script (C) 2012-2016 Tenable Network Security, Inc.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude(\"ubuntu.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/Ubuntu/release\")) exit(0, \"The host is not running Ubuntu.\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) exit(1, \"Could not obtain the list of installed packages.\");\n\nflag = 0;\n\nif (ubuntu_check(osver:\"11.10\", pkgname:\"linux-image-3.0.0-1211-omap4\", pkgver:\"3.0.0-1211.23\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:ubuntu_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:39:45", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1078", "CVE-2012-2383"], "description": "[2.6.32-279.5.1.el6]\n- [net] 8021q/vlan: filter device events on bonds (Neil Horman) [842429 841983]\n[2.6.32-279.4.1.el6]\n- [fs] proc: stats: Use arch_idle_time for idle and iowait times if available (Steve Best) [841579 841149]\n- [drm] i915: fix integer overflow in i915_gem_execbuffer2() (Jacob Tanenbaum) [824553 824555] {CVE-2012-2383}\n- [usb] core: change the memory limits in usbfs URB submission (Don Zickus) [841667 828271]\n- [usb] core: unify some error pathways in usbfs (Don Zickus) [841667 828271]\n- [netdrv] ixgbe: BIT_APP_UPCHG not set by ixgbe_copy_dcb_cfg() (Andy Gospodarek) [840156 814044]\n- [netdrv] ixgbe: driver fix for link flap (Andy Gospodarek) [840156 814044]\n- [net] bridge: Fix enforcement of multicast hash_max limit (Thomas Graf) [840023 832575]\n- [net] bluetooth: fix sco_conninfo infoleak (Jacob Tanenbaum) [681307 681308] {CVE-2011-1078}\n- [wireless] ipw2200: remove references to CFG80211_WEXT config option (John Linville) [841406 839311]\n- [netdrv] be2net: enable GRO by default (Ivan Vecera) [838821 837230]\n- [virt] kvm/vmx: Fix KVM_SET_SREGS with big real mode segments (Orit Wasserman) [841411 756044]\n- [fs] writeback: merge for_kupdate and !for_kupdate cases (Eric Sandeen) [832360 818172]\n- [fs] writeback: fix queue_io() ordering (Eric Sandeen) [832360 818172]\n- [fs] writeback: don't redirty tail an inode with dirty pages (Eric Sandeen) [832360 818172]\n[2.6.32-279.3.1.el6]\n- [fs] ext4: properly dirty split extent nodes (David Jeffery) [840052 838640]", "edition": 4, "modified": "2012-08-14T00:00:00", "published": "2012-08-14T00:00:00", "id": "ELSA-2012-1156", "href": "http://linux.oracle.com/errata/ELSA-2012-1156.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:35:03", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1078", "CVE-2011-1494", "CVE-2011-1166", "CVE-2011-1079", "CVE-2011-1495", "CVE-2011-1163", "CVE-2011-1093", "CVE-2011-1170", "CVE-2011-1172", "CVE-2011-1171", "CVE-2011-0726", "CVE-2011-1763", "CVE-2011-1080", "CVE-2011-1577"], "description": "[2.6.18-238.12.1.0.1.el5]\n- [scsi] fix scsi hotplug and rescan race [orabug 10260172]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- fix missing aio_complete() in end_io (Joel Becker) [orabug 10365195]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [rds] Patch rds to 1.4.2-20 (Andy Grover) [orabug 9471572, 9344105]\n RDS: Fix BUG_ONs to not fire when in a tasklet\n ipoib: Fix lockup of the tx queue\n RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)\n RDS: Properly unmap when getting a remote access error (Tina Yang)\n RDS: Fix locking in rds_send_drop_to()\n- [qla] fix qla not to query hccr (Guru Anbalagane) [Orabug 8746702]\n- [nfs] too many getattr and access calls after direct I/O [orabug 9348191]\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n- [aio] patch removes limit on number of retries (Srinivas Eeda) [orabug 10044782]\n- [loop] Do not call loop_unplug for not configured loop device (orabug 10314497)\n[2.6.18-238.12.1.el5]\n- [x86_64] Ignore spurious IPIs left over from crash kernel (Myron Stowe) [699610 692921]\n- [i386] Ignore spurious IPIs left over from crash kernel (Myron Stowe) [699610 692921]\n- [xen] fix MAX_EVTCHNS definition (Laszlo Ersek) [701242 701240]\n- [net] ixgbe: fix for link failure on SFP+ DA cables (Don Howard) [696181 653236]\n- [net] netxen: limit skb frags for non tso packet (Phillip Lougher) [699609 672368]\n- [block] cciss: fix lost command problem (Phillip Lougher) [696503 696153]\n- [fs] gfs2: fix filesystem hang caused by incorrect lock order (Robert S Peterson) [688855 656032]\n- [fs] gfs2: restructure reclaim of unlinked dinodes (Phillip Lougher) [688855 656032]\n- [fs] gfs2: unlock on gfs2_trans_begin error (Robert S Peterson) [688855 656032]\n- [scsi] mpt2sas: prevent heap overflows and unchecked access (Tomas Henzl) [694526 694527] {CVE-2011-1495 CVE-2011-1494}\n- [net] bridge/netfilter: fix ebtables information leak (Don Howard) [681325 681326] {CVE-2011-1080}\n- [net] bluetooth: fix sco information leak to userspace (Don Howard) [681310 681311] {CVE-2011-1078}\n- [fs] fix corrupted GUID partition table kernel oops (Jerome Marchand) [695979 695980] {CVE-2011-1577}\n- [xen] x86/domain: fix error checks in arch_set_info_guest (Laszlo Ersek) [688581 688582] {CVE-2011-1166}\n- [net] bridge: fix initial packet flood if !STP (Jiri Pirko) [701222 695369]\n- [fs] nfsd: fix auth_domain reference leak on nlm operations (J. Bruce Fields) [697448 589512]\n- [scsi] qla2xxx: no reset/fw-dump on CT/ELS pt req timeout (Chad Dupuis) [689700 660386]\n- [mm] set barrier and send tlb flush to all affected cpus (Prarit Bhargava) [696908 675793]\n[2.6.18-238.11.1.el5]\n- [s390] dasd: fix race between open and offline (Hendrik Brueckner) [699808 695357]\n[2.6.18-238.10.1.el5]\n- [fs] gfs2: creating large files suddenly slow to a crawl (Robert S Peterson) [690239 683155]\n- [virt] hypervisor: Overflow fix for clocks > 4GHz (Zachary Amsden) [690134 673242]\n- [usb] fix usbfs isochronous data transfer regression (Don Zickus) [696136 688926]\n- [fs] partitions: Fix corrupted OSF partition table parsing (Danny Feng) [688022 688023] {CVE-2011-1163}\n- [misc] pm: add comment explaining is_registered kabi work-around (Don Zickus) [689699 637930]\n- [media] sn9c102: fix world-wirtable sysfs files (Don Howard) [679304 679305]\n- [scsi] scsi_dh_rdac: Add two new IBM devices to rdac_dev_list (Rob Evers) [692370 691460]\n- [fs] block: fix submit_bh discarding barrier flag on sync write (Lukas Czerner) [690795 667673]\n- [net] netfilter/ipt_CLUSTERIP: fix buffer overflow (Jiri Pirko) [689339 689340]\n- [net] netfilter: ip6_tables: fix infoleak to userspace (Jiri Pirko) [689348 689349] {CVE-2011-1172}\n- [net] netfilter/ip_tables: fix infoleak to userspace (Jiri Pirko) [689331 689332] {CVE-2011-1171}\n- [net] netfilter/arp_tables: fix infoleak to userspace (Jiri Pirko) [689322 689323] {CVE-2011-1170}\n- [base] Fix potential deadlock in driver core (Don Zickus) [689699 637930]\n- [net] forcedeth/r8169: call netif_carrier_off at end of probe (Ivan Vecera) [689808 689805 664705 664707]\n- [net] ixgbe: fix for 82599 erratum on Header Splitting (Andy Gospodarek) [693751 680531]\n- [net] ixgbe: limit VF access to network traffic (Andy Gospodarek) [693751 680531]\n- [fs] lockd: make lockd_down wait for lockd to come down (Jeff Layton) [688156 653286]\n- [fs] proc: protect mm start_/end_code in /proc/pid/stat (Eugene Teo) [684570 684571] {CVE-2011-0726}\n- [net] dccp: fix oops in dccp_rcv_state_process (Eugene Teo) [682955 682956] {CVE-2011-1093}\n- [net] bluetooth: fix bnep buffer overflow (Don Howard) [681318 681319] {CVE-2011-1079}\n- [fs] nfs: break nfsd v4 lease on unlink, link, and rename (J. Bruce Fields) [693755 610093]\n- [fs] nfs: break lease on nfsd v4 setattr (J. Bruce Fields) [693755 610093]", "edition": 4, "modified": "2011-05-31T00:00:00", "published": "2011-05-31T00:00:00", "id": "ELSA-2011-0833", "href": "http://linux.oracle.com/errata/ELSA-2011-0833.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:37:15", "bulletinFamily": "unix", "cvelist": ["CVE-2011-4131", "CVE-2012-2123", "CVE-2012-1097", "CVE-2011-4127", "CVE-2012-2136", "CVE-2012-2137", "CVE-2012-2373", "CVE-2012-1601", "CVE-2012-2384", "CVE-2012-2383", "CVE-2012-1090", "CVE-2012-1179", "CVE-2012-2121"], "description": "[2.6.39-200.24.1.el5uek]\n- Revert 'Add Oracle VM guest messaging driver' (Guru Anbalagane) [Orabug: 14233627}\n[2.6.39-200.23.1.el5uek]\n- SPEC: add block/net modules to list used by installer (Guru Anbalagane)\n [Orabug: 14224837]\n[2.6.39-200.22.1.el5uek]\n- NFSv4: include bitmap in nfsv4 get acl data (Andy Adamson) {CVE-2011-4131}\n- ocfs2:btrfs: aio-dio-loop changes broke setrlimit behavior [orabug 14207636]\n (Dave Kleikamp)\n- Add Oracle VM guest messaging driver (Zhigang Wang)\n- thp: avoid atomic64_read in pmd_read_atomic for 32bit PAE (Andrea Arcangeli)\n [Orabug: 14217003]\n[2.6.39-200.21.0.el5uek]\n- KVM: Fix buffer overflow in kvm_set_irq() (Avi Kivity) [Bugdb: 13966]\n {CVE-2012-2137}\n- net: sock: validate data_len before allocating skb in sock_alloc_send_pskb()\n (Jason Wang) [Bugdb: 13966] {CVE-2012-2136}\n- mm: pmd_read_atomic: fix 32bit PAE pmd walk vs pmd_populate SMP race\n condition (Andrea Arcangeli) [Bugdb: 13966] {CVE-2012-2373}\n- KVM: lock slots_lock around device assignment (Alex Williamson) [Bugdb:\n 13966] {CVE-2012-2121}\n- KVM: unmap pages from the iommu when slots are removed (Alex Williamson)\n [Bugdb: 13966] {CVE-2012-2121}\n- KVM: introduce kvm_for_each_memslot macro (Xiao Guangrong) [Bugdb: 13966]\n- fcaps: clear the same personality flags as suid when fcaps are used (Eric\n Paris) [Bugdb: 13966] {CVE-2012-2123}\n[2.6.39-200.20.0.el5uek]\n- Update lpfc version for 8.3.5.68.6p driver release (Martin K. Petersen)\n- Fix system hang due to bad protection module parameters (CR 130769) (Martin\n K. Petersen)\n- oracleasm: Data integrity support (Martin K. Petersen)\n- sd: Allow protection_type to be overridden (Martin K. Petersen)\n- SCSI: Fix two bugs in DIX retry handling (Martin K. Petersen)\n- sd: Avoid remapping bad reference tags (Martin K. Petersen)\n- block: Fix bad range check in bio_sector_offset (Martin K. Petersen)\n[2.6.39-200.19.0.el5uek]\n- xen/netback: Calculate the number of SKB slots required correctly (Simon\n Graham)\n [2.6.39-200.18.0.el5uek]\n- e1000e: disable rxhash when try to enable jumbo frame also rxhash and rxcsum\n have enabled (Joe Jin)\n[2.6.39-200.17.0.el5uek]\n- mm: reduce the amount of work done when updating min_free_kbytes (Mel Gorman)\n [Orabug: 14073214]\n- ocfs2: clear unaligned io flag when dio fails (Junxiao Bi) [Orabug: 14063941]\n- aio: make kiocb->private NUll in init_sync_kiocb() (Junxiao Bi) [Orabug:\n 14063941]\n- vmxnet3: cap copy length at size of skb to prevent dropped frames on tx (Neil\n Horman) [Orabug: 14159701]\n- mm/mempolicy.c: refix mbind_range() vma issue (KOSAKI Motohiro) [Orabug:\n 14149364]\n- mm/mempolicy.c: fix pgoff in mbind vma merge (Caspar Zhang) [Orabug:14149364]\n[2.6.39-200.16.0.el5uek]\n- xen/gntdev: Fix merge error. (Konrad Rzeszutek Wilk)\n[2.6.39-200.15.0.el5uek]\n- xen: expose host uuid via sysfs. (Zhigang Wang)\n[2.6.39-200.14.0.el5uek]\n- SPEC: upgrade preserve rhck as a boot kernel (Kevin Lyons) [Orabug: 14065209]\n- hxge: update driver to 1.3.4 (Maxim Uvarov) [Orabug: 14134149]\n- SPEC: v2.6.39-200.12.0 (Maxim Uvarov)\n- Revert 'bnx2x: correction to firmware interface' (Joe Jin)\n- cnic: fix bnx2fc_constants.h path (Maxim Uvarov)\n- bnx2x: PFC fix (Yaniv Rosner)\n- cnic: Fix parity error code conflict (Michael Chan)\n- bnx2x: Clear MDC/MDIO warning message (Yaniv Rosner)\n- bnx2x: Fix BCM578x0-SFI pre-emphasis settings (Yaniv Rosner)\n- bnx2x: Fix BCM57810-KR AN speed transition (Yaniv Rosner)\n- cnic: Re-init dev->stats_addr after chip reset (Michael Chan)\n- config: turn on CONFIG_HVC_XEN_FRONTEND (Maxim Uvarov) [Orabug: 14064174]\n- ixgbe: Dont set ip checksum if did not enable tso. (Joe Jin)\n- Revert 'x86, efi: Pass a minimal map to SetVirtualAddressMap()' (Maxim\n Uvarov) [Orabug: 14076004]\n- r8169: add firmware files (Joe Jin)\n- e1000e: fix build warning. (Joe Jin)\n- bnx2x: file build warning (Joe Jin)\n- 8139too: Add 64bit statistics (Junchang Wang)\n- net: export netdev_stats_to_stats64 (Eric Dumazet)\n- r8169: enable transmit time stamping. (Joe Jin)\n- r8169: stop using net_device.{base_addr, irq}. (Francois Romieu)\n- r8169: move the driver removal method to the end of the driver file.\n (Francois Romieu)\n- r8169: fix unsigned int wraparound with TSO (Julien Ducourthial)\n- 8139cp: set intr mask after its handler is registered (Jason Wang)\n- r8169: enable napi on resume. (Artem Savkov)\n- r8169: runtime resume before shutdown. (francois romieu)\n- r8169: add 64bit statistics. (Junchang Wang)\n- r8169: corrupted IP fragments fix for large mtu. (francois romieu)\n- r8169: spinlock redux. (Francois Romieu)\n- r8169: avoid a useless work scheduling. (Francois Romieu)\n- r8169: move task enable boolean to bitfield. (Francois Romieu)\n- r8169: bh locking redux and task scheduling. (Francois Romieu)\n- r8169: fix early queue wake-up. (Francois Romieu)\n- r8169: remove work from irq handler. (Joe Jin)\n- r8169: missing barriers. (Francois Romieu)\n- r8169: irq mask helpers. (Francois Romieu)\n- r8169: factor out IntrMask writes. (Francois Romieu)\n- r8169: stop delaying workqueue. (Francois Romieu)\n- r8169: remove rtl8169_reinit_task. (Francois Romieu)\n- r8169: remove hardcoded PCIe registers accesses. (Francois Romieu)\n- 8139cp: fix missing napi_gro_flush. (francois romieu)\n- 8139cp/8139too: do not read into reserved registers (Jason Wang)\n- r8169: fix Config2 MSIEnable bit setting. (francois romieu)\n- r8169: fix Rx index race between FIFO overflow recovery and NAPI handler.\n (francois romieu)\n- r8169: Rx FIFO overflow fixes. (francois romieu)\n- corral some wayward N/A fw_version dust bunnies (Rick Jones)\n- ethernet: Convert MAC_ADDR_LEN uses to ETH_ALEN (Joe Jin)\n- sweep the floors and convert some .get_drvinfo routines to strlcpy (Joe Jin)\n- r8169: check firmware content sooner. (Francois Romieu)\n- r8169: support new firmware format. (Hayes Wang)\n- r8169: explicit firmware format check. (Francois Romieu)\n- r8169: move the firmware down into the device private data. (Francois Romieu)\n- r8169: increase the delay parameter of pm_schedule_suspend (hayeswang)\n- r8169: fix wrong eee setting for rlt8111evl (hayeswang)\n- r8169: fix driver shutdown WoL regression. (francois romieu)\n- Add ethtool -g support to 8139cp (Rick Jones)\n- sc92031: use standard #defines from mii.h. (francois romieu)\n- r8169: jumbo fixes. (Francois Romieu)\n- r8169: expand received packet length indication. (Francois Romieu)\n- r8169: support new chips of RTL8111F (Hayes Wang)\n- r8169: do not enable the TBI for anything but the original 8169. (Francois\n Romieu)\n- r8169: remove erroneous processing of always set bit. (Francois Romieu)\n- r8169: fix WOL setting for 8105 and 8111evl (Hayes Wang)\n- r8169: add MODULE_FIRMWARE for the firmware of 8111evl (Hayes Wang)\n- r8169: fix the reset setting for 8111evl (Hayes Wang)\n- r8169: define the early size for 8111evl (Hayes Wang)\n- r8169: convert to SKB paged frag API. (Ian Campbell)\n- 8139cp: convert to SKB paged frag API. (Ian Campbell)\n- net: remove use of ndo_set_multicast_list in realtek drivers (Joe Jin)\n- r8169 : MAC address change fix for the 8168e-vl. (francois romieu)\n- r8169: use pci_dev->subsystem_{vendor|device} (Sergei Shtylyov)\n- r8169: fix sticky accepts packet bits in RxConfig. (Francois Romieu)\n- r8169: adjust the RxConfig settings. (Hayes Wang)\n- r8169: dont enable rx when shutdown. (Hayes Wang)\n- r8169: fix wake on lan setting for non-8111E. (Hayes Wang)\n- r8169: support RTL8111E-VL. (Hayes Wang)\n- r8169: add ERI functions. (Hayes Wang)\n- r8169: modify the flow of the hw reset. (Hayes Wang)\n- r8169: adjust some registers. (Hayes Wang)\n- r8169: remove unnecessary read of PCI_CAP_ID_EXP (Jon Mason)\n- ixgbevf: print MAC via printk format specifier (Danny Kukawka)\n- ixgbevf: Update copyright notices (Greg Rose)\n- ixgbevf: Fix mailbox interrupt ack bug (Greg Rose)\n- ixgbevf: make operations tables const (Stephen Hemminger)\n- ixgbevf: fix sparse warnings (Stephen Hemminger)\n- ixgbevf: make ethtool ops and strings const (Stephen Hemminger)\n- ixgbevf: Prevent possible race condition by checking for message (Greg Rose)\n- ixgbevf: Fix register defines to correctly handle complex expressions\n (Alexander Duyck)\n- ixgbevf: Update release version (Greg Rose)\n- ixgbevf: Fix broken trunk vlan (Greg Rose)\n- ixgbevf: convert to ndo_fix_features (Joe Jin)\n- ixgbevf: Check if EOP has changed before using it (Greg Rose)\n- ixgbe: Correct flag values set by ixgbe_fix_features (Joe Jin)\n- ixgbe: fix typo in enumeration name (Don Skidmore)\n- ixgbe: Add support for enabling UDP RSS via the ethtool rx-flow-hash command\n (Joe Jin)\n- ixgbe: Whitespace cleanups (Joe Jin)\n- ixgbe: Two minor fixes for RSS and FDIR set queues functions (Alexander\n Duyck)\n- ixgbe: drop err_eeprom tag which is at same location as err_sw_init\n (Alexander Duyck)\n- ixgbe: Move poll routine in order to improve readability (Alexander Duyck)\n- ixgbe: cleanup logic for the service timer and VF hang detection (Alexander\n Duyck)\n- ixgbe: Fix issues with SR-IOV loopback when flow control is disabled\n (Alexander Duyck)\n- ixgbe: Place skb on first buffer_info structure to avoid using stack space\n (Joe Jin)\n- ixgbe: Use packets to track Tx completions instead of a seperate value\n (Alexander Duyck)\n- ixgbe: Modify setup of descriptor flags to avoid conditional jumps (Alexander\n Duyck)\n- ixgbe: Make certain that all frames fit minimum size requirements (Alexander\n Duyck)\n- ixgbe: cleanup logic in ixgbe_change_mtu (Alexander Duyck)\n- ixgbe: dcb: use DCB config values for FCoE traffic class on open (John\n Fastabend)\n- ixgbe: Fix race condition where RX buffer could become corrupted. (Atita\n Shirwaikar)\n- ixgbe: use typed min/max functions where possible (Jesse Brandeburg)\n- ixgbe: fix obvious return value bug. (Don Skidmore)\n- ixgbe: Replace eitr_low and eitr_high with static values in ixgbe_update_itr\n (Alexander Duyck)\n- ixgbe: Do not disable read relaxed ordering when DCA is enabled (Alexander\n Duyck)\n- ixgbe: Simplify logic for ethtool loopback frame creation and testing\n (Alexander Duyck)\n- ixgbe: Add iterator for cycling through rings on a q_vector (Alexander Duyck)\n- ixgbe: Allocate rings as part of the q_vector (Alexander Duyck)\n- ixgbe: Drop unnecessary napi_schedule_prep and spare blank line from\n ixgbe_intr (Alexander Duyck)\n- ixgbe: Default to queue pairs when number of queues is less than CPUs\n (Alexander Duyck)\n- ixgbe: Correct Adaptive Interrupt Moderation so that it will change values\n (Alexander Duyck)\n- ixgbe: Address issues with Tx WHTRESH value not being set correctly\n (Alexander Duyck)\n- ixgbe: Reorder adapter contents for better cache utilization (Joe Jin)\n- ixgbe: Do no clear Tx status bits since eop_desc provides enough info\n (Alexander Duyck)\n- ixgbe: remove tie between NAPI work limits and interrupt moderation (Jeff\n Kirsher)\n- ixgbe: dcb: check setup_tc return codes (John Fastabend)\n- ixgbe: Fix comments that are out of date or formatted incorrectly (Alexander\n Duyck)\n- ixgbe: fix spelling errors (Don Skidmore)\n- ixgbe: Minor formatting and comment corrections for ixgbe_xmit_frame_ring\n (Alexander Duyck)\n- ixgbe: Combine post-DMA processing of sk_buff fields into single function\n (Alexander Duyck)\n- ixgbe: Drop the _ADV of descriptor macros since all ixgbe descriptors are ADV\n (Alexander Duyck)\n- ixgbe: Add function for testing status bits in Rx descriptor (Alexander\n Duyck)\n- ixgbe: Let the Rx buffer allocation clear status bits instead of cleanup (Joe\n Jin)\n- ixgbe: Address fact that RSC was not setting GSO size for incoming frames\n (Alexander Duyck)\n- ixgbe: Minor refactor of RSC (Alexander Duyck)\n- ixgbe: ethtool: stats user buffer overrun (John Fastabend)\n- ixgbe: dcb: up2tc mapping lost on disable/enable CEE DCB state (John\n Fastabend)\n- ixgbe: do not update real num queues when netdev is going away (Yi Zou)\n- ixgbe: Fix broken dependency on MAX_SKB_FRAGS being related to page size\n (Alexander Duyck)\n- ixgbe: Fix case of Tx Hang in PF with 32 VFs (Greg Rose)\n- ixgbe: fix vf lookup (Greg Rose)\n- ixgbe: Fix typo in ixgbe_common.h (Masanari Iida)\n- ixgbe: make ethtool strings table const (Stephen Hemminger)\n- ixgbe: Add warning when no space left for more MAC filters (Joe Jin)\n- ixgbe: update copyright to 2012 (Don Skidmore)\n- ixgbe: Add module parameter to allow untested and unsafe SFP+ modules (Peter\n P Waskiewicz Jr)\n- ixgbe: Fix register defines to correctly handle complex expressions\n (Alexander Duyck)\n- ixgbe: add support for new 82599 device. (Don Skidmore)\n- ixgbe: add support for new 82599 device id (Emil Tantilov)\n- ixgbe: add write flush in ixgbe_clock_out_i2c_byte() (Emil Tantilov)\n- ixgbe: fix typos (Stephen Hemminger)\n- ixgbe: fix incorrect PHY register reads (Emil Tantilov)\n- ixgbe: Remove function prototype for non-existent function (Greg Rose)\n- ixgbe: DCB: IEEE transitions may fail to reprogram hardware. (John Fastabend)\n- ixgbe: DCBnl set_all, order of operations fix (Joe Jin)\n- ixgbe: fix LED blink logic to check for link (Emil Tantilov)\n- ixgbe: Fix compile for kernel without CONFIG_PCI_IOV defined (Rose, Gregory\n V)\n- ixgbe: DCB, return max for IEEE traffic classes (John Fastabend)\n- ixgbe: fix reading of the buffer returned by the firmware (Emil Tantilov)\n- ixgbe: Fix compiler warnings (Greg Rose)\n- ixgbe: fix smatch splat due to missing NULL check (John Fastabend)\n- ixgbe: fix disabling of Tx laser at probe (Emil Tantilov)\n- ixgbe: Fix link issues caused by a reset while interface is down (Emil\n Tantilov)\n- ixgbe: change the eeprom version reported by ethtool (Emil Tantilov)\n- ixgbe: allow eeprom writes via ethtool (Emil Tantilov)\n- ixgbe: fix endianess when writing driver version to firmware (Emil Tantilov)\n- ixgbe: fix skb truesize underestimation (Eric Dumazet)\n- ixgbe: Correct check for change in FCoE priority (Mark Rustad)\n- ixgbe: Add FCoE DDP allocation failure counters to ethtool stats. (Amir\n Hanania)\n- ixgbe: Add protection from VF invalid target DMA (Greg Rose)\n- ixgbe: bump version number (Don Skidmore)\n- ixgbe: X540 devices RX PFC frames pause traffic even if disabled (John\n Fastabend)\n- ixgbe: DCB X540 devices support max traffic class of 4 (John Fastabend)\n- ixgbe: fixup hard dependencies on supporting 8 traffic classes (Joe Jin)\n- ixgbe: Fix PFC mask generation (Mark Rustad)\n- ixgbe: remove instances of ixgbe_phy_aq for 82598 and 82599 (Emil Tantilov)\n- ixgbe: get pauseparam autoneg (Mika Lansirinne)\n- ixgbe: do not disable flow control in ixgbe_check_mac_link (Emil Tantilov)\n- ixgbe: send MFLCN to ethtool (Emil Tantilov)\n- ixgbe: add support for new 82599 device (Emil Tantilov)\n- ixgbe: fix driver version initialization in firmware (Jacob Keller)\n- ixgbe: remove return code for functions that always return 0 (Emil Tantilov)\n- ixgbe: clear the data field in ixgbe_read_i2c_byte_generic (Emil Tantilov)\n- ixgbe: prevent link checks while resetting (Emil Tantilov)\n- ixgbe: add ECC warning for legacy interrupts (Don Skidmore)\n- ixgbe: cleanup ixgbe_setup_gpie() for X540 (Don Skidmore)\n- ixgbe add thermal sensor support for x540 hardware (Jacob Keller)\n- ixgbe: update {P}FC thresholds to account for X540 and loopback (John\n Fastabend)\n- ixgbe: disable LLI for FCoE (Vasu Dev)\n- ixgbe: Cleanup q_vector interrupt throttle rate logic (Emil Tantilov)\n- ixgbe: remove global reset to the MAC (Emil Tantilov)\n- ixgbe: add WOL support for X540 (Emil Tantilov)\n- ixgbe: avoid HW lockup when adapter is reset with Tx work pending (Emil\n Tantilov)\n- ixgbe: dcb, set priority to traffic class mappings (John Fastabend)\n- ixgbe: cleanup X540 interrupt enablement (Don Skidmore)\n- ixgbe: DCB, do not call set_state() from IEEE mode (Joe Jin)\n- ixgbe: Reconfigure SR-IOV Init (Greg Rose)\n- ixgbe: remove duplicate netif_tx_start_all_queues (Emil Tantilov)\n- ixgbe: fix FCRTL/H register dump for X540 (Emil Tantilov)\n- ixgbe: cleanup some register reads (Emil Tantilov)\n- ixgbe: Make better use of memory allocations in one-buffer mode w/ RSC\n (Alexander Duyck)\n- ixgbe: drop adapter from ixgbe_fso call documentation (Alexander Duyck)\n- ixgbe: Add SFP support for missed 82598 PHY (Alexander Duyck)\n- ixgbe: Add missing code for enabling overheat sensor interrupt (Alexander\n Duyck)\n- ixgbe: make ixgbe_up and ixgbe_up_complete void functions (Alexander Duyck)\n- v2 ixgbe: Update packet buffer reservation to correct fdir headroom size\n (Alexander Duyck)\n- ixgbe: remove redundant configuration of tx_sample_rate (Alexander Duyck)\n- ixgbe: Correctly name and handle MSI-X other interrupt (Alexander Duyck)\n- ixgbe: cleanup configuration of EITRSEL and VF reset path (Alexander Duyck)\n- ixgbe: cleanup reset paths (Alexander Duyck)\n- ixgbe: Update TXDCTL configuration to correctly handle WTHRESH (Alexander\n Duyck)\n- ixgbe: combine PCI_VDEVICE and board declaration to same line (Alexander\n Duyck)\n- ixgbe: Drop unnecessary adapter->hw dereference in loopback test setup\n (Alexander Duyck)\n- ixgbe: commonize ixgbe_map_rings_to_vectors to work for all interrupt types\n (Alexander Duyck)\n- ixgbe: Use ring->dev instead of adapter->pdev->dev when updating DCA\n (Alexander Duyck)\n- ixgbe: cleanup allocation and freeing of IRQ affinity hint (Alexander Duyck)\n- v2 ixgbe: consolidate all MSI-X ring interrupts and poll routines into one\n (Alexander Duyck)\n- ixgbe: Change default Tx work limit size to 256 buffers (Alexander Duyck)\n- ixgbe: clear RNBC only for 82598 (Emil Tantilov)\n- ixgbe: add check for supported modes (Emil Tantilov)\n- ixgbe: fix ixgbe_fc_autoneg_fiber bug (Don Skidmore)\n- ixgbe: cleanup feature flags in ixgbe_probe (Don Skidmore)\n- ixgbe: PFC not cleared on X540 devices (John Fastabend)\n- ixgbe: consolidate, setup for multiple traffic classes (John Fastabend)\n- ixgbe: remove unneeded fdir pb alloc case (John Fastabend)\n- ixgbe: fixup remaining call sites for arbitrary TCs (John Fastabend)\n- ixgbe: Always tag VLAN tagged packets (Alexander Duyck)\n- ixgbe: Add support for setting CC bit when SR-IOV is enabled (Alexander\n Duyck)\n- ixgbe: convert rings from q_vector bit indexed array to linked list\n (Alexander Duyck)\n- ixgbe: Simplify transmit cleanup path (Alexander Duyck)\n- ixgbe: Cleanup FCOE and VLAN handling in xmit_frame_ring (Alexander Duyck)\n- ixgbe: replace reference to CONFIG_FCOE with IXGBE_FCOE (Alexander Duyck)\n- ixgbe - DDP last user buffer - error to warn (Amir Hanania)\n- ixgbe: remove unused fcoe.tc field and fcoe_setapp() (John Fastabend)\n- ixgbe: complete FCoE initialization from setapp() routine (John Fastabend)\n- ixgbe: DCB, remove unneeded ixgbe_dcb_txq_to_tc() routine (John Fastabend)\n- ixgb: Remove unnecessary defines, use pr_debug (Joe Perches)\n- ixgb: finish conversion to ndo_fix_features (Michal Miroslaw)\n- ixgb: eliminate checkstack warnings (Jesse Brandeburg)\n- ixgb: convert to ndo_fix_features (Michal Miroslaw)\n- igbvf: fix the bug when initializing the igbvf (Samuel Liao)\n- rename dev_hw_addr_random and remove redundant second (Joe Jin)\n(Jeff Kirsher)\n- igbvf: Use ETH_ALEN (Joe Perches)\n- igbvf: reset netdevice addr_assign_type if changed (Danny Kukawka)\n- igbvf: refactor Interrupt Throttle Rate code (Mitch A Williams)\n- igbvf: change copyright date (Mitch A Williams)\n- igbvf: Remove unnecessary irq disable/enable (Joe Jin)\n- igbvf: remove unneeded cast (Stephen Hemminger)\n(Jeff Kirsher)\n- igbvf: Bump version number (Williams, Mitch A)\n- igbvf: Update module identification strings (Williams, Mitch A)\n- igbvf: fix truesize underestimation (Eric Dumazet)\n- igbvf: Fix trunk vlan (Greg Rose)\n- igbvf: convert to ndo_fix_features (Michal Miroslaw)\n- igb: fix rtnl race in PM resume path (Benjamin Poirier)\n- igb: fix warning about unused function (Emil Tantilov)\n- igb: fix vf lookup (Greg Rose)\n- igb: Update Copyright on all Intel copyrighted files. (Carolyn Wyborny)\n- igb: make local functions static (Stephen Hemminger)\n- igb: reset PHY after recovering from PHY power down (Koki Sanagi)\n- igb: add basic runtime PM support (Yan, Zheng)\n- igb: Add flow control advertising to ethtool setting. (Carolyn Wyborny)\n- igb: Update DMA Coalescing threshold calculation. (Matthew Vick)\n- igb: Convert bare printk to pr_notice (Joe Perches)\n(Jeff Kirsher)\n- igb: Fix for I347AT4 PHY cable length unit detection (Kantecki, Tomasz)\n- igb: VFTA Table Fix for i350 devices (Carolyn Wyborny)\n- igb: Move DMA Coalescing init code to separate function. (Carolyn Wyborny)\n- igb: Fix for Alt MAC Address feature on 82580 and later devices (Carolyn\n Wyborny)\n- igb: fix a compile warning (RongQing Li)\n- igb: Check if subordinate VFs are assigned to virtual machines (Greg Rose)\n- pci: Add flag indicating device has been assigned by KVM (Greg Rose)\n- igb: enable l4 timestamping for v2 event packets (Jacob Keller)\n- igb: fix skb truesize underestimation (Eric Dumazet)\n- igb: Version bump. (Carolyn Wyborny)\n- igb: Loopback functionality supports for i350 devices (Akeem G. Abodunrin)\n- igb: fix static function warnings reported by sparse (Emil Tantilov)\n- igb: Add workaround for byte swapped VLAN on i350 local traffic (Alexander\n Duyck)\n- igb: Drop unnecessary write of E1000_IMS from igb_msix_other (Alexander\n Duyck)\n- igb: Fix features that are currently 82580 only and should also be i350\n (Alexander Duyck)\n- igb: Make certain one vector is always assigned in igb_request_irq (Alexander\n Duyck)\n- igb: avoid unnecessarily creating a local copy of the q_vector (Alexander\n Duyck)\n- igb: add support for NETIF_F_RXHASH (Alexander Duyck)\n- igb: move TX hang check flag into ring->flags (Alexander Duyck)\n- igb: fix recent VLAN changes that would leave VLANs disabled after reset\n (Alexander Duyck)\n- igb: leave staterr in place and instead us a helper function to check bits\n (Alexander Duyck)\n- igb: retire the RX_CSUM flag and use the netdev flag instead (Alexander\n Duyck)\n- igb: cleanup IVAR configuration (Alexander Duyck)\n- igb: Move ITR related data into work container within the q_vector (Alexander\n Duyck)\n- igb: Consolidate all of the ring feature flags into a single value (Alexander\n Duyck)\n- igb: avoid unnecessary conversions from u16 to int (Alexander Duyck)\n- igb: Use node specific allocations for the q_vectors and rings (Alexander\n Duyck)\n- igb: push data into first igb_tx_buffer sooner to reduce stack usage\n (Alexander Duyck)\n- igb: consolidate creation of Tx buffer info and data descriptor (Alexander\n Duyck)\n- igb: Combine all flag info fields into a single tx_flags structure (Alexander\n Duyck)\n- igb: Cleanup protocol handling in transmit path (Alexander Duyck)\n- igb: Create separate functions for generating cmd_type and olinfo (Alexander\n Duyck)\n- igb: Make first and tx_buffer_info->next_to_watch into pointers (Alexander\n Duyck)\n- igb: Consolidate creation of Tx context descriptors into a single function\n (Alexander Duyck)\n- intel: convert to SKB paged frag API. (Ian Campbell)\n- ixgbe: Refactor transmit map and cleanup routines (Alexander Duyck)\n- igb: split buffer_info into tx_buffer_info and rx_buffer_info (Alexander\n Duyck)\n- igb: Make Tx budget for NAPI user adjustable (Alexander Duyck)\n- igb: Alternate MAC Address Updates for Func2&3 (Akeem G. Abodunrin)\n- igb: Alternate MAC Address EEPROM Updates (Akeem G. Abodunrin)\n- igb: Code to prevent overwriting SFP I2C (Akeem G. Abodunrin)\n- igb: Remove multi_tx_table and simplify igb_xmit_frame (Alexander Duyck)\n- igb: drop the 'adv' off function names relating to descriptors (Joe Jin)\n- igb: Replace E1000_XX_DESC_ADV with IGB_XX_DESC (Alexander Duyck)\n- igb: Refactor clean_rx_irq to reduce overhead and improve performance\n (Alexander Duyck)\n- igb: update ring and adapter structure to improve performance (Alexander\n Duyck)\n- igb: streamline Rx buffer allocation and cleanup (Alexander Duyck)\n- igb: drop support for single buffer mode (Alexander Duyck)\n- igb: Update max_frame_size to account for an optional VLAN tag if present\n (Alexander Duyck)\n- igb: Update RXDCTL/TXDCTL configurations (Alexander Duyck)\n- igb: remove duplicated #include (Huang Weiyi)\n- igb: Fix for DH89xxCC near end loopback test (Robert Healy)\n- igb: do vlan cleanup (Jiri Pirko)\n- igb: Add support of SerDes Forced mode for certain hardware (Carolyn Wyborny)\n- igb: Update copyright on all igb driver files. (Carolyn Wyborny)\n- net: igb: Use is_multicast_ether_addr helper (Tobias Klauser)\n- igb: remove unnecessary reads of PCI_CAP_ID_EXP (Jon Mason)\n- igb: convert to ndo_fix_features (Michal Miroslaw)\n- igb: Change version to remove number after -k in kernel versions. (Carolyn\n Wyborny)\n- e1000e: Fix default interrupt throttle rate not set in NIC HW (Jeff Kirsher)\n- e1000e: MSI interrupt test failed, using legacy interrupt (Prasanna S\n Panchamukhi)\n- e1000e: issues in Sx on 82577/8/9 (Joe Jin)\n- e1000e: Guarantee descriptor writeback flush success. (Matthew Vick)\n- e1000e: prevent oops when adapter is being closed and reset simultaneously\n (Bruce Allan)\n- e1000e: use msleep instead of mdelay (Joe Jin)\n- e1000e: cleanup goto statements to exit points without common work (Bruce\n Allan)\n- e1000e: potentially incorrect return for e1000e_setup_fiber_serdes_link\n (Bruce Allan)\n- e1000e: potentially incorrect return for e1000_init_hw_ich8lan (Bruce Allan)\n- e1000e: cleanup: minor whitespace addition (insert blank line separator)\n (Bruce Allan)\n- e1000e: cleanup: remove unnecessary variable initializations (Bruce Allan)\n- e1000e: cleanup: remove unnecessary test and return (Bruce Allan)\n- e1000e: cleanup: remove unnecessary variable ret_val (Bruce Allan)\n- e1000e: cleanup: remove unreachable statement (Bruce Allan)\n- e1000e: potentially incorrect return for e1000_set_d3_lplu_state_ich8lan\n (Bruce Allan)\n- e1000e: cleanup: always return 0 (Bruce Allan)\n- e1000e: cleanup: remove unnecessary assignments just before returning (Bruce\n Allan)\n- e1000e: potential incorrect return for e1000_setup_copper_link_80003es2lan\n (Bruce Allan)\n- e1000e: potentially incorrect return for e1000_cfg_kmrn_10_100_80003es2lan\n (Bruce Allan)\n- e1000e: cleanup: rename goto labels to be more meaningful (Bruce Allan)\n- e1000e: cleanup: use goto for common work needed by multiple exit points\n (Bruce Allan)\n- e1000e: replace '1' with 'true' for boolean get_link_status (Bruce Allan)\n- e1000e: pass pointer to hw struct for e1000_init_mac_params_XXX() (Bruce\n Allan)\n- e1000e: use true/false for bool autoneg_false (Bruce Allan)\n- e1000e: remove unnecessary parentheses (Bruce Allan)\n- e1000e: remove unnecessary returns from void functions (Bruce Allan)\n- e1000e: remove test that is always false (Bruce Allan)\n- e1000e: WoL fails on device ID 0x1501 (Joe Jin)\n- e1000e: WoL can fail on 82578DM (Bruce Allan)\n- e1000e: remove redundant reverse dependency on CRC32 (Bruce Allan)\n- e1000e: minor whitespace and indentation cleanup (Bruce Allan)\n- e1000e: fix sparse warnings with -D__CHECK_ENDIAN__ (Bruce Allan)\n- e1000e: fix checkpatch warning from MINMAX test (Bruce Allan)\n- e1000e: cleanup - use braces in both branches of a conditional statement\n (Bruce Allan)\n- e1000e: cleanup e1000_set_phys_id (Bruce Allan)\n- e1000e: cleanup e1000_init_mac_params_82571() (Bruce Allan)\n- e1000e: cleanup e1000_init_mac_params_80003es2lan() (Bruce Allan)\n- e1000e: rename es2lan.c to 80003es2lan.c (Joe Jin)\n- e1000e: cleanup - check return values consistently (Bruce Allan)\n- e1000e: add missing initializers reported when compiling with W=1 (Bruce\n Allan)\n- e1000e: update copyright year (Bruce Allan)\n- e1000e: split lib.c into three more-appropriate files (Bruce Allan)\n- e1000e: call er16flash() instead of __er16flash() (Bruce Allan)\n- e1000e: increase version number (Joe Jin)\n- e1000e: convert final strncpy() to strlcpy() (Bruce Allan)\n- e1000e: concatenate long debug strings which span multiple lines (Bruce\n Allan)\n- e1000e: conditionally restart autoneg on 82577/8/9 when setting LPLU state\n (Bruce Allan)\n- e1000e: increase Rx PBA to prevent dropping received packets on 82566/82567\n (Bruce Allan)\n- e1000e: ICHx/PCHx LOMs should use LPLU setting in NVM when going to Sx (Joe\n Jin)\n- e1000e: update workaround for 82579 intermittently disabled during S0->Sx\n (Bruce Allan)\n- e1000e: disable Early Receive DMA on ICH LOMs (Bruce Allan)\n- e1000e: Need to include vmalloc.h (David S. Miller)\n- e1000e: 82574/82583 Tx hang workaround (Bruce Allan)\n- e1000e: use hardware default values for Transmit Control register (Bruce\n Allan)\n- e1000e: use default settings for Tx Inter Packet Gap timer (Bruce Allan)\n- e1000e: 82579: workaround for link drop issue (Bruce Allan)\n- e1000e: always set transmit descriptor control registers the same (Bruce\n Allan)\n- e1000e: re-factor ethtool get/set ring parameter (Bruce Allan)\n- e1000e: pass pointer to ring struct instead of adapter struct (Joe Jin)\n- e1000e: add Receive Packet Steering (RPS) support (Joe Jin)\n- e1000e: convert to netdev features/hw_features API (Joe Jin)\n- e1000e: cleanup Rx checksum offload code (Bruce Allan)\n- e1000e: convert head, tail and itr_register offsets to __iomem pointers\n (Bruce Allan)\n- e1000e: re-enable alternate MAC address for all devices which support it\n (Bruce Allan)\n- e1000e: default IntMode based on kernel config & available hardware support\n (Bruce Allan)\n- e1000e: convert to real ndo_set_rx_mode (Joe Jin)\n- net: introduce IFF_UNICAST_FLT private flag (Joe Jin)\n- e1000e: remove use of ndo_set_multicast_list in drivers (Joe Jin)\n(Jeff Kirsher)\n- e1000e: demote a debugging WARN to a debug log message (Bruce Allan)\n- e1000e: fix skb truesize underestimation (Eric Dumazet)\n- e1000e: locking bug introduced by commit 67fd4fcb (Bruce Allan)\n- e1000e: bad short packets received when jumbos enabled on 82579 (Bruce Allan)\n- e1000e: convert driver to use extended descriptors (Joe Jin)\n- drivers/net: Add module.h to drivers who were implicitly using it (Joe Jin)\n- e1000e: hitting BUG_ON() from napi_enable (Bruce Allan)\n- e1000: Silence sparse warnings by correcting type (Andrei Emeltchenko)\n- v2 e1000: Neaten e1000_dump function (Tushar Dave)\n- e1000: Neaten e1000_config_dsp_after_link_change (Joe Perches)\n- e1000: fix vlan processing regression (Joe Jin)\n- e1000: Remove unnecessary k.alloc/v.alloc OOM messages (Joe Jin)\n- e1000: add dropped DMA receive enable back in for WoL (Dean Nelson)\n- e1000: Adding e1000_dump function (Tushar Dave)\n- e1000: dont enable dma receives until after dma address has been setup (Dean\n Nelson)\n- e1000: save skb counts in TX to avoid cache misses (Dean Nelson)\n- e1000: cleanup CE4100 MDIO registers access (Florian Fainelli)\n- e1000: unmap ce4100_gbe_mdio_base_virt in e1000_remove (Florian Fainelli)\n- e1000: fix lockdep splat in shutdown handler (Jesse Brandeburg)\n- e1000e/ixgb: fix assignment of 0/1 to bool variables. (Joe Jin)\n- intel: Convert \n_LENGTH_OF_ADDRESS to ETH_ALEN (Joe Perches)\n- e1000: fix skb truesize underestimation (Eric Dumazet)\n- e1000: convert to private mutex from rtnl (Jesse Brandeburg)\n- e1000: convert mdelay to msleep (Jesse Brandeburg)\n- e1000: convert hardware management from timers to threads (Jesse Brandeburg)\n- e100: Remove alloc_etherdev error messages (Joe Jin)\n- net: Remove Intel NICs unnecessary driver assignments of ethtool_ringparam\n fields to zero (Joe Jin)\n- e100: Show short v/s long rx length errors in ethtool stats. (Ben Greear)\n- e100: Fix rx-over-length statistics. (Ben Greear)\n- e100: make sure vlan support isnt advertised on old adapters (Jesse\n Brandeburg)\n- 8139cp: properly config rx mode after resuming (Jason Wang)\n- bnx2x: add bnx2x firmware 7.2.16 (Joe Jin)\n- bnx2fc: Remove bh disable in softirq context (Neil Horman)\n- bnx2fc: HSI dependent changes for 7.2.xx FW (Bhanu Prakash Gollapudi)\n- bnx2fc: Bumped version to 1.0.10 (Bhanu Prakash Gollapudi)\n- bnx2fc: NPIV ports go offline when interface is brought down & up (Bhanu\n Prakash Gollapudi)\n- bnx2fc: Handle LOGO flooding from the target (Bhanu Prakash Gollapudi)\n- bnx2fc: fix panic in bnx2fc_post_io_req (Bhanu Prakash Gollapudi)\n- bnx2fc: Bumped version to 1.0.9 (Bhanu Prakash Gollapudi)\n- bnx2fc: Handle SRR LS_ACC drop scenario (Bhanu Prakash Gollapudi)\n- bnx2fc: Handle ABTS timeout during ulp timeout (Bhanu Prakash Gollapudi)\n- bnx2fc: Bumped version to 1.0.8 (Bhanu Prakash Gollapudi)\n- bnx2fc: Return error statistics of remote peer (Bhanu Prakash Gollapudi)\n- bnx2fc: call ctlr_link_up only when the interface is enabled (Bhanu Prakash\n Gollapudi)\n- bnx2fc: Bumped version to 1.0.7 (Bhanu Prakash Gollapudi)\n- bnx2fc: Handle bnx2fc_map_sg failure (Bhanu Prakash Gollapudi)\n- bnx2fc: Replace scsi_dma_map() with dma_map_sg(). (Bhanu Prakash Gollapudi)\n- bnx2fc: Bumped version to 1.0.6 (Bhanu Prakash Gollapudi)\n- bnx2fc: Fix FW assert during RSCN stress tests (Bhanu Prakash Gollapudi)\n- bnx2fc: Fix panic caused because of incorrect errror handling in create().\n (Bhanu Prakash Gollapudi)\n- bnx2fc: Avoid calling bnx2fc_if_destroy with unnecessary locks (Bhanu Prakash\n Gollapudi)\n- bnx2fc: Validate vlan id in NETDEV_UNREGISTER handler (Nithin Nayak Sujir)\n- bnx2fc: No abort issued for REC when it times out (Bhanu Prakash Gollapudi)\n- bnx2fc: Send solicitation only after vlan discovery is complete (Bhanu\n Prakash Gollapudi)\n- bnx2fc: Reset max receive frame size during link up (Bhanu Prakash Gollapudi)\n- bnx2fc: Need not schedule destroy_work from __bnx2fc_destroy (Bhanu Prakash\n Gollapudi)\n- bnx2fc: Bump version to 1.0.5 (Bhanu Prakash Gollapudi)\n- bnx2fc: Prevent creating of NPIV port with duplicate WWN (Bhanu Prakash\n Gollapudi)\n- bnx2fc: Obtain WWNN/WWPN from the shared memory (Bhanu Prakash Gollapudi)\n- [SCSI] fcoe,libfcoe: Move common code for fcoe_get_lesb to fcoe_transport\n (Bhanu Prakash Gollapudi)\n- [SCSI] fcoe: Move common functions to fcoe_transport library (Bhanu Prakash\n Gollapudi)\n- [SCSI] bnx2fc: Drop incoming ABTS (Bhanu Prakash Gollapudi)\n- [SCSI] bnx2fc: code cleanup in bnx2fc_offload_session (Bhanu Prakash\n Gollapudi)\n- [SCSI] bnx2fc: Fix NULL pointer deref during arm_cq. (Bhanu Prakash\n Gollapudi)\n- [SCSI] bnx2fc: IO errors when receiving unsolicited LOGO (Bhanu Prakash\n Gollapudi)\n- [SCSI] bnx2fc: Do not reuse the fcoe connection id immediately (Bhanu Prakash\n Gollapudi)\n- [SCSI] bnx2fc: Clear DESTROY_CMPL flag after firmware destroy (Bhanu Prakash\n Gollapudi)\n- [SCSI] bnx2fc: Handle NETDEV_UNREGISTER for vlan devices (Bhanu Prakash\n Gollapudi)\n- [SCSI] bnx2fc: Reorganize cleanup code between interface_cleanup and\n if_destory (Bhanu Prakash Gollapudi)\n- [SCSI] bnx2fc: Change function names of\n bnx2fc_netdev_setup/bnx2fc_netdev_cleanup (Bhanu Prakash Gollapudi)\n- [SCSI] bnx2fc: Do not attempt destroying NPIV port twice (Bhanu Prakash\n Gollapudi)\n- [SCSI] bnx2fc: Remove erroneous kref_get on IO request (Bhanu Prakash\n Gollapudi)\n- [SCSI] bnx2fc: Enable bsg_request support for bnx2fc (Bhanu Prakash\n Gollapudi)\n- [SCSI] bnx2fc: Bug fixes in percpu_thread_create/destroy (Bhanu Prakash\n Gollapudi)\n- [SCSI] bnx2fc: Reset the max receive frame size (Bhanu Prakash Gollapudi)\n- [SCSI] bnx2i: Fixed the override of the error_mask module param (Eddie Wai)\n- [SCSI] bnx2i: use kthread_create_on_node() (Eric Dumazet)\n- [SCSI] bnx2i: Fixed kernel panic caused by unprotected task->sc->request\n deref (Eddie Wai)\n- [SCSI] bnx2i: Fixed the endian on TTT for NOP out transmission (Eddie Wai)\n- [SCSI] bnx2i: Fixed kernel panic due to illegal usage of sc->request->cpu\n (Eddie Wai)\n- cnic: Fix select dependencies in bnx2fc/bnx2i Kconfig. (David S. Miller)\n- bnx2x: Fix 578xx link LED (Yaniv Rosner)\n- bnx2x: Enable FEC for 57810-KR (Yaniv Rosner)\n- bnx2x: disable dcb on 578xx since not supported yet (Dmitry Kravkov)\n- bnx2x: decrease print level to debug (Dmitry Kravkov)\n- bnx2x: fix BRB thresholds for dropless_fc mode (Dmitry Kravkov)\n- bnx2x: fix cl_id allocation for non-eth clients for NPAR mode (Dmitry\n Kravkov)\n- bnx2x: Fix for a host coalescing bug which impared latency. (Ariel Elior)\n- bnx2x: fix select_queue when FCoE is disabled (Vladislav Zolotarov)\n- bnx2x: fix WOL by enablement PME in config space (Dmitry Kravkov)\n- bnx2x: Fix XMAC loopback test (Yaniv Rosner)\n- bnx2x: init FCOE FP only once (Vladislav Zolotarov)\n- bnx2x: Remove fiber remote fault detection (Yaniv Rosner)\n- cnic: update for FW 7.2.xx (Michael Chan)\n- bnx2x: correction to firmware interface (Yuval Mintz)\n- bnx2x: fix vector traveling while looking for an empty entry (Dmitry Kravkov)\n- bnx2x: mark functions as loaded on shared memory (Yuval Mintz)\n- bnx2x: fix memory leak in bnx2x_init_firmware() (Michal Schmidt)\n- bnx2x: fix a crash on corrupt firmware file (Michal Schmidt)\n- bnx2x: make bnx2x_close() static again (Michal Schmidt)\n- bnx2x: removed code re-checking memory base after device open (Mintz Yuval)\n- bnx2x: allow BCM84833 phy to advertise 100Base-T speeds (Mintz Yuval)\n- bnx2x: notify cnic of address of info-to-the-mcp (Mintz Yuval)\n- bnx2x: allocate smaller Rx rings for 1G functions (Mintz Yuval)\n- bnx2x: allocate memory dynamically in ethtool self-test. (Merav Sicron)\n- bnx2x: force 10G on 84833 phy should be autoneg with only 10G advertised\n (Yaniv Rosner)\n- bnx2x: added autoneg-restart after link advertisement changes (Yaniv Rosner)\n- bnx2x: ethtool publishes link partners speed and FC (Mintz Yuval)\n- bnx2x: half duplex support added for several boards (Yaniv Rosner)\n- bnx2x: remove the 'poll' module option (Michal Schmidt)\n- bnx2x: fix bnx2x_storm_stats_update() on big endian (Eric Dumazet)\n- bnx2x: Fix mem leak in bnx2x_tpa_stop() if build_skb() fails. (Jesper Juhl)\n- bnx2x: Update version to 1.72.0 and copyrights (Ariel Elior)\n- bnx2x: Recoverable and unrecoverable error statistics (Ariel Elior)\n- bnx2x: Recovery flow bug fixes (Ariel Elior)\n- bnx2x: init fw_seq after undi_unload is done (Dmitry Kravkov)\n- bnx2x: Track active PFs with bitmap (Ariel Elior)\n- bnx2x: Lock PF-common resources (Ariel Elior)\n- bnx2x: dont reset device while reading its configuration. (Dmitry Kravkov)\n- bnx2x: Loaded Firmware Version Validation (Ariel Elior)\n- bnx2x: Function Level Reset Final Cleanup (Ariel Elior)\n- bnx2x: Obtain Bus Device Function from register (Ariel Elior)\n- bnx2x: Removing indirect register access (Ariel Elior)\n- bnx2x: Support Queue Per Cos in 5771xx devices (Ariel Elior)\n- bnx2x: Remove 100Mb force speed for BCM84833 (Yaniv Rosner)\n- bnx2x: Fix ethtool advertisement (Yaniv Rosner)\n- bnx2x: unlock before returning an error (Dan Carpenter)\n- bnx2x: fix compilation error with SOE in fw_dump (Yuval Mintz)\n- bnx2x: handle CHIP_REVISION during init_one (Ariel Elior)\n- bnx2x: dont access removed registers on 57712 and above (Dmitry Kravkov)\n- bnx2x: properly clean indirect addresses (Dmitry Kravkov)\n- bnx2x: allow user to change ring size in ISCSI SD mode (Dmitry Kravkov)\n- bnx2x: fix Big-Endianess in ethtool -t (Dmitry Kravkov)\n- bnx2x: fixed ethtool statistics for MF modes (Yuval Mintz)\n- bnx2x: credit-leakage fixup on vlan_mac_del_all (Yuval Mintz)\n- bnx2x: Disable AN KR work-around for BCM57810 (Yaniv Rosner)\n- bnx2x: Remove AutoGrEEEn for BCM84833 (Yaniv Rosner)\n- bnx2x: Fix PFC setting on BCM57840 (Yaniv Rosner)\n- bnx2x: Fix Super-Isolate mode for BCM84833 (Yaniv Rosner)\n- bnx2x: handle vpd data longer than 128 bytes (Barak Witkowski)\n- bnx2x: properly update skb when mtu > 1500 (Dmitry Kravkov)\n- bnx2x: properly initialize L5 features (Joe Jin)\n- bnx2x: fix typo in fcoe stats collection (Barak Witkowski)\n- bnx2x: Fix compile errors if CONFIG_CNIC is not set (Michael Chan)\n- bnx2x, cnic: support DRV_INFO upon FW request (Barak Witkowski)\n- bnx2x: support classification config query (Ariel Elior)\n- bnx2x: add fcoe statistics (Barak Witkowski)\n- bnx2x: add PFC statistics (Barak Witkowski)\n- bnx2x: Use kcalloc instead of kzalloc to allocate array (Thomas Meyer)\n- bnx2x: handle iSCSI SD mode (Dmitry Kravkov)\n- bnx2x: fix rx ring size report (Vladislav Zolotarov)\n- bnx2x: Change value comparison order (Yaniv Rosner)\n- bnx2x: Cosmetic changes (Yaniv Rosner)\n- bnx2x: Fix self test of BCM57800 (Yaniv Rosner)\n- bnx2x: Add known PHY type check (Yaniv Rosner)\n- bnx2x: Change Warpcore MDIO work around mode (Yaniv Rosner)\n- bnx2x: Fix BCM84833 link and LED behavior (Yaniv Rosner)\n- bnx2x: Warpcore HW reset following fan failure (Yaniv Rosner)\n- bnx2x: ETS changes (Yaniv Rosner)\n- bnx2x: Fix ETS bandwidth (Yaniv Rosner)\n- bnx2x: PFC changes (Yaniv Rosner)\n- bnx2x: Fix 5461x LED (Yaniv Rosner)\n- bnx2x: cache-in compressed fw image (Dmitry Kravkov)\n- bnx2x: add endline at end of message (Dmitry Kravkov)\n- bnx2x: uses build_skb() in receive path (Eric Dumazet)\n- net: introduce build_skb() (Eric Dumazet)\n- net: more accurate skb truesize (Eric Dumazet)\n- bnx2x: update driver version to 1.70.35-0 (Dmitry Kravkov)\n- bnx2x: Remove on-stack napi struct variable (Ariel Elior)\n- bnx2x: prevent race in statistics flow (Dmitry Kravkov)\n- bnx2x: add fan failure event handling (Ariel Elior)\n- bnx2x: remove unused #define (Dmitry Kravkov)\n- bnx2x: simplify definition of RX_SGE_MASK_LEN and use it. (Dmitry Kravkov)\n- bnx2x: propagate DCBX negotiation (Dmitry Kravkov)\n- bnx2x: fix MF for 4-port devices (Dmitry Kravkov)\n- bnx2x: DCBX: use #define instead of magic (Dmitry Kravkov)\n- bnx2x: separate FCoE and iSCSI license initialization. (Joe Jin)\n- bnx2x: remove unused variable (Dmitry Kravkov)\n- bnx2x: use rx_queue index for skb_record_rx_queue() (Dmitry Kravkov)\n- bnx2x: allow FCoE and DCB for 578xx (Joe Jin)\n- bnx2x: update driver version to 1.70.30-0 (Dmitry Kravkov)\n- bnx2x: use FW 7.0.29.0 (Dmitry Kravkov)\n- bnx2x: add bnx2x FW 7.0.29 (Joe Jin)\n- bnx2x: Enable changing speed when port type is PORT_DA (Yaniv Rosner)\n- bnx2x: Fix 54618se LED behavior (Yaniv Rosner)\n- bnx2x: Fix RX/TX problem caused by the MAC layer (Yaniv Rosner)\n- bnx2x: Add link retry to 578xx-KR (Yaniv Rosner)\n- bnx2x: Fix LED blink rate for 578xx (Yaniv Rosner)\n- bnx2x: fix skb truesize underestimation (Eric Dumazet)\n- bnx2x: remove some dead code (Dan Carpenter)\n- bnx2x: Fix build error (Dmitry Kravkov)\n- bnx2x: Add new PHY BCM54616 (Yaniv Rosner)\n- bnx2x: resurrect RX hashing (Joe Jin)\n- bnx2x: convert to SKB paged frag API. (Ian Campbell)\n- net: add APIs for manipulating skb page fragments. (Ian Campbell)\n- bnx2x: Use pr_fmt and message logging cleanups (Joe Jin)\n- bnx2x: Coalesce pr_cont uses and fix DP typos (Joe Perches)\n- bnx2x: Remove local defines for %pM and mac address (Joe Perches)\n- bnx2x: Clear MDIO access warning during first driver load (Yaniv Rosner)\n- bnx2x: Fix BCM578xx MAC test (Yaniv Rosner)\n- bnx2x: Fix BCM54618se invalid link indication (Yaniv Rosner)\n- bnx2x: Fix BCM84833 link (Yaniv Rosner)\n- bnx2x: Fix link issue with DAC over 578xx (Yaniv Rosner)\n- bnx2x: Fix LED behavior (Yaniv Rosner)\n- bnx2x: Fix BCM578xx-B0 MDIO access (Yaniv Rosner)\n- bnx2x: Fix remote fault handling (Yaniv Rosner)\n- bnx2x: Fix chip hanging due to TX pipe stall. (Yaniv Rosner)\n- bnx2x: Fix missing pause on for 578xx (Yaniv Rosner)\n- bnx2x: Prevent restarting Tx during bnx2x_nic_unload (Vladislav Zolotarov)\n- bnx2x: use pci_pcie_cap() (Vladislav Zolotarov)\n- bnx2x: fix bnx2x_stop_on_error flow in bnx2x_sp_rtnl_task (Vladislav\n Zolotarov)\n- bnx2x: enable internal target-read for 57712 and up only (Shmulik Ravid)\n- bnx2x: count statistic ramrods on EQ to prevent MC assert (Vladislav\n Zolotarov)\n- bnx2x: fix loopback for non 10G link (Yaniv Rosner)\n- bnx2x: dcb - send all unmapped priorities to same COS as L2 (Dmitry Kravkov)\n- bnx2x: Broken self-test in SF mode on 578xx (Vladislav Zolotarov)\n- bnx2x: Parity errors recovery for 578xx (Vladislav Zolotarov)\n- bnx2x: Read FIP mac from SHMEM in single function mode (Vladislav Zolotarov)\n- bnx2x: Fixed ethtool -d for 578xx (Vladislav Zolotarov)\n- bnx2x: disable FCoE for 578xx devices since not yet supported (Dmitry\n Kravkov)\n- bnx2x: fix memory barriers (Vladislav Zolotarov)\n- bnx2x: use BNX2X_Q_FLG_TPA_IPV6 for TPA queue configuration (Vladislav\n Zolotarov)\n- bnx2x: disable loacal BH when scheduling FCOE napi (Vladislav Zolotarov)\n- bnx2x: fix MB index for 4-port devices (Dmitry Kravkov)\n- bnx2x: DCB rework (Dmitry Kravkov)\n- bnx2x: remove unnecessary dma_sync (Vladislav Zolotarov)\n- bnx2x: stop tx before CNIC_STOP (Vladislav Zolotarov)\n- bnx2x: add missing command in error handling flow (Dmitry Kravkov)\n- bnx2x: use correct dma_sync function (Vladislav Zolotarov)\n- bnx2x: Fix compilation when CNIC is not selected in config (Dmitry Kravkov)\n- bnx2x: Multiple concurrent l2 traffic classes (Ariel Elior)\n- bnx2x: Renaming the 'reset_task' to 'sp_rtnl_task' (Ariel Elior)\n- bnx2x: Add dcbnl notification (Shmulik Ravid)\n- dcbnl: Add CEE notification (Shmulik Ravid)\n- dcbnl: Aggregated CEE GET operation (Shmulik Ravid)\n- dcb: use nlmsg_free() instead of kfree() (Dan Carpenter)\n- dcb: Add missing error check in dcb_ieee_set() (John Fastabend)\n- dcb: fix return type on dcb_setapp() (John Fastabend)\n- dcb: Add dcb_ieee_getapp_mask() for drivers to query APP settings (John\n Fastabend)\n- dcb: Add ieee_dcb_delapp() and dcb op to delete app entry (Joe Jin)\n- dcb: Add ieee_dcb_setapp() to be used for IEEE 802.1Qaz APP data (John\n Fastabend)\n- net: dcbnl, add multicast group for DCB (John Fastabend)\n- dcb: Add DCBX capabilities bitmask to the get_ieee response (John Fastabend)\n- bnx2x: Fix warning message during 57712/8727 initialization (Yaniv Rosner)\n- bnx2x: Add autogrEEEn support (Yaniv Rosner)\n- bnx2x: Fix BCM84833 initialization (Yaniv Rosner)\n- bnx2x: Fix false link indication at link partner when DAC is used (Yaniv\n Rosner)\n- bnx2x: Reset PHY due to fan failure for 578xx (Yaniv Rosner)\n- bnx2x: Add CL37 BAM for Warpcore (Yaniv Rosner)\n- bnx2x: Change BCM54616S to BCM54618SE (Yaniv Rosner)\n- bnx2x: PFC fixes (Yaniv Rosner)\n- bnx2x: remove unnecessary read of PCI_CAP_ID_EXP (Jon Mason)\n- cnic: Update VLAN ID during ISCSI_UEVENT_PATH_UPDATE (Eddie Wai)\n- cnic: set error flag when iSCSI connection fails (Jeffrey Huang)\n- cnic: Add FCoE parity error recovery (Michael Chan)\n- cnic: Improve error recovery on bnx2x devices (Michael Chan)\n- cnic: Add timeout for ramrod replies. (Michael Chan)\n- cnic, bnx2fc: Increase maximum FCoE sessions. (Michael Chan)\n- bnx2: Update driver to use new mips firmware. (Joe Jin)\n- bnx2: Add missing memory barrier in bnx2_start_xmit() (Joe Jin)\n- bnx2: Add support for ethtool --show-channels|--set-channels (Michael Chan)\n- bnx2: fix skb truesize underestimation (Eric Dumazet)\n- bnx2: dont request firmware when theres no userspace. (francois romieu)\n- tg3: Avoid panic from reserved statblk field access (Matt Carlson)\n- tg3: Use mii_advertise_flowctrl (Matt Carlson)\n- tg3: Fix advertisement handling (Joe Jin)\n- tg3: Add 57766 ASIC rev support (Matt Carlson)\n- tg3: Make the TX BD DMA limit configurable (Matt Carlson)\n- tg3: Track LP advertising (Matt Carlson)\n- tg3: Integrate flowctrl check into AN adv check (Joe Jin)\n- net: Change mii to ethtool advertisement function names (Matt Carlson)\n- net: Add ethtool to mii advertisment conversion helpers (Joe Jin)\n- tg3: fix ipv6 header length computation (Eric Dumazet)\n- tg3: Break out RSS indir table init and assignment (Matt Carlson)\n- tg3: Update version to 3.122 (Matt Carlson)\n- tg3: Return flowctrl config through ethtool (Matt Carlson)\n- tg3: Save stats across chip resets (Matt Carlson)\n- tg3: Remove ethtool stats member from dev struct (Matt Carlson)\n- tg3: Scale back code that modifies MRRS (Matt Carlson)\n- tg3: Fix TSO CAP for 5704 devs w / ASF enabled (Matt Carlson)\n- tg3: Add MDI-X reporting (Matt Carlson)\n- tg3: Restrict large prod ring cap devices (Matt Carlson)\n- tg3: Adjust BD replenish thresholds (Matt Carlson)\n- tg3: Make 1000Base-X FC resolution look like 1000T (Matt Carlson)\n- tg3: Update version to 3.121 (Matt Carlson)\n- tg3: Eliminate timer race with reset_task (Matt Carlson)\n- tg3: Schedule at most one tg3_reset_task run (Joe Jin)\n- tg3: Obtain PCI function number from device (Matt Carlson)\n- tg3: Fix irq alloc error cleanup path (Matt Carlson)\n- tg3: Fix 4k skb error recovery path (Matt Carlson)\n- tg3: Fix 4k tx bd segmentation code (Joe Jin)\n- tg3: Fix APE mutex init and use (Matt Carlson)\n- tg3: add tx_dropped counter (Joe Jin)\n- tg3: fix tigon3_dma_hwbug_workaround() (Eric Dumazet)\n- tg3: Remove unnecessary driver assignments of ethtool_ringparam fields to\n zero (Joe Jin)\n- tg3: Code movement (Matt Carlson)\n- tg3: Eliminate tg3_halt_cpu() prototype (Matt Carlson)\n- tg3: Eliminate tg3_write_sig_post_reset() prototype (Matt Carlson)\n- tg3: Eliminate tg3_stop_fw() prototype (Matt Carlson)\n- tg3: Remove tp->rx_offset term when unneeded (Matt Carlson)\n- tg3: Fix missed MSI workaround (Matt Carlson)\n- tg3: Workaround tagged status update bug (Matt Carlson)\n- tg3: Add ability to turn off 1shot MSI (Matt Carlson)\n- tg3: Check all adv bits when checking config (Matt Carlson)\n- tg3: Update version to 3.120 (Matt Carlson)\n- tg3: Add external loopback support to selftest (Matt Carlson)\n- net: add external loopback test in ethtool self test (Amit Kumar Salecha)\n- tg3: Restructure tg3_test_loopback (Matt Carlson)\n- tg3: Pull phy int lpbk setup into separate func (Matt Carlson)\n- tg3: Consilidate MAC loopback code (Matt Carlson)\n- tg3: Remove dead code (Matt Carlson)\n- tg3: Remove 5719 jumbo frames and TSO blocks (Matt Carlson)\n- tg3: Break larger frags into 4k chunks for 5719 (Matt Carlson)\n- tg3: Add tx BD budgeting code (Matt Carlson)\n- tg3: Consolidate code that calls tg3_tx_set_bd() (Matt Carlson)\n- tg3: Add partial fragment unmapping code (Matt Carlson)\n- tg3: Generalize tg3_skb_error_unmap() (Matt Carlson)\n- tg3: Remove short DMA check for 1st fragment (Matt Carlson)\n- tg3: Simplify tx bd assignments (Matt Carlson)\n- tg3: Reintroduce tg3_tx_ring_info (Matt Carlson)\n- tg3: Fix NVRAM selftest failures for 5720 devs (Matt Carlson)\n- tg3: Add more selfboot formats to NVRAM selftest (Matt Carlson)\n- tg3: Return size from tg3_vpd_readblock() (Matt Carlson)\n- tg3: Fix RSS indirection table distribution (Matt Carlson)\n- tg3: Fix link down notify failure when EEE disabled (Matt Carlson)\n- tg3: Fix link flap at 100Mbps with EEE enabled (Matt Carlson)\n- tg3: Match power source to driver state (Matt Carlson)\n- tg3: Add function status reporting (Matt Carlson)\n- tg3: Create critical section around GPIO toggling (Matt Carlson)\n- tg3: Determine PCI function number in one place (Matt Carlson)\n- tg3: Check transitions to D0 power state (Matt Carlson)\n- tg3: Create funcs for power source switching (Matt Carlson)\n- tg3: Move power state transitions to init_one (Matt Carlson)\n- tg3: Detect APE enabled devs earlier (Matt Carlson)\n- tg3: remove unnecessary read of PCI_CAP_ID_EXP (Jon Mason)\n- tg3: Migrate phy preprocessor defs to system defs (Matt Carlson)\n- tg3: Show flowctrl settings through get_settings() (Matt Carlson)\n- tg3: Remove 4G_DMA_BNDRY_BUG flag (Matt Carlson)\n- tg3: Remove 40BIT_DMA_LIMIT_BUG (Matt Carlson)\n- [SCSI] hpsa: use find_first_zero_bit (Akinobu Mita)\n- [SCSI] hpsa: combine hpsa_scsi_detect and hpsa_register_scsi (Stephen M.\n Cameron)\n- [SCSI] hpsa: removed unneeded structure member max_sg_entries and fix badly\n named constant MAXSGENTRIES (Stephen M. Cameron)\n- [SCSI] hpsa: fix per device memory leak on driver unload (Stephen M. Cameron)\n- [SCSI] hpsa: do not sleep in atomic context in rmmod path. (Stephen M.\n Cameron)\n- [SCSI] hpsa: fix flush cache transfer length (Stephen M. Cameron)\n- [SCSI] hpsa: set max sectors instead of taking the default (Stephen M.\n Cameron)\n- [SCSI] hpsa: detect controller lockup (Stephen M. Cameron)\n- [SCSI] hpsa: remove unused busy_initializing and busy_scanning (Stephen M.\n Cameron)\n- cciss: fix flush cache transfer length (Stephen M. Cameron)\n- cciss: auto engage SCSI mid layer at driver load time (Stephen M. Cameron)\n- The Windows driver .inf disables ASPM on all cciss devices. Do the same.\n (Matthew Garrett)\n- cciss: add transport mode attribute to sys (Joe Handzik)\n- cciss: Adds simple mode functionality (Joseph Handzik)\n- [SCSI] hpsa: update device attributes when they change (Scott Teel)\n- [SCSI] hpsa: improve naming on external target device functions (Scott Teel)\n- [SCSI] hpsa: eliminate 8 external target limitation (Scott Teel)\n- [SCSI] hpsa: fix potential array overflow in hpsa_update_scsi_devices (Scott\n Teel)\n- [SCSI] hpsa: rename HPSA_MAX_SCSI_DEVS_PER_HBA (Scott Teel)\n- [SCSI] hpsa: refactor hpsa_figure_bus_target_lun (Stephen M. Cameron)\n- [SCSI] hpsa: make target and lun match what SCSI REPORT LUNs returns (Stephen\n M. Cameron)\n- [SCSI] hpsa: Fix problem with MSA2xxx devices (Stephen M. Cameron)\n- [scsi] hpsa: Add IRQF_SHARED back in for the non-MSI(X) interrupt handler\n (Joe Jin)\n[2.6.39-200.13.0.el5uek]\n- drm/i915: fix integer overflow in i915_gem_do_execbuffer() (Xi Wang) [Orabug:\n 14107456] {CVE-2012-2384}\n- drm/i915: fix integer overflow in i915_gem_execbuffer2() (Xi Wang) [Orabug:\n 14107445] {CVE-2012-2383}\n[2.6.39-200.12.0.el5uek]\n- Revert 'x86, efi: Pass a minimal map to SetVirtualAddressMap()' (Maxim\n Uvarov) [Orabug: 14076004]\n- config: turn on CONFIG_HVC_XEN_FRONTEND (Maxim Uvarov) [Orabug: 14064174]\n- xen/hvc: Check HVM_PARAM_CONSOLE_[EVTCHN|PFN] for correctness. (Konrad\n Rzeszutek Wilk)\n- xen/hvc: Fix error cases around HVM_PARAM_CONSOLE_PFN (Konrad Rzeszutek Wilk)\n- xen/hvc: Collapse error logic. (Konrad Rzeszutek Wilk)\n[2.6.39-200.11.0.el5uek]\n- [dm] do not forward ioctls from logical volumes to the underlying device (Joe\n Jin) {CVE-2011-4127}\n- [block] fail SCSI passthrough ioctls on partition devices (Joe Jin)\n {CVE-2011-4127}\n- [block] add and use scsi_blk_cmd_ioctl (Joe Jin) [Orabug: 14056755]\n {CVE-2011-4127}\n[2.6.39-200.10.0.el5uek]\n- net: ipv4: relax AF_INET check in bind() (Eric Dumazet) [Orabug: 14054411]\n- xen-netback: fix the number of skb slots calculation. (Adnan Misherfi)\n- KVM: Ensure all vcpus are consistent with in-kernel irqchip settings (Avi\n Kivity) {CVE-2012-1601}\n- kabi update whitelist for OCFS (Maxim Uvarov) [Orabug: 14055758]\n[2.6.39-200.9.0.el5uek]\n- [SCSI] scsi_dh_rdac: Fix for unbalanced reference count (Moger, Babu)\n [Orabug: 14059970]\n- [SCSI] scsi_dh_rdac: Adding couple more vendor product ids (Moger, Babu)\n [Orabug: 14059970]\n- [SCSI] dh_rdac: Associate HBA and storage in rdac_controller to support\n partitions in storage (Chandra Seetharaman) [Orabug: 14059970]\n- [SCSI] dh_rdac: Use WWID from C8 page instead of Subsystem id from C4 page to\n identify storage (Chandra Seetharaman) [Orabug: 14059970]\n- kernel config: turn on sxge and sxgevf drivers (Maxim Uvarov)\n- sxge/sxgevf: add new driver (Maxim Uvarov) [Orabug: 13444150]\n- be2iscsi: adding functionality to change network settings using iscsiadm\n (root)\n- be2iscsi: Adding bsg interface for be2iscsi (root)\n- be2iscsi: Get Initiator Name for the iSCSI_Host (root)\n- be2iscsi: Return async handle of unknown opcode to free list. (root)\n- be2iscsi: Check ASYNC PDU Handle corresponds to HDR/DATA Handle (root)\n- be2iscsi:Bump the driver Version (root)\n- be2iscsi: Update in Copyright information (root)\n- be2iscsi:Fix the function return values. (root)\n- be2iscsi:Code cleanup, removing the goto statement (root)\n- be2iscsi:Fix double free of MCCQ info memory. (root)\n- be2iscsi:Set num_cpu = 1 if pci_enable_msix fails (root)\n- be2iscsi:Fix typo function name mismatch (root)\n- be2iscsi:Freeing of WRB and SGL Handle in cleanup task (root)\n- be2iscsi: WRB Initialization and Failure code path change (root)\n- be2iscsi: Fix in the Asynchronous Code Path (root)\n- be2iscsi: cleanup a min_t() call (root)\n- qlge: driver update to v1.0.0.30 (Maxim Uvarov) [Orabug: 14045380]\n- netxen: driver update to v4.0.78 (Maxim Uvarov) [Orabug: 14045367]\n- qlcnic: driver update to v5.0.28.1 (Maxim Uvarov) [Orabug: 14055720]\n[2.6.39-200.8.0.el5uek]\n- Revert 'xen-blkfront: set pages are FOREIGN_FRAME when sharing them' (Konrad\n Rzeszutek Wilk)\n[2.6.39-200.7.0.el5uek]\n- Revert 'x86/ioapic: Add register level checks to detect bogus io-apic\n entries' (Maxim Uvarov)\n- qla2xxx: Updated the driver version to 8.04.00.03.39.0-k. (Giridhar Malavali)\n- qla2xxx: Dont attach driver with function. (Giridhar Malavali)\n- qla2xxx: Proper detection of firmware abort error code for ISP82xx. (Giridhar\n Malavali)\n- qla2xxx: Fix typo in bus-reset handler. (Andrew Vasquez)\n- qla2xxx: Correct link-reset regressions introduced during 83xx porting.\n (Andrew Vasquez)\n- qla2xxx: Handle device mapping changes due to device logout. (Arun Easi)\n- qla2xxx: Avoid invalid request queue dereference for bad response packets.\n (Arun Easi)\n- qla2xxx: Stop iteration after first failure in *_id functions. (Arun Easi)\n- qla2xxx: Fix incorrect register access in qla2x00_start_iocbs(). (Arun Easi)\n- qla2xxx: Fix to update proper command completion upon command retries.\n (Andrew Vasquez)\n- qla2xxx: Hard code the number of loop entries at 128. (Chad Dupuis)\n- Revert 'qla2xxx: Return N-port id to firmware on logout.' (Giridhar Malavali)\n- qla2xxx: Reference proper scsi_qla_host structure for processing non-scsi SRB\n commands. (Giridhar Malavali)\n- qla2xxx: Fix wrong decrement, null sp access. (Arun Easi)\n- qla2xxx: Further consolidation of SRB related code changes. (Giridhar\n Malavali)\n- qla2xxx: Complete mailbox command timedout to avoid initialization failures\n during next reset cycle. (Giridhar Malavali)\n- qla2xxx: Add ha->max_fibre_devices to keep track of the maximum number of\n targets. (Chad Dupuis)\n- qla2xxx: Cache swl during fabric discovery. (Andrew Vasquez)\n- qla2xxx: Remove EDC sysfs interface. (Joe Carnuccio)\n- qla2xxx: Perform firmware dump procedure on mailbox command timeout. (Chad\n Dupuis)\n- qla2xxx: Change the log message when previous dump is available to retrieve\n for ISP82xx. (Giridhar Malavali)\n- qla2xxx: Log messages to use correct vha. (Arun Easi)\n- qla2xxx: Add new message when a new loopid is assigned. (Chad Dupuis)\n- qla2xxx: Fix ql_dbg arguments. (Arun Easi)\n- qla2xxx: Use ql_log* #defines in ql_log() and ql_log_pci(). (Chad Dupuis)\n- qla2xxx: Convert remaining printks to ql_log format. (Chad Dupuis)\n- qla2xxx: Print mailbox command opcode and return code when a command times\n out. (Chad Dupuis)\n- qla2xxx: Remove check for null fcport from host reset handler. (Michael\n Christie)\n- qla2xxx: Correct out of bounds read of ISP2200 mailbox registers. (Andrew\n Vasquez)\n- qla2xxx: Remove errant clearing of MBX_INTERRUPT flag during CT-IOCB\n processing. (Andrew Vasquez)\n- qla2xxx: Reduce mbx-command timeout for Login/Logout requests. (Andrew\n Vasquez)\n- qla2xxx: Clear options-flags while issuing stop-firmware mbx command. (Andrew\n Vasquez)\n- qla2xxx: Prep zero-length BSG data-transfer requests. (Andrew Vasquez)\n- qla2xxx: Perform implicit logout during rport tear-down. (Andrew Vasquez)\n- qla2xxx: Return N-port id to firmware on logout. (Joe Carnuccio)\n- qla2xxx: Handle failure cases during fabric_login (Chad Dupuis)\n- qla2xxx: Increase speed of flash access in ISP82xx adapters to improve\n firmware load speed. (Chad Dupuis)\n- qla2xxx: Handle change notifications based on switch scan results. (Arun\n Easi)\n- qla2xxx: Correct print format for edc ql_log() calls. (Joe Carnuccio)\n- qla2xxx: Use consistent DL mask for ELS/CT passthru requests. (Andrew\n Vasquez)\n- qla2xxx: Consolidation of SRB processing. (Giridhar Malavali)\n- qla2xxx: Use proper VPD/NVRAM regions with ISP8031 parts. (Andrew Vasquez)\n- qla2xxx: Remove ql2xfwloadbin assignment to 0. (Chad Dupuis)\n- qla2xxx: Call MPI reset for 81xx adapters only. (Andrew Vasquez)\n- qla2xxx: Driver need to do HotReset instead of FundamentalReset for ISP83XX\n (Andrew Vasquez)\n- qla2xxx: Use default semantic for firmware load. (Saurav Kashyap)\n- qla2xxx: Enhancements to support ISP83xx. (Giridhar Malavali)\n- qla2xxx: Enhanced the dump routines to capture multiple request and response\n queues. (Giridhar Malavali)\n- qla2xxx: Update the driver version to 8.03.07.13.39.0-k. (Saurav Kashyap)\n- qla2xxx: Fixed typos and misc issues. (Saurav Kashyap)\n- qla2xxx: Fix byte swapping in IPE print statement. (Chad Dupuis)\n- qla2xxx: Add an 'is reset active' helper. (Andrew Vasquez)\n- qla2xxx: Disable generating pause frames when firmware hang detected for\n ISP82xx. (Giridhar Malavali)\n- qla2xxx: Use a valid enode-mac if none defined. (Andrew Vasquez)\n- qla2xxx: Remove resetting memory during device initialization for ISP82xx.\n (Shyam Sundar)\n- qla2xxx: Propagate up abort failures. (Arun Easi)\n- qla2xxx: Add check for null fcport references in qla2xxx_queuecommand. (Chad\n Dupuis)\n- [mpt2sas] Bump driver vesion to 13.100.00.00 (Nagalakshmi Nandigama) [Orabug:\n 14040678]\n- [mpt2sas] fix NULL pointer at ioc->pfacts (Nagalakshmi Nandigama) [Orabug:\n 14040678]\n- [mpt2sas] A hard drive is going OFFLINE when there is a hard reset issued and\n simultaneously another hard drive is hot unplugged (Nagalakshmi Nandigama)\n [Orabug: 14040678]\n- [mpt2sas] Set the phy identifier of the end device to to the phy number of\n the parent device it is linked to (Nagalakshmi Nandigama) [Orabug: 14040678]\n- [mpt2sas] While enabling phy, read the current port number from sas iounit\n page 0 instead of page 1 (Nagalakshmi Nandigama) [Orabug: 14040678]\n- [mpt2sas] Fix several endian issues found by runing sparse (Nagalakshmi\n Nandigama) [Orabug: 14040678]\n- [mpt2sas] Modify the source code as per the findings reported by the source\n code analysis tool (Nagalakshmi Nandigama) [Orabug: 14040678]\n- [mpt2sas] Improvement were made to better protect the sas_device,\n raid_device, and expander_device lists (Nagalakshmi Nandigama)\n- [mpt2sas] Perform Target Reset instead of HBA reset when a SATA_PASSTHROUGH\n cmd timeout happens (Nagalakshmi Nandigama) [Orabug: 14040678]\n- [mpt2sas] Added multisegment mode support for Linux BSG Driver (Nagalakshmi\n Nandigama) [Orabug: 14040678]\n- [mpt2sas] remove the global mutex (Nagalakshmi Nandigama) [Orabug: 14040678]\n- [mpt2sas] MPI next revision header update (Nagalakshmi Nandigama) [Orabug:\n 14040678]\n- Update lpfc version for 8.3.5.68.4p driver release (Vaios Papadimitriou)\n- Fix bug with mailbox handling of REG_VFI and cable pull (CR 127762) (Vaios\n Papadimitriou)\n- Use PCI configure space read to flush PCI function reset register write to\n avoid MMIO issues (CR 128101) (Vaios Papadimitriou)\n- Fixed system panic when extents enabled with large number of small blocks (CR\n 128010) (Vaios Papadimitriou)\n- Fixed the system panic during EEH recovery (CR 127062) (Vaios Papadimitriou)\n- Fix resource leak when acc fails for received plogi (CR 127847) (Vaios\n Papadimitriou)\n- Fixed SLI4 driver module load and unload test in a loop crashes the system\n (CR 126397) (Vaios Papadimitriou)\n- Fixed missing CVL event causing round-robin FCF failover process to stop (CR\n 123367) (Vaios Papadimitriou)\n- Fix deadlock during adapter offline request (CR 127217) (Vaios Papadimitriou)\n- Fix same RPI registered multiple times after HBA reset (CR 127176) (Vaios\n Papadimitriou)\n- Fix driver handling of XRI Aborted CQE response (CR 127345) (Vaios\n Papadimitriou)\n- Fixed port and system failure in handling SLI4 FC port function reset (CR\n 126551) (Vaios Papadimitriou)\n- Fix bug with driver not sending a LOGO with vport delete (CR 126625) (Vaios\n Papadimitriou)\n- Fix for SLI4 Port delivery for BLS ABORT ACC (CR 126289) (Vaios\n Papadimitriou)\n- Fix ndlp nodelist not empty wait timeout during driver unloading (CR 127052)\n (Vaios Papadimitriou)\n- Fix mailbox and vpi memory leaks (CR 126818) (Vaios Papadimitriou)\n- Fix management communication issues by creating character device to take a\n reference on the driver (CR 126082) (Vaios Papadimitriou)\n- Fix for FDISC failures after firmware reset or link bounce (CR 126779) (Vaios\n Papadimitriou)\n- Fix for driver using duplicate RPIs after LPe16000 port reset (CR 126723)\n (Vaios Papadimitriou)\n- Fix discovery problem when in pt2pt (CR 126887) (Vaios Papadimitriou)\n- Fixed failure in handling large CQ/EQ identifiers in an IOV environment (CR\n 126856) (Vaios Papadimitriou)\n- Fix Locking code raising IRQ twice (Vaios Papadimitriou)\n- Fix driver not returning when bad ndlp found in abts error event handling (CR\n 126209) (Vaios Papadimitriou)\n- Fix bug with driver returning the wrong ndlp (CR 125743) (Vaios\n Papadimitriou)\n- Fix driver behavior when receiving an ADISC (CR 126654) (Vaios Papadimitriou)\n- Fix bug with driver processing dump command type 4 using 16Gb FC Adapter (CR\n 126406) (Vaios Papadimitriou)\n- Fix driver does not reset port when reset is needed during fw_dump (CR\n 125807) (Vaios Papadimitriou)\n- Fix ELS FDISC failing with local reject / invalid RPI (CR 126350) (Vaios\n Papadimitriou)\n- Fix SLI4 FC port internal loopback (CR 126409) (Vaios Papadimitriou)\n- Fix REG_RPI fails on SLI4 HBA putting NPort into NPR state (CR 126230) (Vaios\n Papadimitriou)\n- Fix bug with driver processing an els command using 16Gb FC Adapter (CR\n 126345) (Vaios Papadimitriou)\n- Fix NMI seen due to CQE starvation (CR 126149) (Vaios Papadimitriou)\n- Fixed SLI4 FC port obtained link type and number dependent on link connection\n (CR 126264) (Vaios Papadimitriou)\n- Fixed SLI4 FC port internal loopback without SFP and external link/loopback\n plug (CR 125843) (Vaios Papadimitriou)\n- Fix driver incorrectly building fcpCdb during scsi command prep (CR 126209)\n (Vaios Papadimitriou)\n- be2net: make be_vlan_add_vid() void (Maxim Uvarov)\n- be2net: Record receive queue index in skb to aid RPS. (Somnath Kotur)\n- be2net: Fix FW download for BE (Padmanabh Ratnakar)\n- be2net: Fix traffic stall INTx mode (Padmanabh Ratnakar)\n- be2net: fix ethtool get settings (Ajit Khaparde)\n- be2net: fix programming of VLAN tags for VF (Ajit Khaparde)\n- be2net: reset queue address after freeing (Sathya Perla)\n- be2net: fix tx completion cleanup (Sathya Perla)\n- be2net: refactor/cleanup vf configuration code (Maxim Uvarov)\n- be2net: event queue re-design (Maxim Uvarov)\n- be2net: update the driver version (Sarveshwar Bandi)\n- be2net: Fix EEH error reset before a flash dump completes (Somnath Kotur)\n- be2net: Ignore status of some ioctls during driver load (Ajit Khaparde)\n- be2net: Fix wrong status getting returned for MCC commands (Padmanabh\n Ratnakar)\n- be2net: Fix Lancer statistics (Padmanabh Ratnakar)\n- be2net: Fix ethtool self test for Lancer (Padmanabh Ratnakar)\n- be2net: Fix FW download in Lancer (Padmanabh Ratnakar)\n- be2net: Fix VLAN/multicast packet reception (Padmanabh Ratnakar)\n- be2net: Fix number of vlan slots in flex mode (Ajit Khaparde)\n- be2net: enable WOL by default if h/w supports it (Ajit Khaparde)\n- be2net: Remove unused OFFSET_IN_PAGE() macro (Roland Dreier)\n- be2net: enable RSS for ipv6 pkts (Sathya Perla)\n- be2net: Use new implementation of get mac list command (Padmanabh Ratnakar)\n- be2net: Fix link status query command (Padmanabh Ratnakar)\n- ethtool: Null-terminate filename passed to ethtool_ops::flash_device (Ben\n Hutchings)\n- be2net: add descriptions for stat counters reported via ethtool (Sathya\n Perla)\n- be2net: allocate more headroom in incoming skbs (Eric Dumazet)\n- netdev: make net_device_ops const (stephen hemminger)\n- be2net: fix be_vlan_add/rem_vid (Ajit Khaparde)\n- be2net: Fix INTx processing for Lancer (Padmanabh Ratnakar)\n- be2net: Add support for Skyhawk cards (Ajit Khaparde)\n- be2net: fix ethtool ringparam reporting (Sathya Perla)\n- be2net: workaround to fix a bug in BE (Ajit Khaparde)\n- be2net: update some counters to display via ethtool (Ajit Khaparde)\n- net: make vlan ndo_vlan_rx_[add/kill]_vid return error value (Jiri Pirko)\n- be2net: netpoll support (Ivan Vecera)\n- xen/pci: dont use PCI BIOS service for configuration space accesses (David\n Vrabel)\n- xen/Kconfig: fix Kconfig layout (Andrew Morton)\n- xen/pte: Fix crashes when trying to see non-existent PGD/PMD/PUD/PTEs (Konrad\n Rzeszutek Wilk)\n- xen/apic: Return the APIC ID (and version) for CPU 0. (Konrad Rzeszutek Wilk)\n- drivers/video/xen-fbfront.c: add missing cleanup code (Julia Lawall)\n- xen/x86: Workaround 'x86/ioapic: Add register level checks to detect bogus\n io-apic entries' (Konrad Rzeszutek Wilk)\n- xen/acpi: Workaround broken BIOSes exporting non-existing C-states. (Konrad\n Rzeszutek Wilk)\n- xen/enlighten: Disable MWAIT_LEAF so that acpi-pad wont be loaded. (Konrad\n Rzeszutek Wilk)\n- drivers/video/xen-fbfront.c: add missing cleanup code (Julia Lawall)\n- xen: correctly check for pending events when restoring irq flags (David\n Vrabel)\n- xen/smp: Fix crash when booting with ACPI hotplug CPUs. (Konrad Rzeszutek\n Wilk)\n- xen: use the pirq number to check the pirq_eoi_map (Stefano Stabellini)\n [2.6.39-200.6.0.el5uek]\n- [USB] cdc-acm: Increase number of devices to 64 (Joe Jin) [Orabug: 13693812]\n- git-changelog: generate date entry (Maxim Uvarov)\n- [scsi] hpsa: Remove some PCI IDs if for OL5. (Joe Jin)\n- [block] cciss: fix incorrect PCI IDs and add two new ones (Joe Jin)\n- [scsi] hpsa: add some older controllers to the kdump blacklist (Joe Jin)\n- [block] cciss: Add IRQF_SHARED back in for the non-MSI(X) interrupt handler\n (Joe Jin)\n- [block] cciss: add some older controllers to the kdump blacklist (Joe Jin)\n[2.6.39-200.5.0.el5uek]\n- be2net: query link status in be_open() (Sarveshwar Bandi) [Orabug: 13231]\n[2.6.39-200.4.0.el5uek]\n- Revert 'xen/p2m: m2p_find_override: use list_for_each_entry_safe' (Konrad\n Rzeszutek Wilk)\n- xen/blkback: Fix warning error. (Konrad Rzeszutek Wilk)\n- xen/blkback: Make optional features be really optional. (Konrad Rzeszutek\n Wilk)\n- xen-blkfront: module exit handling adjustments (Jan Beulich)\n- xen-blkfront: properly name all devices (Jan Beulich)\n- xen-blkfront: set pages are FOREIGN_FRAME when sharing them (Stefano\n Stabellini)\n- xen: EXPORT_SYMBOL set_phys_to_machine (Stefano Stabellini)\n- xen-blkfront: make blkif_io_lock spinlock per-device (Steven Noonan)\n- xen/blkfront: dont put bdev right after getting it (Andrew Jones)\n- xen-blkfront: use bitmap_set() and bitmap_clear() (Akinobu Mita)\n- xen/blkback: Enable blkback on HVM guests (Daniel De Graaf)\n- xen/blkback: use grant-table.c hypercall wrappers (Daniel De Graaf)\n- xen/p2m: m2p_find_override: use list_for_each_entry_safe (Stefano Stabellini)\n- xen/gntdev: do not set VM_PFNMAP (Stefano Stabellini)\n- xen/grant-table: add error-handling code on failure of gnttab_resume (Julia\n Lawall)\n- xen: only check xen_platform_pci_unplug if hvm (Igor Mammedov)\n- xen: initialize platform-pci even if xen_emul_unplug=never (Igor Mammedov)\n- xen kconfig: relax INPUT_XEN_KBDDEV_FRONTEND deps (Andrew Jones)\n- xen: support pirq_eoi_map (Stefano Stabellini)\n- xen/smp: Remove unnecessary call to smp_processor_id() (Srivatsa S. Bhat)\n- xen/smp: Fix bringup bug in AP code. (Konrad Rzeszutek Wilk)\n- xen/tmem: cleanup (Jan Beulich)\n- xen: constify all instances of 'struct attribute_group' (Jan Beulich)\n- xen/xenbus: ignore console/0 (Stefano Stabellini)\n- hvc_xen: introduce HVC_XEN_FRONTEND (Stefano Stabellini)\n- hvc_xen: implement multiconsole support (Stefano Stabellini)\n- hvc_xen: support PV on HVM consoles (Stefano Stabellini)\n- xen: use this_cpu_xxx replace percpu_xxx funcs (Alex Shi)\n- xenbus: dont free other end details too early (Jan Beulich)\n- xen/resume: Fix compile warnings. (Konrad Rzeszutek Wilk)\n- xen/xenbus: Add quirk to deal with misconfigured backends. (Konrad Rzeszutek\n Wilk)\n- xenbus: address compiler warnings (Jan Beulich)\n- xen/pcifront: avoid pci_frontend_enable_msix() falsely returning success (Jan\n Beulich)\n- xen/pciback: fix XEN_PCI_OP_enable_msix result (Jan Beulich)\n- xen/pciback: Support pci_reset_function, aka FLR or D3 support. (Konrad\n Rzeszutek Wilk)\n- PCI: Introduce __pci_reset_function_locked to be used when holding\n device_lock. (Konrad Rzeszutek Wilk)\n- xen/acpi: Fix Kconfig dependency on CPU_FREQ (Konrad Rzeszutek Wilk)\n- xen/acpi-processor: Do not depend on CPU frequency scaling drivers. (Konrad\n Rzeszutek Wilk)\n- xen/cpufreq: Disable the cpu frequency scaling drivers from loading. (Konrad\n Rzeszutek Wilk)\n- provide disable_cpufreq() function to disable the API. (Konrad Rzeszutek\n Wilk)\n- xen-netback: make ops structs const (stephen hemminger)\n- netback: fix typo in comment (Wei Liu)\n- netback: remove redundant assignment (Wei Liu)\n- netback: Fix alert message. (Wei Liu)\n- xen-netback: use correct index for invalidation in xen_netbk_tx_check_gop()\n (Jan Beulich)\n- net: xen-netback: correctly restart Tx after a VM restore/migrate (David\n Vrabel)\n- xen/netback: Add module alias for autoloading (Bastian Blank)\n[2.6.39-200.3.0.el5uek]\n- loop: loop_thread needs to set the PF_LESS_THROTTLE flag (Dave Kleikamp)\n- iov_iter: missing assignment of ii_bvec_ops.ii_shorten (Dave Kleikamp)\n[2.6.39-200.2.0.el5uek]\n- regset: Return -EFAULT, not -EIO, on host-side memory fault (H. Peter Anvin)\n {CVE-2012-1097}\n- regset: Prevent null pointer reference on readonly regsets (H. Peter Anvin)\n {CVE-2012-1097}\n- cifs: fix dentry refcount leak when opening a FIFO on lookup (Jeff Layton)\n {CVE-2012-1090}\n- git-changelog: add brackets around cve (Maxim Uvarov)\n- git-changelog: parse Oracle bug (Maxim Uvarov)\n- NFSv4: Save the owner/group name string when doing open (Trond Myklebust)\n [Oracle bug: 13842440 (from 13459986)]\n- ext4: flush any pending end_io requests before DIO reads w/dioread_nolock\n (Jiaying Zhang)\n- NFSv4: Return the delegation if the server returns NFS4ERR_OPENMODE (Trond\n Myklebust)\n- NFS: Properly handle the case where the delegation is revoked (Trond\n Myklebust)\n- nfsd: dont allow zero length strings in cache_parse() (Dan Carpenter)\n- x86, tls: Off by one limit check (Dan Carpenter)\n- x86, tsc: Skip refined tsc calibration on systems with reliable TSC (Alok\n Kataria)\n- lockd: fix arg parsing for grace_period and timeout. (NeilBrown)\n- xfrm: Access the replay notify functions via the registered callbacks\n (Steffen Klassert)\n- Remove printk from rds_sendmsg (Dave Jones)\n- net: fix napi_reuse_skb() skb reserve (Eric Dumazet)\n- net: fix a potential rcu_read_lock() imbalance in rt6_fill_node() (Eric\n Dumazet)\n- Fix pppol2tp getsockname() (Benjamin LaHaise)\n- slub: Do not hold slub_lock when calling sysfs_slab_add() (Christoph Lameter)\n- xfs: Fix oops on IO error during xlog_recover_process_iunlinks() (Jan Kara)\n- dm exception store: fix init error path (Andrei Warkentin)\n- dm crypt: add missing error handling (Mikulas Patocka)\n- dm crypt: fix mempool deadlock (Mikulas Patocka)\n- vfs: fix d_ancestor() case in d_materialize_unique (Michel Lespinasse)\n- udf: Fix deadlock in udf_release_file() (Jan Kara)\n- ext4: check for zero length extent (Theodore Tso)\n- ext4: ignore EXT4_INODE_JOURNAL_DATA flag with delalloc (Lukas Czerner)\n- jbd2: clear BH_Delay & BH_Unwritten in journal_unmap_buffer (Eric Sandeen)\n- e1000e: Avoid wrong check on TX hang (Jeff Kirsher)\n- hwmon: (fam15h_power) Correct sign extension of running_avg_capture (Andreas\n Herrmann)\n- proc-ns: use d_set_d_op() API to set dentry ops in proc_ns_instantiate().\n (Pravin B Shelar)\n- x86-32: Fix endless loop when processing signals for kernel tasks (Dmitry\n Adamushko)\n- usbnet: dont clear urb->dev in tx_complete (tom.leiming)\n- SUNRPC: We must not use list_for_each_entry_safe() in rpc_wake_up() (Trond\n Myklebust)\n- cifs: fix issue mounting of DFS ROOT when redirecting from one domain\n controller to the next (Jeff Layton)\n- xfs: fix inode lookup race (Dave Chinner)\n- firewire: ohci: fix too-early completion of IR multichannel buffers (Clemens\n Ladisch)\n- pata_legacy: correctly mask recovery field for HT6560B (Sergei Shtylyov)\n- target: Fix 16-bit target ports for SET TARGET PORT GROUPS emulation (Roland\n Dreier)\n- target: Dont set WBUS16 or SYNC bits in INQUIRY response (Roland Dreier)\n- md/raid1,raid10: avoid deadlock during resync/recovery. (NeilBrown)\n- md/bitmap: ensure to load bitmap when creating via sysfs. (NeilBrown)\n- tcm_fc: Fix fc_exch memory leak in ft_send_resp_status (Nicholas Bellinger)\n- hugetlbfs: avoid taking i_mutex from hugetlbfs_read() (Aneesh Kumar K.V)\n- bootmem/sparsemem: remove limit constraint in alloc_bootmem_section (Nishanth\n Aravamudan)\n- mm: thp: fix pmd_bad() triggering in code paths holding mmap_sem read mode\n (Andrea Arcangeli) {CVE-2012-1179}\n- x86/ioapic: Add register level checks to detect bogus io-apic entries (Suresh\n Siddha)\n- rtc: Disable the alarm in the hardware (v2) (Rabin Vincent)\n- genirq: Fix incorrect check for forced IRQ thread handler (Alexander Gordeev)\n- genirq: Fix long-term regression in genirq irq_set_irq_type() handling\n (Russell King)\n- uevent: send events in correct order according to seqnum (v3) (Andrew Vagin)\n- ntp: Fix integer overflow when setting time (Sasha Levin)\n- math: Introduce div64_long (Sasha Levin)\n- sysfs: Fix memory leak in sysfs_sd_setsecdata(). (Masami Ichikawa)\n- futex: Cover all PI opcodes with cmpxchg enabled check (Thomas Gleixner)\n- usb: musb: Reselect index reg in interrupt context (Supriya Karanth)\n- USB: ftdi_sio: fix problem when the manufacture is a NULL string (Greg Kroah-\n Hartman)\n[2.6.39-200.0.15.el5uek]\n- directio: account for extra page IOs for unaligned request (Dave Kleikamp) \n [Orabug: 13916031]\n[2.6.39-200.0.14.el5uek]\n- update kabi (Maxim Uvarov)\n- adjust kernel configs (Maxim Uvarov)\n- usb: fix number of mapped SG DMA entries (Clemens Ladisch)\n- svcrpc: destroy server sockets all at once (J. Bruce Fields)\n- PCI: Rework ASPM disable code (Matthew Garrett)\n- net: fix NULL dereferences in check_peer_redir() (Eric Dumazet)\n- lib: proportion: lower PROP_MAX_SHIFT to 32 on 64-bit kernel (Wu Fengguang)\n- writeback: fix dereferencing NULL bdi->dev on trace_writeback_queue (Wu\n Fengguang)\n- net: Make qdisc_skb_cb upper size bound explicit. (David S. Miller)\n- ipv4: Save nexthop address of LSRR/SSRR option to IPCB. (Maxim Uvarov)\n- compat: use sys_sendfile64() implementation for sendfile syscall (Chris\n Metcalf)\n- ext4: implement ext4_file_write_iter (Dave Kleikamp)\n[2.6.39-200.0.13.el5uek]\n- fix git merge: vlan: allow nested vlan_do_receive() (Maxim Uvarov)\n- SPEC: update and turn on kabi (Maxim Uvarov)\n[2.6.39-200.0.12.el5uek]\n- remove unused mutex hpidebuglock (Maxim Uvarov)\n- add hxge-1.3.3 driver (Maxim Uvarov)\n[2.6.39-200.0.11.el5uek]\n- vlan: allow nested vlan_do_receive() (Maxim Uvarov)\n- net: allow vlan traffic to be received under bond (John Fastabend)\n- net: vlan: goto another_round instead of calling __netif_receive_skb (Jiri\n Pirko)\n[2.6.39-200.0.10.el5uek]\n- ocfs2/cluster: Fix output in file elapsed_time_in_ms (Sunil Mushran)\n[2.6.39-200.0.9.el5uek]\n- Revert 'loop: increase default number of loop devices to 512' (Maxim Uvarov)\n- Revert 'loop: set default number of loop devices to 200' (Maxim Uvarov)\n- ocfs2/dlm: dlmlock_remote() needs to account for remastery (Sunil Mushran)\n- ocfs2/dlm: Take inflight reference count for remotely mastered resources too\n (Maxim Uvarov)\n- ocfs2/dlm: Clean up refmap helpers (Maxim Uvarov)\n- ocfs2/dlm: Cleanup dlm_wait_for_node_death() and dlm_wait_for_node_recovery()\n (Sunil Mushran)\n- ocfs2/dlm: Cleanup up dlm_finish_local_lockres_recovery() (Sunil Mushran)\n- ocfs2/dlm: Trace insert/remove of resource to/from hash (Sunil Mushran)\n- ocfs2/dlm: Clean up messages in o2dlm (Sunil Mushran)\n- ocfs2/cluster: Cluster up now includes network connections too (Sunil\n Mushran)\n- ocfs2/cluster: Clean up messages in o2net (Sunil Mushran)\n- ocfs2/cluster: Abort heartbeat start on hard-ro devices (Sunil Mushran)\n[2.6.39-200.0.8.el5uek]\n- loop: set default number of loop devices to 200 (Maxim Uvarov)\n- SPEC OL5: fix xen support (Maxim Uvarov)\n[2.6.39-200.0.6.el5uek]\n- ocfs2: Rollback commit ea455f8ab68338ba69f5d3362b342c115bea8e13 (Sunil\n Mushran) [orabug: 13555276]\n- ocfs2: Rollback commit f7b1aa69be138ad9d7d3f31fa56f4c9407f56b6a (Sunil\n Mushran) [orabug: 13555276]\n- ocfs2: Rollback commit 5fd131893793567c361ae64cbeb28a2a753bbe35 (Sunil\n Mushran) [orabug: 13555276]\n- ocfs2/cluster: Fix o2net_fill_node_map() (Sunil Mushran)\n- ocfs2/cluster: Add new function o2net_fill_node_map() (Sunil Mushran)\n- ocfs2: Tighten free bit calculation in the global bitmap (Sunil Mushran)\n- ocfs2/trivial: Limit unaligned aio+dio write messages to once per day (Sunil\n Mushran)\n- btrfs: btrfs_direct_IO_bvec() needs to check for sector alignment (Dave\n Kleikamp)\n- loop: increase default number of loop devices to 512 (Dave Kleikamp)\n- xen/merge error: Re-introduce xen-platform-pci driver. (Konrad Rzeszutek\n Wilk)\n- x86/PCI: reduce severity of host bridge window conflict warnings (Bjorn\n Helgaas)\n- xen/acpi: Remove the WARNs as they just create noise. (Konrad Rzeszutek\n Wilk)\n[2.6.39-200.0.5.el5uek]\n- btrfs: create btrfs_file_write_iter() (Dave Kleikamp)\n[2.6.39-200.0.4.el5uek]\n- ocfs2/trivial: Print message indicating unaligned aio+dio write (Sunil\n Mushran)\n- ocfs2: Avoid livelock in ocfs2_readpage() (Jan Kara)\n- ocfs2: serialize unaligned aio (Mark Fasheh)\n- ocfs2: null deref on allocation error (Dan Carpenter)\n- ocfs2: Bugfix for hard readonly mount (Tiger Yang)\n[2.6.39-200.0.3.el5uek]\n- xen/blkback: Disable DISCARD support for loopback device (but leave for phy).\n (Konrad Rzeszutek Wilk)\n- block: fix patch import error in max_discard_sectors check (Jens Axboe)\n- block: eliminate potential for infinite loop in blkdev_issue_discard (Mike\n Snitzer)\n- config: Use the xen-acpi-processor instead of the cpufreq-xen driver. (Konrad\n Rzeszutek Wilk)\n- xen/acpi-processor: C and P-state driver that uploads said data to\n hypervisor. (Konrad Rzeszutek Wilk)\n- Revert 'Merge branch 'stable/cpufreq-xen.v6.rebased' into uek2-merge' (Konrad\n Rzeszutek Wilk)\n[2.6.39-200.0.2.el5uek]\n- xen: make page table walk hugepages aware (Dave McCracken) [Orabug: 13719997]\n- x86/PCI: Preserve existing pci=bfsort whitelist for Dell systems (Narendra_K)\n[2.6.39-200.0.1.el5uek]\n- disable kabicheck for uek2 update 1 beta\n- nfs: only dirty user pages in direct read code (Dave Kleikamp)\n- config: Enable Xens PV USB, SCSI, MCE and Xen CPU freq driver (Konrad\n Rzeszutek Wilk)\n- [CPUFREQ] xen: governor for Xen hypervisor frequency scaling. (Konrad\n Rzeszutek Wilk)\n- xen/enlighten: Expose MWAIT and MWAIT_LEAF if hypervisor OKs it. (Konrad\n Rzeszutek Wilk)\n- Revert 'Merge branch 'stable/processor-passthru.v5.rebased' into uek2-merge'\n (Konrad Rzeszutek Wilk)\n- xen/processor-passthru: threads arent suppose to leave on their own. (Konrad\n Rzeszutek Wilk)\n- config: Enable Xens PV USB, SCSI, MCE and Processor-Passthru (Konrad\n Rzeszutek Wilk)\n- Xen: Export host physical CPU information to dom0 (Liu Jinsong)\n- xen/mce: Change the machine check point (Liu Jinsong)\n- Add mcelog support from xen platform (Liu Jinsong)\n- usb: xen pvusb driver (Nathanael Rensen)\n- xen/processor-passthru: Provide an driver that passes struct acpi_processor\n data to the hypervisor. (Konrad Rzeszutek Wilk)\n- xen/enlighten: Expose MWAIT and MWAIT_LEAF if hypervisor OKs it. (Konrad\n Rzeszutek Wilk)\n- xen/setup/pm/acpi: Remove the call to boot_option_idle_override. (Konrad\n Rzeszutek Wilk)\n- xen/acpi: Domain0 acpi parser related platform hypercall (Yu Ke)\n- xen/pm_idle: Make pm_idle be default_idle under Xen. (Konrad Rzeszutek Wilk)\n- cpuidle: stop depending on pm_idle (Len Brown)\n- cpuidle: replace xen access to x86 pm_idle and default_idle (Len Brown)\n- cpuidle: create bootparam 'cpuidle.off=1' (Len Brown)\n- Revert 'Merge branch 'stable/acpi-cpufreq.v3.rebased' into uek2-merge'\n (Konrad Rzeszutek Wilk)\n- x86/microcode: check proper return code. (Ben Guthro)\n- xen: add CPU microcode update driver (Jeremy Fitzhardinge)\n- xen: add dom0_op hypercall (Jeremy Fitzhardinge)\n- xen/acpi: Domain0 acpi parser related platform hypercall (Yu Ke)\n- nfs: add support for read_iter, write_iter (Dave Kleikamp)\n- xenbus_dev: add missing error check to watch handling (Jan Beulich)\n- xen/pci[front|back]: Use %d instead of %1x for displaying PCI devfn. (Konrad\n Rzeszutek Wilk)\n- xen pvhvm: do not remap pirqs onto evtchns if !xen_have_vector_callback\n (Stefano Stabellini)\n- xen/smp: Fix CPU online/offline bug triggering a BUG: scheduling while\n atomic. (Konrad Rzeszutek Wilk)\n- xen/bootup: During bootup suppress XENBUS: Unable to read cpu state (Konrad\n Rzeszutek Wilk)\n- Merge conflict resolved. Somehow the letter 's' slipped in the Makefile. This\n fixes the compile issues. (Konrad Rzeszutek Wilk)\n- xen/events: BUG() when we cant allocate our event->irq array. (Konrad\n Rzeszutek Wilk)\n- xen/granttable: Disable grant v2 for HVM domains. (Konrad Rzeszutek Wilk)\n- xen-blkfront: Use kcalloc instead of kzalloc to allocate array (Thomas Meyer)\n- xen/pciback: Expand the warning message to include domain id. (Konrad\n Rzeszutek Wilk)\n- xen/pciback: Fix 'device has been assigned to X domain!' warning (Konrad\n Rzeszutek Wilk)\n- xen/xenbus: dont reimplement kvasprintf via a fixed size buffer (Ian\n Campbell)\n- xenbus: maximum buffer size is XENSTORE_PAYLOAD_MAX (Ian Campbell)\n- xen/xenbus: Reject replies with payload > XENSTORE_PAYLOAD_MAX. (Ian\n Campbell)\n- Xen: consolidate and simplify struct xenbus_driver instantiation (Jan\n Beulich)\n- xen-gntalloc: introduce missing kfree (Julia Lawall)\n- xen/xenbus: Fix compile error - missing header for xen_initial_domain()\n (Konrad Rzeszutek Wilk)\n- xen/netback: Enable netback on HVM guests (Daniel De Graaf)\n- xen/grant-table: Support mappings required by blkback (Daniel De Graaf)\n- xenbus: Use grant-table wrapper functions (Daniel De Graaf)\n- xenbus: Support HVM backends (Daniel De Graaf)\n- xen/xenbus-frontend: Fix compile error with randconfig (Konrad Rzeszutek\n Wilk)\n- xen/xenbus-frontend: Make error message more clear (Bastian Blank)\n- xen/privcmd: Remove unused support for arch specific privcmp mmap (Bastian\n Blank)\n- xen: Add xenbus_backend device (Bastian Blank)\n- xen: Add xenbus device driver (Bastian Blank)\n- xen: Add privcmd device driver (Bastian Blank)\n- xen/gntalloc: fix reference counts on multi-page mappings (Daniel De Graaf)\n- xen/gntalloc: release grant references on page free (Daniel De Graaf)\n- xen/events: prevent calling evtchn_get on invalid channels (Daniel De Graaf)\n- xen/granttable: Support transitive grants (Annie Li)\n- xen/granttable: Support sub-page grants (Annie Li)\n- xen/granttable: Improve comments for function pointers (Annie Li)\n- xen/ia64: fix build breakage because of conflicting u64 guest handles (Tony\n Luck)\n- xen/granttable: Keep code format clean (Annie Li)\n- xen/granttable: Grant tables V2 implementation (Annie Li)\n- xen/granttable: Refactor some code (Annie Li)\n- xen/granttable: Introducing grant table V2 stucture (Annie Li)\n- Xen: update MAINTAINER info (Jeremy Fitzhardinge)\n- xen/event: Add reference counting to event channels (Daniel De Graaf)\n- xen/gnt{dev,alloc}: reserve event channels for notify (Daniel De Graaf)\n- xen/gntalloc: Change gref_lock to a mutex (Daniel De Graaf)\n- xen: document backend sysfs files (David Vrabel)\n- xen: document balloon driver sysfs files (David Vrabel)\n- btrfs: add support for read_iter, write_iter, and direct_IO_bvec (Dave\n Kleikamp)\n- ext4: add support for read_iter, write_iter, and direct_IO_bvec (Dave\n Kleikamp)\n- ocfs2: add support for read_iter, write_iter, and direct_IO_bvec (Dave\n Kleikamp)\n- ext3: add support for .read_iter and .write_iter (Dave Kleikamp)\n- bio: add bvec_length(), like iov_length() (Dave Kleikamp)\n- aio: add aio support for iov_iter arguments (Zach Brown)\n- aio: add aio_kernel_() interface (Dave Kleikamp)\n- fs: pull iov_iter use higher up the stack (Dave Kleikamp)\n- dio: add __blockdev_direct_IO_bdev() (Dave Kleikamp)\n- dio: add dio_post_submission() helper function (Dave Kleikamp)\n- dio: add dio_lock_and_flush() helper (Dave Kleikamp)\n- dio: add sdio_init() helper function (Dave Kleikamp)\n- dio: add dio_alloc_init() helper function (Dave Kleikamp)\n- dio: create a dio_aligned() helper function (Zach Brown)\n- iov_iter: let callers extract iovecs and bio_vecs (Zach Brown)\n- iov_iter: add a shorten call (Zach Brown)\n- iov_iter: add bvec support (Zach Brown)\n- iov_iter: hide iovec details behind ops function pointers (Zach Brown)\n- fuse: convert fuse to use iov_iter_copy_[to|from]_user (Dave Kleikamp)\n- iov_iter: add copy_to_user support (Zach Brown)\n- iov_iter: move into its own file (Zach Brown)\n- xen/scsi[front|back]: consolidate and simplify struct xenbus_driver\n instantiation (Konrad Rzeszutek Wilk)\n- xen/scsiback: allow RESERVE/RELEASE commands (James Harper)\n- xen/scsiback: vscsi >2TB patch (Samuel Kvasnica)\n- xen-scsi[front|back]: Fix warnings and bugs. (Konrad Rzeszutek Wilk)\n- xen/scsi[front|back]: Forgot .owner attribute. (Konrad Rzeszutek Wilk)\n- xen/scsi[front|back]: Initial commit from Novell SLES11SP1 2.6.32 tree.\n (Konrad Rzeszutek Wilk)\n- xen/pci:use hypercall PHYSDEVOP_restore_msi_ext to restore MSI/MSI-X vectors\n (Liang Tang)\n- xen/acpi/sleep: Register to the acpi_suspend_lowlevel a callback. (Konrad\n Rzeszutek Wilk)\n- xen/acpi/sleep: Enable ACPI sleep via the __acpi_override_sleep (Konrad\n Rzeszutek Wilk)\n- xen/acpi: Domain0 acpi parser related platform hypercall (Yu Ke)\n- xen: Utilize the restore_msi_irqs hook. (Konrad Rzeszutek Wilk)\n- x86/acpi/sleep: Provide registration for acpi_suspend_lowlevel. (Liang Tang)\n- x86, acpi, tboot: Have a ACPI sleep override instead of calling tboot_sleep.\n (Konrad Rzeszutek Wilk)\n- x86: Expand the x86_msi_ops to have a restore MSIs. (Konrad Rzeszutek Wilk)", "edition": 72, "modified": "2012-06-28T00:00:00", "published": "2012-06-28T00:00:00", "id": "ELSA-2012-2022", "href": "http://linux.oracle.com/errata/ELSA-2012-2022.html", "title": "Unbreakable Enterprise kernel security and bugfix update", "type": "oraclelinux", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:39:18", "bulletinFamily": "unix", "cvelist": ["CVE-2011-0521", "CVE-2010-4346", "CVE-2011-1746", "CVE-2011-0695", "CVE-2011-1078", "CVE-2011-1494", "CVE-2010-4649", "CVE-2011-1776", "CVE-2011-1576", "CVE-2011-1573", "CVE-2010-4251", "CVE-2011-1780", "CVE-2010-4526", "CVE-2011-1166", "CVE-2011-0711", "CVE-2011-0710", "CVE-2011-2022", "CVE-2011-1079", "CVE-2011-1044", "CVE-2011-1495", "CVE-2010-4249", "CVE-2011-1093", "CVE-2011-1010", "CVE-2011-1593", "CVE-2011-1170", "CVE-2011-1936", "CVE-2011-1172", "CVE-2011-1171", "CVE-2011-2213", "CVE-2011-2689", "CVE-2011-0726", "CVE-2011-1745", "CVE-2011-1182", "CVE-2011-1090", "CVE-2011-1763", "CVE-2011-2525", "CVE-2011-1080", "CVE-2010-4655", "CVE-2011-1577"], "description": "[2.6.18-274.el5]\n- [xen] svm: fix invlpg emulator regression (Paolo Bonzini) [719894]\n[2.6.18-273.el5]\n- Revert: [fs] proc: Fix rmmod/read/write races in /proc entries (Jarod Wilson) [717068]\n- [xen] disregard trailing bytes in an invalid page (Paolo Bonzini) [717742]\n- [xen] prep __get_instruction_length_from_list for partial buffers (Paolo Bonzini) [717742]\n- [xen] remove unused argument to __get_instruction_length (Paolo Bonzini) [717742]\n- [xen] let __get_instruction_length always read into own buffer (Paolo Bonzini) [717742]\n[2.6.18-272.el5]\n- [xen] x86: spinlock support for up to 255 CPUs (Laszlo Ersek) [713123]\n- [xen] remove block scope mtrr identifiers shadowing file scope (Laszlo Ersek) [713123]\n- [xen] Actually hold back MTRR init while booting secondary CPUs (Laszlo Ersek) [713123]\n- [xen] remove unused mtrr_bp_restore (Laszlo Ersek) [713123]\n- [xen] x86: Fix crash on amd iommu systems (Igor Mammedov) [714275]\n[2.6.18-271.el5]\n- [net] igmp: ip_mc_clear_src only when we no users of ip_mc_list (Veaceslav Falico) [707179]\n- [scsi] cxgb3i: fix programing of dma page sizes (Neil Horman) [710498]\n- [xen] hvm: secure vmx cpuid (Andrew Jones) [706325] {CVE-2011-1936}\n- [xen] hvm: secure svm_cr_access (Andrew Jones) [703716] {CVE-2011-1780}\n- [xen] hvm: svm support cleanups (Andrew Jones) [703716] {CVE-2011-1780}\n[2.6.18-270.el5]\n- [fs] proc: fix compile warning in pdeaux addition (Jarod Wilson) [675781]\n- [net] bluetooth: l2cap and rfcomm: fix info leak to userspace (Thomas Graf) [703021]\n- [net] inet_diag: fix inet_diag_bc_audit data validation (Thomas Graf) [714539] {CVE-2011-2213}\n- [misc] signal: fix kill signal spoofing issue (Oleg Nesterov) [690031] {CVE-2011-1182}\n- [fs] proc: fix signedness issue in next_pidmap (Oleg Nesterov) [697827] {CVE-2011-1593}\n- [char] agp: fix OOM and buffer overflow (Jerome Marchand) [699010] {CVE-2011-1746}\n- [char] agp: fix arbitrary kernel memory writes (Jerome Marchand) [699006] {CVE-2011-1745 CVE-2011-2022}\n- [net] be2net: fix queue creation order and pci error recovery (Ivan Vecera) [711653]\n- [infiniband] core: Handle large number of entries in poll CQ (Jay Fenlason) [668371] {CVE-2010-4649 CVE-2011-1044}\n- [infiniband] core: fix panic in ib_cm:cm_work_handler (Jay Fenlason) [679996] {CVE-2011-0695}\n- [fs] validate size of EFI GUID partition entries (Anton Arapov) [703026] {CVE-2011-1776}\n[2.6.18-269.el5]\n- [mm] only throttle page dirtying for specially marked BDIs (Jeff Layton) [711450]\n- Revert: [base] Fix potential deadlock in driver core (Don Zickus) [703084]\n- [fs] proc: Fix rmmod/read/write races in /proc entries (David Howells) [675781]\n- [scsi] qla4xxx: Update driver version to V5.02.04.01.05.07-d0 (Chad Dupuis) [704153]\n- [scsi] qla4xxx: clear SCSI COMPLETION INTR bit during F/W init (Chad Dupuis) [704153]\n- [usb] wacom: add support for DTU-2231 (Aristeu Rozanski) [683549]\n- [xen] fix MAX_EVTCHNS definition (Laszlo Ersek) [701243] {CVE-2011-1763}\n[2.6.18-268.el5]\n- [net] sctp: fix calc of INIT/INIT-ACK chunk length to set (Thomas Graf) [695385] {CVE-2011-1573}\n- [scsi] ibmvfc: Fix Virtual I/O failover hang (Steve Best) [710477]\n- [kernel] irq: Note and disable spurious interrupts on kexec (Prarit Bhargava) [611407]\n- [net] bnx2x: Update firmware to 6.2.9 (Michal Schmidt) [711079]\n- [net] bnx2x: Update bnx2x_firmware.h to version 6.2.9 (Michal Schmidt) [711079]\n- [net] xt_hashlimit: fix race between htable_destroy and htable_gc (Jiri Pirko) [705905]\n- [fs] cifs: clear write bits if ATTR_READONLY is set (Justin Payne) [700263]\n- [net] bna: clear some statistics before filling them (Ivan Vecera) [711990]\n- [net] ixgbe: Disable RSC by default (Herbert Xu) [703416]\n- [scsi] isci: fix scattergather list handling for smp commands (David Milburn) [710584]\n- [net] netconsole: prevent setup netconsole on a slave device (Amerigo Wang) [698873]\n[2.6.18-267.el5]\n- [fs] xfs: prevent leaking uninit stack memory in FSGEOMETRY_V1 p2 (Phillip Lougher) [677266] {CVE-2011-0711}\n- [fs] xfs: prevent leaking uninit stack memory in FSGEOMETRY_V1 (Phillip Lougher) [677266] {CVE-2011-0711}\n- [net] core: Fix memory leak/corruption on VLAN GRO_DROP (Herbert Xu) [691565] {CVE-2011-1576}\n[2.6.18-266.el5]\n- [scsi] megaraid: update to driver version 5.38-rh1 (Tomas Henzl) [706244]\n- [block] cciss: fix mapping of config table (Tomas Henzl) [695493]\n- [block] cciss: fix dev_info null pointer deref after freeing h (Tomas Henzl) [695493]\n- [block] cciss: do not call request_irq with spinlocks held (Tomas Henzl) [695493]\n- [block] cciss: prototype cciss_sent_reset to fix error (Tomas Henzl) [695493]\n- [block] cciss: mark functions as dev_init to clean up warnings (Tomas Henzl) [695493]\n- [block] cciss: timeout if soft reset fails (Tomas Henzl) [695493]\n- [block] cciss: use cmd_alloc for kdump (Tomas Henzl) [695493]\n- [block] cciss: Use cciss not hpsa in init_driver_version (Tomas Henzl) [695493]\n- [block] cciss: reduce stack usage a reset verifying code (Tomas Henzl) [695493]\n- [block] cciss: do not store pci state on stack (Tomas Henzl) [695493]\n- [block] cciss: no PCI power management reset method if known bad (Tomas Henzl) [695493]\n- [block] cciss: increase timeouts for post-reset no-ops (Tomas Henzl) [695493]\n- [block] cciss: remove superfluous sleeps around reset code (Tomas Henzl) [695493]\n- [block] cciss: do soft reset if hard reset is broken (Tomas Henzl) [695493]\n- [block] cciss: flush writes in interrupt mask setting code (Tomas Henzl) [695493]\n- [block] cciss: clarify messages around reset behavior (Tomas Henzl) [695493]\n- [block] cciss: increase time to wait for board reset to start (Tomas Henzl) [695493]\n- [block] cciss: get rid of message related magic numbers (Tomas Henzl) [695493]\n- [block] cciss: factor out irq request code (Tomas Henzl) [695493]\n- [block] cciss: factor out scatterlist allocation functions (Tomas Henzl) [695493]\n- [block] cciss: factor out command pool allocation functions (Tomas Henzl) [695493]\n- [block] cciss: Define print_cmd even without tape support (Tomas Henzl) [695493]\n- [block] cciss: do not use bit 2 doorbell reset (Tomas Henzl) [695493]\n- [block] cciss: use new doorbell-bit-5 reset method (Tomas Henzl) [695493]\n- [block] cciss: improve controller reset failure detection (Tomas Henzl) [695493]\n- [block] cciss: wait longer after resetting controller (Tomas Henzl) [695493]\n- [infiniband] cxgb4: Use completion objects for event blocking (Steve Best) [708081]\n- [fs] ext4: fix quota deadlock (Eric Sandeen) [702197]\n- [fs] ext3, ext4: update ctime when changing permission by setfacl (Eric Sandeen) [709224]\n- [scsi] bfa: properly reinitialize adapter during kdump (Rob Evers) [710300]\n- [scsi] lpfc: Update for 8.2.0.96.2p release (Rob Evers) [707336]\n- [scsi] lpfc: Fix back to back Flogis sent without logo (Rob Evers) [707336]\n- [scsi] lpfc: Fix not updating wwnn and wwpn after name change (Rob Evers) [707336]\n- [scsi] lpfc: Fix CT command never completing on Big Endian host (Rob Evers) [707336]\n- [scsi] lpfc: Revert fix that introduced a race condition (Rob Evers) [707336]\n- [scsi] lpfc: Fix crash in rpi clean when driver load fails (Rob Evers) [707336]\n- [scsi] lpfc: fix limiting RPI Count to a minimum of 64 (Rob Evers) [707336]\n- [scsi] lpfc: fix overriding CT field for SLI4 IF type 2 (Rob Evers) [707336]\n- [scsi] lpfc: force retry in queuecommand when port transitioning (Rob Evers) [707336]\n- [scsi] lpfc: Update version for 8.2.0.96.1p release (Rob Evers) [698432]\n- [scsi] lpfc: Fix double byte swap on received RRQ (Rob Evers) [698432]\n- [scsi] lpfc: Fix Vports not sending FDISC after lips (Rob Evers) [698432]\n- [scsi] lpfc: Fix system crash during driver unload (Rob Evers) [698432]\n- [scsi] lpfc: Fix FCFI incorrect on received unsolicited frames (Rob Evers) [698432]\n- [scsi] lpfc: Fix driver sending FLOGI to a disconnected FCF (Rob Evers) [698432]\n- [scsi] lpfc: Fix bug with incorrect BLS Response to BLS Abort (Rob Evers) [698432]\n- [scsi] lpfc: Fix adapter on Powerpc unable to login into Fabric (Rob Evers) [698432]\n- [pci] export msi_desc struct and msi_desc array (Prarit Bhargava) [697666]\n- [net] bonding: prevent deadlock on slave store with alb mode (Neil Horman) [706414]\n- [net] mlx4: Fix dropped promiscuity flag (Michael S. Tsirkin) [592370]\n- [edac] amd64_edac: Fix NULL pointer on Interlagos (Mauro Carvalho Chehab) [705040 709529]\n- [scsi] ses: fix ses_set_fault() to set the fault LED function (James Takahashi) [682351]\n- [redhat] configs: config file changes for SES Enablement (James Takahashi) [682351]\n- [misc] enclosure: return ERR_PTR() on error (James Takahashi) [682351]\n- [misc] enclosure: fix oops while iterating enclosure_status array (James Takahashi) [682351]\n- [scsi] ses: fix VPD inquiry overrun (James Takahashi) [682351]\n- [scsi] ses: Fix timeout (James Takahashi) [682351]\n- [scsi] ses: fix data corruption (James Takahashi) [682351]\n- [scsi] ses: fix memory leaks (James Takahashi) [682351]\n- [scsi] ses: add new Enclosure ULD (James Takahashi) [682351]\n- [misc] enclosure: add support for enclosure services (James Takahashi) [682351]\n- [net] tg3: Include support for Broadcom 5719/5720 (John Feeney) [654956 696182 707299]\n- [misc] module: remove over-zealous check in __module_get() (Jon Masters) [616125]\n- [redhat] kabi: Add pci_ioremap_bar and pci_reset_function to kABI (Jon Masters) [677683]\n- [redhat] kabi: Add dm_put to kABI (Jon Masters) [707003]\n- [redhat] kabi: Add compat_alloc_user_space to kABI (Jon Masters) [703167]\n- [redhat] kabi: Add random32 and srandom32 to kABI (Jon Masters) [668815]\n- [redhat] kabi: Add cancel_work_sync to kABI (Jon Masters) [664991]\n- [net] bna: add r suffix to the driver version (Ivan Vecera) [709951]\n- [net] bna: fix for clean fw re-initialization (Ivan Vecera) [709951]\n- [net] bna: fix memory leak during RX path cleanup (Ivan Vecera) [709951]\n- [net] bridge: Disable multicast snooping by default (Herbert Xu) [506630]\n- [net] bonding: fix block_netpoll_tx imbalance (Andy Gospodarek) [704426]\n- [scsi] qla2xxx: Fix virtual port login failure after chip reset (Chad Dupuis) [703879]\n- [scsi] qla2xxx: fix dsd_list_len for dsd_chaining in cmd type 6 (Chad Dupuis) [703879]\n- [net] force new skbs to allocate a minimum of 16 frags (Amerigo Wang) [694308]\n- [pci] intel-iommu: Flush unmaps at domain_exit (Alex Williamson) [705455]\n- [pci] intel-iommu: Only unlink device domains from iommu (Alex Williamson) [705455]\n[2.6.18-265.el5]\n- [scsi] be2iscsi: Fix MSIX interrupt names (Prarit Bhargava) [704735]\n- [misc] signal: fix SIGPROF keeps large task from completing fork (Oleg Nesterov) [645528]\n- [fs] gfs2: fix processes waiting on already-available inode glock (Robert S Peterson) [694669]\n- Revert: [pci] msi: remove infiniband compat code (Prarit Bhargava) [636260]\n- Revert: [pci] msi: use msi_desc save areas in drivers/pci code (Prarit Bhargava) [636260]\n- Revert: [pci] msi: use msi_desc save areas in msi state functions (Prarit Bhargava) [636260]\n- Revert: [pci] msi: remove pci_save_msi|x_state() functions (Prarit Bhargava) [636260]\n- [s390] mm: diagnose 10 does not release memory above 2GB (Hendrik Brueckner) [701275]\n- [input] evdev: implement proper locking (Marc Milgram) [680561]\n- [input] evdev: rename list to client in handlers (Marc Milgram) [680561]\n- [net] netpoll: disable netpoll when enslave a device (Amerigo Wang) [698873]\n- [net] disable lro on phys device when dev is a vlan (Neil Horman) [696374]\n- [scsi] qla2xxx: Update version number to 8.03.07.03.05.07-k (Chad Dupuis) [686462]\n- [scsi] qla2xxx: Free firmware PCB on logout request (Chad Dupuis) [686462]\n- [scsi] qla2xxx: dump registers for more info about ISP82xx errors (Chad Dupuis) [686462]\n- [scsi] qla2xxx: Updated the reset sequence for ISP82xx (Chad Dupuis) [686462]\n- [scsi] qla2xxx: Update copyright banner (Chad Dupuis) [686462]\n- [scsi] qla2xxx: Perform FCoE context reset before adapter reset (Chad Dupuis) [686462]\n- [scsi] qla2xxx: Limit logs in case device state does not change (Chad Dupuis) [686462]\n- [scsi] qla2xxx: Abort pending commands for faster reset recovery (Chad Dupuis) [686462]\n- [scsi] qla2xxx: Check for match before setting FCP-priority info (Chad Dupuis) [686462]\n- [scsi] qla2xxx: Display PortID info during FCP command-status (Chad Dupuis) [686462]\n[2.6.18-264.el5]\n- [misc] Introduce pci_map_biosrom, kernel-xen variant (David Milburn) [651837]\n[2.6.18-263.el5]\n- [misc] vsyscall: remove code changing syscall instructions to nop (Ulrich Obergfell) [689546]\n- [scsi] mpt2sas: move fault event handling into process context (Tomas Henzl) [705398]\n- [scsi] ibmvscsi: Improve CRQ reset reliability (Steve Best) [704963]\n- [infiniband] cxgb4: Reset wait condition atomically (Steve Best) [703925]\n- [infiniband] cxgb4: fix driver hang on EEH error (Steve Best) [703925]\n- [fs] xfs: serialise unaligned direct IOs (Eric Sandeen) [689830]\n- [fs] ext4: serialize unaligned asynchronous DIO (Eric Sandeen) [689830]\n- [misc] Add printk_timed_ratelimit (Eric Sandeen) [689830]\n- [fs] set stats st_blksize to fs blocksize not page size (Eric Sandeen) [695168]\n- [pci] Disable PCI MSI/X on portable hardware (Prarit Bhargava) [703340]\n- [usb] ehci: Disable disconnect/connect wakeups (Matthew Garrett) [703344]\n- [fs] cifs: fix cifsConvertToUCS for the mapchars case (Jeff Layton) [705324]\n- [fs] nfs: set d_op on newly allocated dentries in nfs_rename (Jeff Layton) [702533]\n- [fs] nfs: Fix build break with CONFIG_NFS_V4=n (Harshula Jayasuriya) [702355]\n- [scsi] isci: enable building driver (David Milburn) [651837]\n- [scsi] libsas: flush initial device discovery before completing (David Milburn) [651837]\n- [scsi] libsas: fix up device gone notification in sas_deform_port (David Milburn) [651837]\n- [scsi] libsas: fix runaway error handler problem (David Milburn) [651837]\n- [scsi] isci: validate oem parameters early, and fallback (David Milburn) [651837]\n- [scsi] isci: fix oem parameter header definition (David Milburn) [651837]\n- [scsi] isci: fix fragile/conditional isci_host lookups (David Milburn) [651837]\n- [scsi] isci: cleanup isci_remote_device[_not]_ready interface (David Milburn) [651837]\n- [scsi] isci: Qualify when lock managed for STP/SATA callbacks (David Milburn) [651837]\n- [scsi] isci: Fix use of SATA soft reset state machine (David Milburn) [651837]\n- [scsi] isci: Free lock for abort escalation at submit time (David Milburn) [651837]\n- [scsi] isci: Properly handle requests in aborting state (David Milburn) [651837]\n- [scsi] isci: Remove screaming data types (David Milburn) [651837]\n- [scsi] isci: remove unused remote_device_started (David Milburn) [651837]\n- [scsi] isci: namespacecheck cleanups (David Milburn) [651837]\n- [scsi] isci: kill some long macros (David Milburn) [651837]\n- [scsi] isci: reorder init to cleanup unneeded declarations (David Milburn) [651837]\n- [scsi] isci: Remove event_* calls as they are just wrappers (David Milburn) [651837]\n- [scsi] isci: fix apc mode definition (David Milburn) [651837]\n- [scsi] isci: Revert task gating change handled by libsas (David Milburn) [651837]\n- [scsi] isci: reset hardware at init (David Milburn) [651837]\n- [scsi] isci: Revert unneeded error path fixes (David Milburn) [651837]\n- [scsi] isci: misc fixes (David Milburn) [651837]\n- [scsi] isci: add firmware support (David Milburn) [651837]\n- [scsi] isci: lldd support (David Milburn) [651837]\n- [scsi] isci: add core common definitions and utility functions (David Milburn) [651837]\n- [scsi] isci: add core base state machine and memory descriptors (David Milburn) [651837]\n- [scsi] isci: add core unsolicited frame handling and registers (David Milburn) [651837]\n- [scsi] isci: add core request support (David Milburn) [651837]\n- [scsi] isci: add core stp support (David Milburn) [651837]\n- [scsi] isci: add core remote node context support (David Milburn) [651837]\n- [scsi] isci: add core remote device support (David Milburn) [651837]\n- [scsi] isci: add core port support (David Milburn) [651837]\n- [scsi] isci: add core phy support (David Milburn) [651837]\n- [scsi] isci: add core controller support (David Milburn) [651837]\n- [scsi] isci: BZ 651837 Introduce pci_map_biosrom() (David Milburn) [651837]\n- [scsi] qla4xxx: update version to V5.02.04.00.05.07-d0 (Chad Dupuis) [660388]\n- [scsi] qla4xxx: set status_srb NULL if sense_len is 0 (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Initialize host fw_ddb_index_map list (Chad Dupuis) [660388]\n- [scsi] qla4xxx: reuse qla4xxx_mailbox_premature_completion (Chad Dupuis) [660388]\n- [scsi] qla4xxx: check for all reset flags (Chad Dupuis) [660388]\n- [scsi] qla4xxx: added new function qla4xxx_relogin_all_devices (Chad Dupuis) [660388]\n- [scsi] qla4xxx: add support for ql4xkeepalive module parameter (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Add support for ql4xmaxqdepth module parameter (Chad Dupuis) [660388]\n- [scsi] qla4xxx: skip core clock so firmware can increase clock (Chad Dupuis) [660388]\n- [scsi] qla4xxx: copy ipv4 opts and address state to host struct (Chad Dupuis) [660388]\n- [scsi] qla4xxx: check AF_FW_RECOVERY flag for 8022 adapter only (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Change hard coded values to macros (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Change hard coded value of Sense buffer (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Remove stale references to ISP3031 and NetXen (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Correct file header for iscsi (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Add scsi_{,un}block_request while reading flash (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Remove unused code from qla4xxx_send_tgts (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Add proper locking around cmd->host_scribble (Chad Dupuis) [660388]\n- [scsi] qla4xxx: use return status DID_TRANSPORT_DISRUPTED (Chad Dupuis) [660388]\n- [scsi] qla4xxx: remove unused functions and struct parameters (Chad Dupuis) [660388]\n- [scsi] qla4xxx: change char string to static char (Chad Dupuis) [660388]\n- [scsi] qla4xxx: change spin_lock to spin_lock_irqsave (Chad Dupuis) [660388]\n- [scsi] qla4xxx: change hard coded value to a macro (Chad Dupuis) [660388]\n- [scsi] qla4xxx: move qla4xxx_free_ddb_list and scsi_remove_host (Chad Dupuis) [660388]\n- [scsi] qla4xxx: get status from initialize_adapter (Chad Dupuis) [660388]\n- [scsi] qla4xxx: remove extra pci_disable_device call (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Remove unused argument from function prototype (Chad Dupuis) [660388]\n- [scsi] qla4xxx: call qla4xxx_mark_all_devices_missing (Chad Dupuis) [660388]\n- [scsi] qla4xxx: call scsi_scan_target only if AF_ONLINE set (Chad Dupuis) [660388]\n- [scsi] qla4xxx: call scsi_block_request before clearing AF_ONLINE (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Add timer debug print (Chad Dupuis) [660388]\n- [scsi] qla4xxx: use iscsi class session state check ready (Chad Dupuis) [660388]\n- [scsi] qla4xxx: set device state missing only if non-dead state (Chad Dupuis) [660388]\n- [scsi] libiscsi: fix shutdown (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Change function prototype to static (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Fix panic while loading with corrupted 4032 card (Chad Dupuis) [660388]\n- [scsi] qla4xxx: no other port reinit during remove_adapter (Chad Dupuis) [660388]\n- [scsi] qla4xxx: unblock iscsi session before scsi_scan_target (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Fix for dropping of AENs during init time (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Free allocated memory only once (Chad Dupuis) [660388]\n- [scsi] qla4xxx: ignore existing interrupt during mailbox command (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Check connection active before unblocking session (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Poll for Disable Interrupt Mailbox Completion (Chad Dupuis) [660388]\n- [scsi] qla4xxx: fix request_irq to avoid spurious interrupts (Chad Dupuis) [660388]\n- [net] bridge: make bridge address settings sticky (Amerigo Wang) [705997]\n- [net] bridge: allow changing hardware addr to any valid address (Amerigo Wang) [705997]\n- [xen] hvm: build guest timers on monotonic system time (Paolo Bonzini) [705725]\n- [xen] hvm: explicitly use the TSC as the base for the hpet (Paolo Bonzini) [705725]\n- [xen] x86: allow Dom0 to drive PC speaker (Igor Mammedov) [501314]\n- [xen] vtd: Fix resource leaks on error paths in intremap code (Igor Mammedov) [704497]\n[2.6.18-262.el5]\n- [block] cciss: reading a write only register causes a hang (Tomas Henzl) [696153]\n[2.6.18-261.el5]\n- [message] mptfusion: inline data padding support for TAPE drives (Tomas Henzl) [698073]\n- [powerpc] fix VDSO gettimeofday called with NULL struct timeval (Steve Best) [700203]\n- [fs] gfs2: fix resource group bitmap corruption (Robert S Peterson) [690555]\n- [fs] gfs2: Add dlm callback owed glock flag (Robert S Peterson) [703213]\n- [net] cxgb4: fix some backport bugs (Neil Horman) [700947]\n- [scsi] fnic: fix stats memory leak (Mike Christie) [688459]\n- [block]: fix missing bio back/front segment size setting (Milan Broz) [700546]\n- [net] mlx4: Add CX3 PCI IDs (Jay Fenlason) [660671]\n- [pci] SRIOV: release VF BAR resources when device is hot unplug (Don Dutile) [698879]\n- [virtio] virtio_ring: Decrement avail idx on buffer detach (Amit Shah) [699426]\n- [virtio] virtio_pci: fix double-free of pci regions on unplug (Amit Shah) [701918]\n- Revert: [virtio] console: no device_destroy on port device (Amit Shah) [701918]\n- [xen] hvm: provide param to disable HPET in HVM guests (Paolo Bonzini) [702652]\n- [xen] vtd: Free unused interrupt remapping table entry (Don Dugger) [571410]\n[2.6.18-260.el5]\n- [scsi] mpt2sas: prevent heap overflows and unchecked access (Tomas Henzl) [694527] {CVE-2011-1494 CVE-2011-1495}\n- [block] cciss: fix export resettable host attribute fix (Tomas Henzl) [690511]\n- [fs] gfs2: Tag all metadata with jid of last node to change it (Steven Whitehouse) [701577]\n- [fs] nfsd: permit unauthenticated stat of export root (Steve Dickson) [491740]\n- [net] myri10ge: add dynamic LRO disabling (Stanislaw Gruszka) [688897]\n- [wireless] ath5k: disable ASPM L0s for all cards (Stanislaw Gruszka) [666866]\n- [net] igb: work-around for 82576 EEPROMs reporting invalid size (Stefan Assmann) [693934]\n- [pci] aerdrv: use correct bits and add delay to aer_root_reset (Stefan Assmann) [700386]\n- [fs] jbd: fix write_metadata_buffer and get_write_access race (Eric Sandeen) [494927 696843]\n- [x86_64] Disable Advanced RAS/MCE on newer Intel processors (Prarit Bhargava) [697508]\n- [x86_64] vdso: fix gettimeofday segfault when tv == NULL (Prarit Bhargava) [700782]\n- [x86_64] Ignore spurious IPIs left over from crash kernel (Myron Stowe) [692921]\n- [i386] Ignore spurious IPIs left over from crash kernel (Myron Stowe) [692921]\n- [scsi] iscsi_tcp: fix iscsis sk_user_data access (Mike Christie) [677703]\n- [edac] i7core_edac: return -ENODEV if no MC is found (Mauro Carvalho Chehab) [658418]\n- [char] vcs: hook sysfs devices to object lifetime (Mauro Carvalho Chehab) [622542]\n- [char] vt_ioctl: fix VT ioctl race (Mauro Carvalho Chehab) [622542]\n- [fs] avoid vmalloc space error opening many files on x86 (Larry Woodman) [681586]\n- [fs] nfs: Tighten up the attribute update code (Jeff Layton) [672981]\n- [net] bna: Avoid kernel panic in case of FW heartbeat failure (Ivan Vecera) [700488]\n- [net] benet: increment work_counter in be_worker (Ivan Vecera) [695197]\n- [net] benet: be_poll_tx_mcc_compat should always return zero (Ivan Vecera) [690755]\n- [net] benet: Fix be_get_stats_count return value (Ivan Vecera) [690755]\n- [net] tcp: Fix tcp_prequeue to get correct rto_min value (Herbert Xu) [696411]\n- [net] bonding: unshare skbs prior to calling pskb_may_pull (Andy Gospodarek) [607114]\n- [misc] x86: Sync CPU feature flag additions from Xen (Frank Arnold) [687994]\n- [misc] mark various drivers/features as tech preview (Don Zickus) [701722]\n- [hwmon] i5k_amb: Fix compile warning (Dean Nelson) [603345]\n- [hwmon] i5k_amb: Load automatically on all 5000/5400 chipsets (Dean Nelson) [603345]\n- [hwmon] i5k_amb: provide labels for temperature sensors (Dean Nelson) [603345]\n- [hwmod] i5k_amb: support Intel 5400 chipset (Dean Nelson) [603345]\n- [net] bridge/netfilter: fix ebtables information leak (Don Howard) [681326] {CVE-2011-1080}\n- [net] bluetooth: fix sco information leak to userspace (Don Howard) [681311] {CVE-2011-1078}\n- [fs] gfs2: make sure fallocate bytes is a multiple of blksize (Benjamin Marzinski) [699741]\n- [fs] fix corrupted GUID partition table kernel oops (Jerome Marchand) [695980] {CVE-2011-1577}\n- [xen] x86: Enable K8 NOPS for future AMD CPU Families (Frank Arnold) [687994]\n- [xen] x86: Blacklist new AMD CPUID bits for PV domains (Frank Arnold) [687994]\n- [xen] x86: Handle new AMD CPUID bits for HVM guests (Frank Arnold) [687994]\n- [xen] x86: Update AMD CPU feature flags (Frank Arnold) [687994]\n- [xen] x86/domain: fix error checks in arch_set_info_guest (Laszlo Ersek) [688582] {CVE-2011-1166}\n[2.6.18-259.el5]\n- [net] bridge: fix initial packet flood if !STP (Jiri Pirko) [695369]\n- [edac] amd64_edac: Fix potential memleak (Mauro Carvalho Chehab) [610235]\n- [edac] amd64_edac, amd64_mce: Revert printk changes (Mauro Carvalho Chehab) [610235]\n- [x86] amd: Fix init_amd build warnings (Frank Arnold) [610235]\n- [edac] amd64_edac: Enable PCI dev detection on F15h (Frank Arnold) [610235]\n- [edac] amd64_edac: Fix decode_syndrome types (Frank Arnold) [610235]\n- [edac] amd64_edac: Fix DCT argument type (Frank Arnold) [610235]\n- [edac] amd64_edac: Fix ranges signedness (Frank Arnold) [610235]\n- [edac] amd64_edac: Drop local variable (Frank Arnold) [610235]\n- [edac] amd64_edac: Fix PCI config addressing types (Frank Arnold) [610235]\n- [edac] amd64_edac: Fix DRAM base macros (Frank Arnold) [610235]\n- [edac] amd64_edac: Fix node id signedness (Frank Arnold) [610235]\n- [edac] amd64_edac: Enable driver on F15h (Frank Arnold) [610235]\n- [edac] amd64_edac: Adjust ECC symbol size to F15h (Frank Arnold) [610235]\n- [edac] amd64_edac: Improve DRAM address mapping (Frank Arnold) [610235]\n- [edac] amd64_edac: Sanitize ->read_dram_ctl_register (Frank Arnold) [610235]\n- [edac] amd64_edac: fix up chip select conversion routine to F15h (Frank Arnold) [610235]\n- [edac] amd64_edac: Beef up early exit reporting (Frank Arnold) [610235]\n- [edac] amd64_edac: Revamp online spare handling (Frank Arnold) [610235]\n- [edac] amd64_edac: Fix channel interleave removal (Frank Arnold) [610235]\n- [edac] amd64_edac: Correct node interleaving removal (Frank Arnold) [610235]\n- [edac] amd64_edac: Add support for interleaved region swapping (Frank Arnold) [610235]\n- [edac] amd64_edac: Unify get_error_address (Frank Arnold) [610235]\n- [edac] amd64_edac: Simplify decoding path (Frank Arnold) [610235]\n- [edac] amd64_edac: Adjust channel counting to F15h (Frank Arnold) [610235]\n- [edac] amd64_edac: Cleanup old defines cruft (Frank Arnold) [610235]\n- [edac] amd64_edac: Cleanup NBSH cruft (Frank Arnold) [610235]\n- [edac] amd64_edac: Cleanup NBCFG handling (Frank Arnold) [610235]\n- [edac] amd64_edac: Cleanup NBCTL code (Frank Arnold) [610235]\n- [edac] amd64_edac: Cleanup DCT Select Low/High code (Frank Arnold) [610235]\n- [edac] amd64_edac: Cleanup Dram Configuration registers handling (Frank Arnold) [610235]\n- [edac] amd64_edac: Cleanup DBAM handling (Frank Arnold) [610235]\n- [edac] amd64_edac: Replace huge bitmasks with a macro (Frank Arnold) [610235]\n- [edac] amd64_edac: Sanitize f10_get_base_addr_offset (Frank Arnold) [610235]\n- [edac] amd64_edac: Sanitize channel extraction (Frank Arnold) [610235]\n- [edac] amd64_edac: Cleanup chipselect handling (Frank Arnold) [610235]\n- [edac] amd64_edac: Cleanup DHAR handling (Frank Arnold) [610235]\n- [edac] amd64_edac: Remove DRAM base/limit subfields caching (Frank Arnold) [610235]\n- [edac] amd64_edac: Add support for F15h DCT PCI config accesses (Frank Arnold) [610235]\n- [edac] amd64_edac: Fix DIMMs per DCTs output (Frank Arnold) [610235]\n- [edac] amd64_edac: Remove two-stage initialization (Frank Arnold) [610235]\n- [edac] amd64_edac: Check ECC capabilities initially (Frank Arnold) [610235]\n- [edac] amd64_edac: Carve out ECC-related hw settings (Frank Arnold) [610235]\n- [edac] amd64_edac: Allocate driver instances dynamically (Frank Arnold) [610235]\n- [edac] amd64_edac: Rework printk macros (Frank Arnold) [610235]\n- [edac] amd64_edac: Rename CPU PCI devices (Frank Arnold) [610235]\n- [edac] amd64_edac: Concentrate per-family init even more (Frank Arnold) [610235]\n- [edac] amd64_edac: Cleanup the CPU PCI device reservation (Frank Arnold) [610235]\n- [edac] amd64_edac: Add per-family init function (Frank Arnold) [610235]\n- [edac] amd64_edac: Remove F11h support (Frank Arnold) [610235]\n- [edac] amd64_edac: Fix interleaving check (Frank Arnold) [610235]\n- [edac] amd64_edac: Fix DCT base address selector (Frank Arnold) [610235]\n- [edac] amd64_edac: Sanitize syndrome extraction (Frank Arnold) [610235]\n- [edac] amd64_edac: fix forcing module load/unload (Frank Arnold) [610235]\n- [edac] amd64_edac: add memory types strings for debugging (Frank Arnold) [610235]\n- [edac] amd64_edac: remove unneeded extract_error_address wrapper (Frank Arnold) [610235]\n- [edac] amd64_edac: rename StinkyIdentifier (Frank Arnold) [610235]\n- [edac] amd64_edac: remove superfluous dbg printk (Frank Arnold) [610235]\n- [edac] amd64_edac: cleanup f10_early_channel_count (Frank Arnold) [610235]\n- [edac] amd64_edac: dump DIMM sizes on K8 too (Frank Arnold) [610235]\n- [edac] amd64_edac: cleanup rest of amd64_dump_misc_regs (Frank Arnold) [610235]\n- [edac] amd64_edac: cleanup DRAM cfg low debug output (Frank Arnold) [610235]\n- [edac] amd64_edac: wrap-up pci config read error handling (Frank Arnold) [610235]\n- [edac] amd64_edac: make DRAM regions output more human-readable (Frank Arnold) [610235]\n- [edac] amd64_edac: clarify DRAM CTL debug reporting (Frank Arnold) [610235]\n- [edac] mce_amd: Fix NB error formatting (Frank Arnold) [659693]\n- [edac] mce_amd: Use BIT_64() to eliminate warnings on 32-bit (Frank Arnold) [659693]\n- [edac] mce_amd: Enable MCE decoding on F15h (Frank Arnold) [659693]\n- [edac] mce_amd: Shorten error report formatting (Frank Arnold) [659693]\n- [edac] mce_amd: Overhaul error fields extraction macros (Frank Arnold) [659693]\n- [edac] mce_amd: Add F15h FP MCE decoder (Frank Arnold) [659693]\n- [edac] mce_amd: Add F15 EX MCE decoder (Frank Arnold) [659693]\n- [edac] mce_amd: Add an F15h NB MCE decoder (Frank Arnold) [659693]\n- [edac] mce_amd: No F15h LS MCE decoder (Frank Arnold) [659693]\n- [edac] mce_amd: Add F15h CU MCE decoder (Frank Arnold) [659693]\n- [edac] mce_amd: Add F15h IC MCE decoder (Frank Arnold) [659693]\n- [edac] mce_amd: Add F15h DC MCE decoder (Frank Arnold) [659693]\n- [edac] mce_amd: Select extended error code mask (Frank Arnold) [659693]\n- [edac] mce_amd: Fix shift warning on 32-bit (Frank Arnold) [659693]\n- [edac] mce_amd: Add a BIT_64() macro (Frank Arnold) [659693]\n- [edac] mce_amd: Enable MCE decoding on F12h (Frank Arnold) [659693]\n- [edac] mce_amd: Add F12h NB MCE decoder (Frank Arnold) [659693]\n- [edac] mce_amd: Add F12h IC MCE decoder (Frank Arnold) [659693]\n- [edac] mce_amd: Add F12h DC MCE decoder (Frank Arnold) [659693]\n- [edac] mce_amd: Add support for F11h MCEs (Frank Arnold) [659693]\n- [edac] mce_amd: Enable MCE decoding on F14h (Frank Arnold) [659693]\n- [edac] mce_amd: Fix FR MCEs decoding (Frank Arnold) [659693]\n- [edac] mce_amd: Complete NB MCE decoders (Frank Arnold) [659693]\n- [edac] mce_amd: Warn about LS MCEs on F14h (Frank Arnold) [659693]\n- [edac] mce_amd: Adjust IC decoders to F14h (Frank Arnold) [659693]\n- [edac] mce_amd: Adjust DC decoders to F14h (Frank Arnold) [659693]\n- [edac] mce_amd: Rename files (Frank Arnold) [659693]\n- [edac] mce_amd: Pass complete MCE info to decoders (Frank Arnold) [659693]\n- [edac] mce_amd: Sanitize error codes (Frank Arnold) [659693]\n- [edac] mce_amd: Remove unused function parameter (Frank Arnold) [659693]\n- [edac] mce_amd: Do not report error overflow as a separate error (Frank Arnold) [659693]\n- [edac] mce_amd: Limit MCE decoding to current families for now (Frank Arnold) [659693]\n- [edac] mce_amd: Fix wrong mask and macro usage (Frank Arnold) [659693]\n- [edac] mce_amd: Filter out invalid values (Frank Arnold) [659693]\n- [edac] mce_amd: silence GART TLB errors (Frank Arnold) [659693]\n- [edac] mce_amd: correct corenum reporting (Frank Arnold) [659693]\n- [edac] mce_amd: update AMD F10h revD check (Frank Arnold) [659693]\n- [edac] mce_amd: Use an atomic notifier for MCEs decoding (Frank Arnold) [659693]\n- [edac] mce_amd: carve out AMD MCE decoding logic (Frank Arnold) [659693]\n- [edac] mce_amd: Fix MCE decoding callback logic (Frank Arnold) [659693]\n[2.6.18-258.el5]\n- [block] cciss: fix lost command problem (Tomas Henzl) [696153]\n- [block] cciss: export resettable host attribute (Tomas Henzl) [690511]\n- [powerpc] mm/numa: Disable VPNH feature on pseries (Steve Best) [696328]\n- [wireless] iwlagn: re-enable MSI on resume (Prarit Bhargava) [694672]\n- [fs] cifs: clean up various nits in unicode routines (Jeff Layton) [659715]\n- [fs] cifs: fix unaligned accesses in cifsConvertToUCS (Jeff Layton) [659715]\n- [fs] cifs: clean up unaligned accesses in cifs_unicode.c (Jeff Layton) [659715]\n- [fs] cifs: fix unaligned access in check2ndT2 and coalesce_t2 (Jeff Layton) [659715]\n- [fs] cifs: clean up unaligned accesses in validate_t2 (Jeff Layton) [659715]\n- [fs] cifs: use get/put_unaligned functions to access ByteCount (Jeff Layton) [659715]\n- [net] bridge: fix build warning in br_device (Jarod Wilson) [556811]\n- [scsi] arcmsr: fix broken CONFIG_XEN conditional (Jarod Wilson) [635992]\n- [net] cxgb4: clean up dma_mapping_error usage (Jarod Wilson) [567446]\n- [fs] dcache: Close a race-opportunity in d_splice_alias (David Howells) [646359]\n- [md] dm-crypt: support more encryption modes (Milan Broz) [660368]\n- [crypto] add XTS blockcipher mode support (Danny Feng) [553411]\n- [s390] dasd: fix race between open and offline (Hendrik Brueckner) [695357]\n- [net] netxen: limit skb frags for non tso packet (Chad Dupuis) [672368]\n- [net] qlcnic: limit skb frags for non tso packet (Bob Picco) [695490]\n[2.6.18-257.el5]\n- [char] ipmi: dont poll non-existant IPMI Event Message Buffer (Tony Camuso) [578913]\n- [char] ipmi: fix platform return check (Tony Camuso) [578913]\n- [fs] gfs: Never try to deallocate an inode on a read-only mount (Steven Whitehouse) [689943]\n- [infiniband] cxgb4: Initial import of driver to RHEL5 (Steve Best) [567449]\n- [net] cxgb4: Initial import of driver to RHEL5 (Neil Horman) [567446]\n- [net] bond: fix link up after restart (Neil Horman) [659558]\n- [infiniband] cxgb3: Dont free skbs on NET_XMIT_* from LLD (Neil Horman) [516956]\n- [infiniband] cxgb3: Wait 1+ schedule cycle during device removal (Neil Horman) [516956]\n- [infiniband] cxgb3: Mark device with CXIO_ERROR_FATAL on remove (Neil Horman) [516956]\n- [infiniband] cxgb3: Dont allocate the SW queue for user mode CQs (Neil Horman) [516956]\n- [infiniband] cxgb3: Increase the max CQ depth (Neil Horman) [516956]\n- [infiniband] cxgb3: Doorbell overflow avoidance and recovery (Neil Horman) [516956]\n- [infiniband] cxgb3: Remove BUG_ON() on CQ rearm failure (Neil Horman) [516956]\n- [infiniband] cxgb3: Fix error paths in post_send and post_recv (Neil Horman) [516956]\n- [infiniband] cxgb3: Handle NULL inetdev ptr in iwch_query_port (Neil Horman) [516956]\n- [infiniband] cxgb3: Clean up properly on FW mismatch failures (Neil Horman) [516956]\n- [infiniband] cxgb3: Dont ignore insert_handle() failures (Neil Horman) [516956]\n- [infiniband] cxgb3: Wake up any waiters on peer close/abort (Neil Horman) [516956]\n- [infiniband] cxgb3: Dont free endpoints early (Neil Horman) [516956]\n- [net] cxgb3: Handle port events properly (Mike Christie) [516956]\n- [fs] cifs: prevent infinite recursion in cifs_reconnect_tcon (Jeff Layton) [667454]\n- [fs] cifs: consolidate reconnect logic in smb_init routines (Jeff Layton) [667454]\n- [fs] dcache: allow __d_obtain_alias to return unhashed dentries (J. Bruce Fields) [613736]\n[2.6.18-256.el5]\n- [scsi] mpt2sas: fix _scsih_is_raid test in _scsih_qcmd (Tomas Henzl) [683806]\n- [scsi] megaraid_sas: add a reset_devices condition (Tomas Henzl) [692099]\n- [net] add socket API recvmmsg, receive multiple messages (Thomas Graf) [582653]\n- [scsi] device_handler: fix ref counting in error path (Mike Snitzer) [645343]\n- [scsi] device_handler: propagate SCSI device deletion (Mike Snitzer) [645343]\n- [net] 8021q: fix VLAN RX stats counting (Stefan Assmann) [579858]\n- [x86_64] vdso: Fix typo in vclock_gettime code (Prarit Bhargava) [691735]\n- [firmware] dmi_scan: Display system information in dmesg (Prarit Bhargava) [692860]\n- [fs] debugfs: Implement debugfs_remove_recursive (Neil Horman) [692946]\n- [redhat] configs: enable building CXGB4_ISCSI (Mike Christie) [567452]\n- [scsi] cxgbi: get rid of gl_skb in cxgbi_ddp_info (Mike Christie) [567452]\n- [scsi] cxgbi: set ulpmode only if digest is on (Mike Christie) [567452]\n- [scsi] cxgb4i: ignore informational act-open-rpl message (Mike Christie) [567452]\n- [scsi] cxgb4i: connection and ddp setting update (Mike Christie) [567452]\n- [scsi] cxgb3i: fixed connection over vlan (Mike Christie) [567452]\n- [scsi] libcxgbi: pdu read fixes (Mike Christie) [567452]\n- [scsi] cxgbi: rename alloc_cpl to alloc_wr (Mike Christie) [567452]\n- [scsi] cxgb3i: change cxgb3i to use libcxgbi (Mike Christie) [567452]\n- [scsi] cxgbi: add cxgb4i iscsi driver (Mike Christie) [567452]\n- [net] bonding: re-read speed and duplex when interface goes up (Andy Gospodarek) [677902]\n- [net] ipv4/tcp_timer: honor sysctl tcp_syn_retries (Flavio Leitner) [688989]\n- [usb] fix usbfs isochronous data transfer regression (Don Zickus) [688926]\n- [fs] partitions: Fix corrupted OSF partition table parsing (Danny Feng) [688023]\n- [misc] add param to change default coredump_filter setup (Dave Anderson) [488840]\n- Revert: [md] dm-crypt: support more encryption modes (Jarod Wilson) [660368]\n- [xen] allow delivery of timer interrupts to VCPU != 0 (Paolo Bonzini) [418501]\n- [xen] x86/hvm: Enable delivering 8259 interrupts to VCPUs != 0 (Paolo Bonzini) [418501]\n- [xen] get rid of the vcpu state in HPET (Paolo Bonzini) [418501]\n- [xen] add accessors for arch/x86/hvm/hpet.c (Paolo Bonzini) [418501]\n[2.6.18-255.el5]\n- [net] htb: Make HTB scheduler work with TSO (Thomas Graf) [481546]\n- [fs] cifs: map NT_STATUS_ERROR_WRITE_PROTECTED to -EROFS (Jeff Layton) [516102]\n- [pci] Ensure devices are resumed on system resume (Matthew Garrett) [644440]\n- [fs] ext2, ext3: copy i_flags to inode flags on write (Eric Sandeen) [431738]\n- [fs] gfs2: fix filesystem hang caused by incorrect lock order (Robert S Peterson) [656032]\n- [fs] gfs2: restructure reclaiming of unlinked dinodes (Robert S Peterson) [656032]\n- [fs] gfs2: unlock on gfs2_trans_begin error (Robert S Peterson) [656032]\n- [pci] Add HP BL620c G7 to pci=bfsort whitelist (Prarit Bhargava) [680946]\n- [pci] msi: simplify the msi irq limit policy (Prarit Bhargava) [652799]\n- [scsi] scsi_dh: allow scsi_dh_detach to detach when attached (Mike Christie) [666304]\n- [net] bonding: fix test for presence of VLANs (Jiri Pirko) [654878]\n- [net] 8021q: VLAN 0 should be treated as no vlan tag (Jiri Pirko) [654878]\n- [kernel] module: add sysctl to block module loading (Jerome Marchand) [645221]\n- [fs] nfs: Make close(2) async when closing O_DIRECT files (Jeff Layton) [626977]\n- [fs] nfs: Optimise NFS close() (Jeff Layton) [626977]\n- [fs] nfs: Fix nfsv4 atomic open for execute... (Jeff Layton) [626977]\n- [misc] pm: add comment explaining is_registered kabi work-around (Don Zickus) [637930]\n- [misc] sunrpc: only call get_seconds once in sunrpc_invalidate (David Howells) [589512]\n[2.6.18-254.el5]\n- [scsi] mpt2sas: Added customer specific display support (Tomas Henzl) [684842]\n- [scsi] mpt2sas: Add support for WarpDrive SSS-6200 (Tomas Henzl) [683806]\n- [scsi] megaraid: update driver to v5.34 (Tomas Henzl) [660728]\n- [scsi] arcmsr: driver update for RHEL5.7 (Tomas Henzl) [635992]\n- [scsi] scsi_dh_alua: add scalable ONTAP lun to dev list (Mike Snitzer) [667660]\n- [pci] Enable pci=bfsort by default on future Dell systems (Shyam Iyer) [689047]\n- [net] enic: update driver to 2.1.1.9 (Stefan Assmann) [661306]\n- [scsi] bfa: rebase for RHEL5.7 to current scsi-misc version (Rob Evers) [660545]\n- [pci] Enable PCI bus rescan for PPC64 only (Prarit Bhargava) [683461]\n- [net] enable VLAN SG on additional drivers (Paolo Bonzini) [668934]\n- [net] add ethtool -k sg off support for vlans (Paolo Bonzini) [668934]\n- [net] explicitly enable VLAN SG when already in use (Paolo Bonzini) [668934]\n- [net] enable SG on vlan devices if supported on the NIC (Paolo Bonzini) [668934]\n- [net] fix NETIF_F_GSO_MASK to exclude VLAN features (Paolo Bonzini) [668934]\n- [ata] ata_piix: honor ide=disable (Paolo Bonzini) [460821]\n- [scsi] be2iscsi: update driver version string (Mike Christie) [691899]\n- [scsi] be2iscsi: fix null ptr when accessing task hdr (Mike Christie) [660392]\n- [scsi] be2iscsi: fix gfp use in alloc_pdu (Mike Christie) [660392]\n- [scsi] be2iscsi: allow more time for FW to respond (Mike Christie) [660392]\n- [net] ixgbe: restore erratum 45 fix and whitespace (Andy Gospodarek) [568312 568557 570366 571254 651467 653236 653359 653469 655022]\n- [usb] ehci: AMD periodic frame list table quirk (Don Zickus) [651333]\n- [scsi] qla2xxx: Upgrade 24xx and 25xx firmware to 5.03.16 (Chad Dupuis) [682305]\n- [fs] nfsd: fix auth_domain reference leak on nlm operations (J. Bruce Fields) [589512]\n- [net] sunrpc: ensure cache_check caller sees updated entry (J. Bruce Fields) [589512]\n- [net] sunrpc: take lock on turning entry NEGATIVE in cache_check (J. Bruce Fields) [589512]\n- [net] sunrpc: move cache validity check into helper function (J. Bruce Fields) [589512]\n- [net] sunrpc: modifying valid sunrpc cache entries is racy (J. Bruce Fields) [589512]\n- [fs] nfs: extract some common sunrpc_cache code from nfsd (J. Bruce Fields) [589512]\n- [pci] return correct value when writing to reset attribute (Alex Williamson) [689860]\n- [pci] expose function reset capability in sysfs (Alex Williamson) [689860]\n[2.6.18-253.el5]\n- [media] sn9c102: fix world-wirtable sysfs files (Don Howard) [679305]\n- [scsi] scsi_dh_rdac: Add two new IBM devices to rdac_dev_list (Rob Evers) [691460]\n- [misc] support for marking code as tech preview (Don Zickus) [645431]\n- [misc] taint: Add taint padding (Don Zickus) [645431]\n- [scsi] lpfc: Update version for 8.2.0.96 driver release (Rob Evers) [660396]\n- [scsi] lpfc: Update version for 8.2.0.95 driver release (Rob Evers) [660396]\n- [scsi] lpfc: Fix rrq cleanup for vport delete (Rob Evers) [660396]\n- [scsi] lpfc: dont ignore lpfc_suppress_link_up on SLI-4 (Rob Evers) [660396]\n- [scsi] lpfc: LOGO completion must invalidate both RPI and D_ID (Rob Evers) [660396]\n- [scsi] lpfc: adds a comment (Rob Evers) [660396]\n- [scsi] lpfc: Do not take lock when clearing rrq active (Rob Evers) [660396]\n- [scsi] lpfc: Fix non-empty nodelist after sli3 driver remove (Rob Evers) [660396]\n- [scsi] lpfc: Save IRQ level when taking host_lock in findnode_did (Rob Evers) [660396]\n- [scsi] lpfc: Fixed hang in lpfc_get_scsi_buf_s4 (Rob Evers) [660396]\n- [scsi] lpfc: Fix xri lookup for received rrq (Rob Evers) [660396]\n- [scsi] lpfc: Fix setting of RRQ active for target aborted IOs (Rob Evers) [660396]\n- [scsi] lpfc: Modified lpfc_delay_discovery implementation (Rob Evers) [660396]\n- [scsi] lpfc: Fix bug with fc_vport symbolic_name not being generated (Rob Evers) [660396]\n- [scsi] lpfc: Update lpfc for 8.2.0.94 driver release (Rob Evers) [660396]\n- [scsi] lpfc: Fixed fdisc sent with invalid VPI (Rob Evers) [660396]\n- [scsi] lpfc: warn if the link_speed is not supported by this adapter (Rob Evers) [660396]\n- [scsi] lpfc: Fixed UE error on UCNA BE2 hba during reboot (Rob Evers) [660396]\n- [scsi] lpfc: Update version for 8.2.0.93 driver release (Rob Evers) [660396]\n- [scsi] lpfc: Added support for clean address bit (Rob Evers) [660396]\n- [scsi] lpfc: Fixed XRI reuse issue (Rob Evers) [660396]\n- [scsi] lpfc: Update version for 8.2.0.92 driver release (Rob Evers) [660396]\n- [scsi] lpfc: Unreg login when PLOGI received from logged in port (Rob Evers) [660396]\n- [scsi] lpfc: Fixed crashes for NULL vport dereference (Rob Evers) [660396]\n- [scsi] lpfc: Update version for 8.2.0.91 driver release (Rob Evers) [660396]\n- [scsi] lpfc: Fix for kmalloc failures in lpfc_workq_post_event (Rob Evers) [660396]\n- [scsi] lpfc: Adjust lengths for sli4_config mailbox commands (Rob Evers) [660396]\n- [scsi] lpfc: set parity and serr bits on after performing sli4 reset (Rob Evers) [660396]\n- [scsi] lpfc: VPI for ALL ELS commands and alloc RPIs at node creation (Rob Evers) [660396]\n- [scsi] lpfc: Correct bit-definitions in SLI4 data structures (Rob Evers) [660396]\n- [scsi] lpfc: Update version for 8.2.0.90 driver release (Rob Evers) [660396]\n- [scsi] lpfc: new SLI4 initialization procedures based on if_type (Rob Evers) [660396]\n- [scsi] lpfc: Implement FC and SLI async event handlers (Rob Evers) [660396]\n- [scsi] lpfc: Fix management command context setting (Rob Evers) [660396]\n- [scsi] lpfc: Fix panic in __lpfc_sli_get_sglq (Rob Evers) [660396]\n- [scsi] lpfc: Update version for 8.2.0.89 driver release (Rob Evers) [660396]\n- [scsi] lpfc: Fix compiler warning (Rob Evers) [660396]\n- [scsi] lpfc: Added support for ELS RRQ command (Rob Evers) [660396]\n- [scsi] lpfc: Init VFI and VPI for physical port (Rob Evers) [660396]\n- [scsi] lpfc: Update version for 8.2.0.88 driver release (Rob Evers) [660396]\n- [scsi] lpfc: add READ_TOPOLOGY mailbox command and new speed definition (Rob Evers) [660396]\n- [scsi] lpfc: Modified return status of unsupport ELS commands (Rob Evers) [660396]\n- [scsi] lpfc: Implement doorbell register changes for new hardware (Rob Evers) [660396]\n- [scsi] lpfc: Implement new SLI 4 SLI_INTF register definitions (Rob Evers) [660396]\n- [scsi] lpfc: Add PCI ID definitions for new hardware support (Rob Evers) [660396]\n- [scsi] lpfc: Add new SLI4 WQE support (Rob Evers) [660396]\n- [net] myri10ge: update to 1.5.2 (Stanislaw Gruszka) [481629]\n- [pci] make pcie_get_readrq visible in pci.h (Stanislaw Gruszka) [481629]\n- [net] igb: AER fix recover from PCIe Uncorrectable Error (Stefan Assmann) [568211]\n- [net] igb: driver update for RHEL5.7 (Stefan Assmann) [653238]\n- [fs] quota: do not allow setting quota limits too high (Eric Sandeen) [594609]\n- [fs] block: fix submit_bh discarding barrier flag on sync write (Lukas Czerner) [667673]\n- [net] netfilter/ipt_CLUSTERIP: fix buffer overflow (Jiri Pirko) [689340]\n- [net] netfilter: ip6_tables: fix infoleak to userspace (Jiri Pirko) [689349] {CVE-2011-1172}\n- [net] netfilter/ip_tables: fix infoleak to userspace (Jiri Pirko) [689332] {CVE-2011-1171}\n- [net] netfilter/arp_tables: fix infoleak to userspace (Jiri Pirko) [689323] {CVE-2011-1170}\n- [sound] alsa: hda driver update for RHEL5.7 (Jaroslav Kysela) [688539]\n- [sound] alsa: add snd-aloop driver (Jaroslav Kysela) [647094]\n- [mmc] sdhci: Add support for O2Micro Card Reader (John Feeney) [659318]\n- [base] Fix potential deadlock in driver core (Don Zickus) [637930]\n- Revert: [crypto] add XTS blockcipher mode support (Jarod Wilson) [553411]\n[2.6.18-252.el5]\n- [scsi] add new Dell Powervault controllers to RDAC device list (Shyam Iyer) [688981]\n- [ata] ahci: AHCI mode for Intel Patsburg SATA RAID controller (David Milburn) [684361]\n- [md] dm-crypt: support more encryption modes (Milan Broz) [660368]\n- [crypto] add XTS blockcipher mode support (Danny Feng) [553411]\n- [virt] hypervisor: Overflow fix for clocks > 4GHz (Zachary Amsden) [673242]\n- [net] tg3: Restrict phy ioctl access (John Feeney) [660397]\n- [net] tg3: Update version to 3.116 (John Feeney) [660397]\n- [net] tg3: Minor EEE code tweaks (John Feeney) [660397]\n- [net] tg3: Relax EEE thresholds (John Feeney) [660397]\n- [net] tg3: Fix 57765 EEE support (John Feeney) [660397]\n- [net] tg3: Move EEE definitions into mdio.h (John Feeney) [660397]\n- [net] tg3: Enable phy APD for 5717 and later asic revs (John Feeney) [660397]\n- [net] tg3: use dma_alloc_coherent() instead of pci_alloc_consistent() (John Feeney) [660397]\n- [net] tg3: Reenable TSS for 5719 (John Feeney) [660397]\n- [net] tg3: Enable mult rd DMA engine on 5719 (John Feeney) [660397]\n- [net] tg3: Always turn on APE features in mac_mode reg (John Feeney) [660397]\n- [net] tg3: Dont check for vlan group before vlan_tx_tag_present (John Feeney) [660397]\n- [net] tg3: Update version to 3.115 (John Feeney) [660397]\n- [net] tg3: Report invalid link from tg3_get_settings() (John Feeney) [660397]\n- [net] tg3: Dont allocate jumbo ring for 5780 class devs (John Feeney) [660397]\n- [net] tg3: Cleanup tg3_alloc_rx_skb() (John Feeney) [660397]\n- [net] tg3: Add EEE support (John Feeney) [660397]\n- [net] tg3: Add clause 45 register accessor methods (John Feeney) [660397]\n- [net] tg3: Disable unused transmit rings (John Feeney) [660397]\n- [net] tg3: Add support for selfboot format 1 v6 (John Feeney) [660397]\n- [net] tg3: Update version to 3.114 (John Feeney) [660397]\n- [net] tg3: Add extend rx ring sizes for 5717 and 5719 (John Feeney) [660397]\n- [net] tg3: Prepare for larger rx ring sizes (John Feeney) [660397]\n- [net] tg3: Futureproof the loopback test (John Feeney) [660397]\n- [net] tg3: Cleanup missing VPD partno section (John Feeney) [660397]\n- [net] tg3: Remove 5724 device ID (John Feeney) [660397]\n- [net] tg3: return operator cleanup (John Feeney) [660397]\n- [net] tg3: phy tmp variable roundup (John Feeney) [660397]\n- [net] tg3: Dynamically allocate VPD data memory (John Feeney) [660397]\n- [net] tg3: Use skb_is_gso_v6() (John Feeney) [660397]\n- [net] tg3: Move producer ring struct to tg3_napi (John Feeney) [660397]\n- [net] tg3: Clarify semantics of TG3_IRQ_MAX_VECS (John Feeney) [660397]\n- [net] tg3: Disable TSS (John Feeney) [660397]\n- [net] tg3: Update version to 3.113 (John Feeney) [660397]\n- [net] tg3: Migrate tg3_flags to phy_flags (John Feeney) [660397]\n- [net] tg3: Create phy_flags and migrate phy_is_low_power (John Feeney) [660397]\n- [net] tg3: Add phy-related preprocessor constants (John Feeney) [660397]\n- [net] tg3: Add error reporting to tg3_phydsp_write() (John Feeney) [660397]\n- [net] tg3: Improve small packet performance (John Feeney) [660397]\n- [net] tg3: Remove 5720, 5750, and 5750M (John Feeney) [660397]\n- [net] tg3: Restrict ASPM workaround devlist (John Feeney) [660397]\n- [net] tg3: Manage gphy power for CPMU-less devs only (John Feeney) [660397]\n- [net] tg3: Disable TSS also during tg3_close() (John Feeney) [660397]\n- [net] tg3: Add 5784 ASIC rev to earlier PCIe MPS fix (John Feeney) [660397]\n- [net] tg3: Update version to 3.112 (John Feeney) [660397]\n- [net] tg3: Fix some checkpatch errors (John Feeney) [660397]\n- [net] tg3: Revert PCIe tx glitch fix (John Feeney) [660397]\n- [net] tg3: Report driver version to firmware (John Feeney) [660397]\n- [net] tg3: Relax 5717 serdes restriction (John Feeney) [660397]\n- [net] tg3: Fix single MSI-X vector coalescing (John Feeney) [660397]\n- [net] tg3: Update version to 3.111 (John Feeney) [660397]\n- [net] tg3: Allow 5717 serdes link via parallel detect (John Feeney) [660397]\n- [net] tg3: Allow single MSI-X vector allocations (John Feeney) [660397]\n- [net] tg3: Update version to 3.110 (John Feeney) [660397]\n- [net] tg3: Remove function errors flagged by checkpatch (John Feeney) [660397]\n- [net] tg3: Unify max pkt size preprocessor constants (John Feeney) [660397]\n- [net] tg3: Re-inline VLAN tags when appropriate (John Feeney) [660397]\n- [net] tg3: Optimize rx double copy test (John Feeney) [660397]\n- [net] tg3: Update version to 3.109 (John Feeney) [660397]\n- [net] tg3: Remove tg3_dump_state() (John Feeney) [660397]\n- [net] tg3: Cleanup if codestyle (John Feeney) [660397]\n- [net] tg3: The case of switches (John Feeney) [660397]\n- [net] tg3: Whitespace, constant, and comment updates (John Feeney) [660397]\n- [net] tg3: Use VPD fw version when present (John Feeney) [660397]\n- [net] tg3: Prepare FW version code for VPD versioning (John Feeney) [660397]\n- [net] tg3: Fix message 80 char violations (John Feeney) [660397]\n- [net] tg3: netdev_err() => dev_err() (John Feeney) [660397]\n- [net] tg3: Replace pr_err with sensible alternatives (John Feeney) [660397]\n- [net] tg3: change field used with TG3_FLAG_10_100_ONLY constant (John Feeney) [660397]\n- [net] tg3: Remove now useless VPD code (John Feeney) [660397]\n- [net] tg3: use helper to search for VPD keywords (John Feeney) [660397]\n- [net] tg3: use VPD information field helper functions (John Feeney) [660397]\n- [net] tg3: use helper to find VPD resource data type (John Feeney) [660397]\n- [net] tg3: Add large and small resource data type code (John Feeney) [660397]\n- [net] tg3: Add PCI LRDT tag size and section size (John Feeney) [660397]\n- [net] tg3: convert to use netdev_for_each_mc_addr, part6 (John Feeney) [660397]\nmacro helpers (John Feeney) [660397]\n- [net] bna: Include embedded firmware for RHEL5 (Ivan Vecera) [475690]\n- [net] bna: use device model DMA API (Ivan Vecera) [475690]\n- [net] bna: Remove unnecessary memset 0 (Ivan Vecera) [475690]\n- [net] bna: Update the driver version to 2.3.2.3 (Ivan Vecera) [475690]\n- [net] bna: IOC failure auto recovery fix (Ivan Vecera) [475690]\n- [net] bna: Restore VLAN filter table (Ivan Vecera) [475690]\n- [net] bna: Removed unused code (Ivan Vecera) [475690]\n- [net] bna: IOC uninit check and misc cleanup (Ivan Vecera) [475690]\n- [net] bna: Fix for TX queue (Ivan Vecera) [475690]\n- [net] bna: Enable pure priority tagged packet reception and rxf uninit cleanup fix (Ivan Vecera) [475690]\n- [net] bna: Fix ethtool register dump and reordered an API (Ivan Vecera) [475690]\n- [net] bna: Port enable disable sync and txq priority fix (Ivan Vecera) [475690]\n- [net] bna: TxRx and datapath fix (Ivan Vecera) [475690]\n- [net] bna: scope and dead code cleanup (Ivan Vecera) [475690]\n- [net] bna: fix interrupt handling (Ivan Vecera) [475690]\n- [net] bna: off by one (Ivan Vecera) [475690]\n- [net] bna: Check for NULL before deref in bnad_cb_tx_cleanup (Ivan Vecera) [475690]\n- [net] bna: fix lock imbalance (Ivan Vecera) [475690]\n- [net] bna: fix stats handling (Ivan Vecera) [475690]\n- [net] bna: Fixed build break for allyesconfig (Ivan Vecera) [475690]\n- [net] bna: Brocade 10Gb Ethernet device driver (Ivan Vecera) [475690]\n- [s390] tape: deadlock on global work queue (Hendrik Brueckner) [681329]\n- [s390] qeth: remove needless IPA-commands in offline (Hendrik Brueckner) [679120]\n- [s390] qeth: allow channel path changes in recovery (Hendrik Brueckner) [678073]\n- [s390] qeth: wrong MAC-address displayed in error message (Hendrik Brueckner) [675747]\n- [s390] dasd: Improve handling of stolen DASD reservation (Hendrik Brueckner) [651141]\n- [s390] dasd: provide a Sense Path Group ID ioctl (Hendrik Brueckner) [651135]\n- [s390] qeth: tolerate OLM-limitation (Hendrik Brueckner) [651161]\n- [s390] sclp_vt220: console message may cause deadlock (Hendrik Brueckner) [675751]\n- [s390] uaccess: missing sacf in uaccess error handling (Hendrik Brueckner) [670234]\n- [x86_64] nmi_watchdog: modify default to perf counter 1 (Don Zickus) [633196 659816]\n- [net] qlcnic: Remove validation for max tx and max rx queues (Chad Dupuis) [660390]\n- [net] qlcnic: fix checks for auto_fw_reset (Chad Dupuis) [660390]\n- [net] qlcnic: change module parameter permissions (Chad Dupuis) [660390]\n- [net] qlcnic: fix ethtool diagnostics test (Chad Dupuis) [660390]\n- [net] qlcnic: fix flash fw version read (Chad Dupuis) [660390]\n- [net] qlcnic: Use static const (Chad Dupuis) [660390]\n- [net] qlcnic: reset pci function unconditionally during probe (Chad Dupuis) [660390]\n- [net] qlcnic: fix ocm window register offset calculation (Chad Dupuis) [660390]\n- [net] qlcnic: fix LED test when interface is down. (Chad Dupuis) [660390]\n- [net] qlcnic: Updated driver version to 5.0.13 (Chad Dupuis) [660390]\n- [net] qlcnic: LICENSE file for qlcnic (Chad Dupuis) [660390]\n- [net] qlcnic: validate eswitch config values for PF (Chad Dupuis) [660390]\n- [net] qlcnic: Disable loopback support (Chad Dupuis) [660390]\n- [net] qlcnic: Bumped up driver version to 5.0.12 (Chad Dupuis) [660390]\n- [net] qlcnic: lro module parameter (Chad Dupuis) [660390]\n- [net] qlcnic: Fix driver hang while using qcc application (Chad Dupuis) [660390]\n- [net] qlcnic: lro off message log from set rx checsum (Chad Dupuis) [660390]\n- [net] qlcnic: Add description for CN1000Q adapter (Chad Dupuis) [660390]\n- [net] qlcnic: Allow minimum bandwidth of zero (Chad Dupuis) [660390]\n- [net] qlcnic: fix panic on load (Chad Dupuis) [660390]\n- [net] qlcnic: define valid vlan id range (Chad Dupuis) [660390]\n- [net] qlcnic: reduce rx ring size (Chad Dupuis) [660390]\n- [net] qlcnic: fix mac learning (Chad Dupuis) [660390]\n- [net] qlcnic: update ethtool stats (Chad Dupuis) [660390]\n- [net] qlcnic: update driver version 5.0.11 (Chad Dupuis) [660390]\n- [net] qlcnic: change all P3 references to P3P (Chad Dupuis) [660390]\n- [net] qlcnic: fix promiscous mode for VF (Chad Dupuis) [660390]\n- [net] qlcnic: fix board description (Chad Dupuis) [660390]\n- [net] qlcnic: remove private LRO flag (Chad Dupuis) [660390]\n- [net] qlcnic: support quiescent mode (Chad Dupuis) [660390]\n- [net] qlcnic: remove dead code (Chad Dupuis) [660390]\n- [net] qlcnic: set mtu lower limit (Chad Dupuis) [660390]\n- [net] qlcnic: cleanup port mode setting (Chad Dupuis) [660390]\n- [net] qlcnic: sparse warning fixes (Chad Dupuis) [660390]\n- [net] qlcnic: fix vlan TSO on big endian machine (Chad Dupuis) [660390]\n- [net] qlcnic: fix endianess for lro (Chad Dupuis) [660390]\n- [net] qlcnic: fix diag register (Chad Dupuis) [660390]\n- [net] qlcnic: fix eswitch stats (Chad Dupuis) [660390]\n- [net] qlcnic: fix internal loopback test (Chad Dupuis) [660390]\n- [net] qlcnic: return operator cleanup (Chad Dupuis) [660390]\n- [net] qlcnic: dont set skb->truesize (Chad Dupuis) [660390]\n- [net] qlcnic: dont assume NET_IP_ALIGN is 2 (Chad Dupuis) [660390]\n- [net] qlcnic: update version 5.0.10 (Chad Dupuis) [660390]\n- [net] qlcnic: remove fw version check (Chad Dupuis) [660390]\n- [net] qlcnic: vlan lro support (Chad Dupuis) [660390]\n- [net] qlcnic: vlan gro support (Chad Dupuis) [660390]\n- [net] qlcnic: support vlan rx accleration (Chad Dupuis) [660390]\n- [net] qlcnic: add cksum flag (Chad Dupuis) [660390]\n- [net] qlcnic: mac vlan learning support (Chad Dupuis) [660390]\n- [net] qlcnic: support mac learning (Chad Dupuis) [660390]\n- [net] qlcnic: fix mac override capability (Chad Dupuis) [660390]\n- [net] qlcnic: fix panic while using eth_hdr (Chad Dupuis) [660390]\n- [net] qlcnic: fix mac anti spoof policy (Chad Dupuis) [660390]\n- [net] qlcnic: fix for setting default eswitch config (Chad Dupuis) [660390]\n- [net] qlcnic: fix mac addr read (Chad Dupuis) [660390]\n- [net] qlcnic: add api version in reg dump (Chad Dupuis) [660390]\n- [net] qlcnic: backout firmware initialization update (Chad Dupuis) [660390]\n- [net] qlnic: fix a race in qlcnic_get_stats (Chad Dupuis) [660390]\n- [net] qlcnic: PCI ID addition (Chad Dupuis) [660390]\n- [net] qlcnic: Fix driver load issue in FW hang (Chad Dupuis) [660390]\n- [net] qlcnic: change reg name (Chad Dupuis) [660390]\n- [net] qlcnic: fix fw recovery for PF (Chad Dupuis) [660390]\n- [net] qlcnic: support port vlan id (Chad Dupuis) [660390]\n- [net] qlcnic: eswitch config fixes (Chad Dupuis) [660390]\n- [net] qlcnic: update version 5.0.8 (Chad Dupuis) [660390]\n- [net] qlcnic: rom lock recovery (Chad Dupuis) [660390]\n- [net] qlcnic: firmware initialization update (Chad Dupuis) [660390]\n- [net] qlcnic: fix endiness in eswitch statistics (Chad Dupuis) [660390]\n- [net] qlcnic: mark device state as failed (Chad Dupuis) [660390]\n- [net] qlcnic: fix npar state (Chad Dupuis) [660390]\n- [net] qlcnic: support anti mac spoofing (Chad Dupuis) [660390]\n- [net] qlcnic: configure offload setting on eswitch (Chad Dupuis) [660390]\n- [net] qlcnic: configure port on eswitch (Chad Dupuis) [660390]\n- [net] qlcnic: replace magic numbers with defines (Chad Dupuis) [660390]\n- [net] qlcnic: remove unused code (Chad Dupuis) [660390]\n- [net] qlcnic: fix inconsistent lock state (Chad Dupuis) [660390]\n- [net] qlcnic: Use available error codes (Chad Dupuis) [660390]\n- [net] qlcnic: turn off lro when rxcsum is disabled (Chad Dupuis) [660390]\n- [net] qlcnic: fix link diag test (Chad Dupuis) [660390]\n- [net] qlcnic: fix link status message (Chad Dupuis) [660390]\n- [net] qlcnic: add eswitch statistics support (Chad Dupuis) [660390]\n- [net] qlcnic: fix for setting function modes (Chad Dupuis) [660390]\n- [net] qlcnic: device state management fixes for virtual func (Chad Dupuis) [660390]\n- [net] qlcnic: fix aer for virtual func (Chad Dupuis) [660390]\n- [net] qlcnic: using too much stack (Chad Dupuis) [660390]\n- [net] qlcnic: clean up qlcnic_init_pci_info (Chad Dupuis) [660390]\n- [net] qlcnic: fix copyright for pci searching function (Chad Dupuis) [660390]\n- [net] netxen: support for GbE port settings (Chad Dupuis) [660437]\n- [net] netxen: Notify firmware of Flex-10 interface down (Chad Dupuis) [660437]\n- [net] netxen: update driver version 4.0.75 (Chad Dupuis) [660437]\n- [net] netxen: enable LRO based on NETIF_F_LRO (Chad Dupuis) [660437]\n- [net] netxen: update module description (Chad Dupuis) [660437]\n- [net] netxen: Use static const (Chad Dupuis) [660437]\n- [net] netxen: remove unused firmware exports (Chad Dupuis) [660437]\n- [net] netxen: Fix tx queue manipulation bug in netxen_nic_probe (Chad Dupuis) [660437]\n- [net] netxen: make local function static (Chad Dupuis) [660437]\n- [net] netxen: mask correctable error (Chad Dupuis) [660437]\n- [net] netxen: fix race in tx stop queue (Chad Dupuis) [660437]\n- [net] netxen: return operator cleanup (Chad Dupuis) [660437]\n- [net] netxen: dont set skb->truesize (Chad Dupuis) [660437]\n[2.6.18-251.el5]\n- [net] benet: Bump up the version number (Ivan Vecera) [660389]\n- [net] benet: Copyright notice change. Update to Emulex instead of ServerEngines (Ivan Vecera) [660389]\n- [net] benet: Fix UDP packet detected status in RX compl (Ivan Vecera) [660389]\n- [net] benet: changes for BE3 native mode support (Ivan Vecera) [660389]\n- [net] benet: Add multicast filter capability for Lancer (Ivan Vecera) [660389]\n- [net] benet: Disarm CQ and EQ to disable interrupt in Lancer (Ivan Vecera) [660389]\n- [net] benet: Remove TX Queue stop in close (Ivan Vecera) [660389]\n- [net] benet: Change f/w command versions for Lancer (Ivan Vecera) [660389]\n- [net] benet: Add error recovery during load for Lancer (Ivan Vecera) [660389]\n- [net] benet: Checksum field valid only for TCP/UDP (Ivan Vecera) [660389]\n- [net] benet: Remove ERR compl workaround for Lancer (Ivan Vecera) [660389]\n- [net] benet: use GFP_KERNEL allocations when possible (Ivan Vecera) [660389]\n- [net] benet: use hba_port_num instead of port_num (Ivan Vecera) [660389]\n- [net] benet: add code to display temperature of ASIC (Ivan Vecera) [660389]\n- [net] benet: fix to ignore transparent vlan ids wrongly indicated by NIC (Ivan Vecera) [660389]\n- [net] benet: variable name change (Ivan Vecera) [660389]\n- [net] benet: fixes in ethtool selftest (Ivan Vecera) [660389]\n- [net] benet: add new counters to display via ethtool stats (Ivan Vecera) [660389]\n- [net] benet: restrict WOL to PFs only. (Ivan Vecera) [660389]\n- [net] benet: detect a UE even when a interface is down. (Ivan Vecera) [660389]\n- [net] benet: gracefully handle situations when UE is detected (Ivan Vecera) [660389]\n- [net] benet: fix be_suspend/resume/shutdown (Ivan Vecera) [660389]\n- [net] benet: pass proper hdr_size while flashing redboot. (Ivan Vecera) [660389]\n- [net] benet: Fix broken priority setting when vlan tagging is enabled. (Ivan Vecera) [660389]\n- [net] benet: Allow VFs to call be_cmd_reset_function. (Ivan Vecera) [660389]\n- [net] benet: pass domain numbers for pmac_add/del functions (Ivan Vecera) [660389]\n- [net] benet: For the VF MAC, use the OUI from current MAC address (Ivan Vecera) [660389]\n- [net] benet: Cleanup the VF interface handles (Ivan Vecera) [660389]\n- [net] benet: call be_vf_eth_addr_config() after register_netdev (Ivan Vecera) [660389]\n- [net] benet: Initialize and cleanup sriov resources only if pci_enable_sriov has succeeded. (Ivan Vecera) [660389]\n- [net] benet: Use domain id when be_cmd_if_destroy is called. (Ivan Vecera) [660389]\n- [net] benet: Avoid null deref in be_cmd_get_seeprom_data (Ivan Vecera) [660389]\n- [net] benet: use device model DMA API (Ivan Vecera) [660389]\n- [net] benet: remove netif_stop_queue being called before register_netdev. (Ivan Vecera) [660389]\n- [net] benet: fix a crash seen during insmod/rmmod test (Ivan Vecera) [660389]\n- [net] benet: Use static const (Ivan Vecera) [660389]\n- [net] benet: use mutex instead of spin lock for mbox_lock (Ivan Vecera) [660389]\n- [net] benet: Handle out of buffer completions for lancer (Ivan Vecera) [660389]\n- [net] benet: FW init cmd fix for lancer (Ivan Vecera) [660389]\n- [net] benet: Fix be_dev_family_check() return value check (Ivan Vecera) [660389]\n- [net] benet: Fix too optimistic NETIF_F_HW_CSUM features (Ivan Vecera) [660389]\n- [net] benet: adding support for Lancer family of CNAs (Ivan Vecera) [660389]\n- [net] benet: remove dead code (Ivan Vecera) [660389]\n- [net] benet: Changes to use only priority codes allowed by f/w (Ivan Vecera) [660389]\n- [net] benet: add multiple RX queue support (Ivan Vecera) [660389]\n- [net] benet: fix tx completion polling (Ivan Vecera) [660389]\n- [net] benet: use Rx and Tx queues like upstream (Ivan Vecera) [660389]\n- [net] benet: return operator cleanup (Ivan Vecera) [660389]\n- [net] benet: fix a bug in UE detection logic (Ivan Vecera) [660389]\n- [net] benet: fix net-snmp error because of wrong packet stats (Ivan Vecera) [660389]\n- [net] benet: stats for packets received due to internal switching in ASIC. (Ivan Vecera) [660389]\n- [net] benet: fix to avoid sending get_stats request if one is already being processed. (Ivan Vecera) [660389]\n- [net] benet: change to show correct physical link status (Ivan Vecera) [660389]\n- [net] benet: add code to dump registers for debug (Ivan Vecera) [660389]\n- [net] benet: bump the driver version number (Ivan Vecera) [660389]\n- [net] benet: variable name changes (Ivan Vecera) [660389]\n- [net] benet: supress printing error when mac query fails for VF (Ivan Vecera) [660389]\n- [net] benet: Patch to determine if function is VF while running in guest OS. (Ivan Vecera) [660389]\n- [net] benet: enable ipv6 tso support (Ivan Vecera) [660389]\n- [net] benet: fix typos concerning management (Ivan Vecera) [660389]\n- [net] benet: Remove unnecessary returns from void functions (Ivan Vecera) [660389]\n- [net] benet: use skb_headlen() (Ivan Vecera) [660389]\n- [net] benet: clarify promiscuous cmd with a comment (Ivan Vecera) [660389]\n- [net] benet: Fix compile warnnings in drivers/net/benet/be_ethtool.c (Ivan Vecera) [660389]\n- [net] ixgbe: update to upstream version 3.2.9-k2 (Andy Gospodarek) [568312 568557 570366 571254 651467 653236 653359 653469 655022]\n- [misc] vlan: Add function to get EtherType from vlan packets (Andy Gospodarek) [568312 568557 570366 571254 651467 653236 653359 653469 655022]\n- [net] support for NETIF_F_HIGHDMA on vlan interfaces (Andy Gospodarek) [568312 568557 570366 571254 651467 653236 653359 653469 655022]\n- [scsi] bnx2i: Updated to version 2.6.2.3 (Mike Christie) [660406]\n- [scsi] bnx2i: Updated version to 2.6.2.2 (Mike Christie) [660406]\n- [scsi] bnx2i: Added iSCSI text pdu support for iSCSI offload (Mike Christie) [660406]\n- [scsi] bnx2i: Added jumbo MTU support for the no shost case (Mike Christie) [660406]\n- [scsi] bnx2i: Added support for the 57712(E) devices (Mike Christie) [660406]\n- [scsi] bnx2i: Added handling for unsupported iSCSI offload hba (Mike Christie) [660406]\n- [scsi] bnx2i: Fixed the 32-bit swapping of the LUN field for nopouts for 5771X (Mike Christie) [660406]\n- [scsi] bnx2i: Allow ep CONNECT_FAILED condition to go through proper cleanup (Mike Christie) [660406]\n- [scsi] bnx2i: Added reconnect fix connecting against Lefthand targets (Mike Christie) [660406]\n- [scsi] bnx2i: Cleaned up various error conditions in ep_connect/disconnect (Mike Christie) [660406]\n- [scsi] bnx2i: Added return code check for chip kwqe submission request (Mike Christie) [660406]\n- [scsi] bnx2i: Modified the bnx2i stop path to compensate for in progress ops (Mike Christie) [660406]\n- [scsi] bnx2i: Removed the dynamic registration of CNIC (Mike Christie) [660406]\n- [scsi] bnx2i: Added mutex lock protection to conn_get_param (Mike Christie) [660406]\n- [net] cnic: Fix lost interrupt on bnx2x (Mike Christie) [660430]\n- [net] cnic: Prevent status block race conditions with hardware (Mike Christie) [660430]\n- [net] bnx2x, cnic: Consolidate iSCSI/FCoE shared mem logic in bnx2x (Mike Christie) [660430]\n- [net] cnic: Fix the type field in SPQ messages (Mike Christie) [660430]\n- [net] cnic: Do not call bnx2i when bnx2i is calling cnic_unregister_driver() (Mike Christie) [660430]\n- [net] cnic: Do not allow iSCSI and FCoE on bnx2x multi-function mode (Mike Christie) [660430]\n- [net] cnic: fix mem leak on alloc fail in cnic_alloc_uio_rings (Mike Christie) [660430]\n- [net] cnic: Add FCoE support on 57712 (Mike Christie) [660430]\n- [net] cnic: Add kcq2 support on 57712 (Mike Christie) [660430]\n- [net] cnic: Call cm_connect_complete() immediately on error (Mike Christie) [660430]\n- [net] cnic: Check device state before reading the kcq pointer in IRQ (Mike Christie) [660430]\n- [net] cnic: Support NIC Partition mode (Mike Christie) [660430]\n- [net] cnic: Use proper client and connection IDs on iSCSI ring (Mike Christie) [660430]\n- [net] cnic: Improve ->iscsi_nl_msg_send() (Mike Christie) [660430]\n- [net] cnic: Prevent 'scheduling while atomic' when calling ->cnic_init() (Mike Christie) [660430]\n- [net] cnic: Fix iSCSI TCP port endian order. (Mike Christie) [660430]\n- [net] cnic: Remove unnecessary semicolons (Mike Christie) [660430]\n- [net] cnic: Add support for 57712 device (Mike Christie) [660430]\n- [net] cnic: Decouple uio close from cnic shutdown (Mike Christie) [660430]\n- [net] cnic: Add cnic_uio_dev struct (Mike Christie) [660430]\n- [net] cnic: Add cnic_free_uio() (Mike Christie) [660430]\n- [net] cnic: Defer iscsi connection cleanup (Mike Christie) [660430]\n- [net] cnic: Add cnic_bnx2x_destroy_ramrod() (Mike Christie) [660430]\n- [net] cnic: Convert ctx_flags to bit fields (Mike Christie) [660430]\n- [net] cnic: Add common cnic_request_irq() (Mike Christie) [660430]\n- [net] bnx2x, cnic: Fix SPQ return credit (Mike Christie) [660430]\n- [char] Enable and extend Legacy PTY support for 4096 device pairs (Mauro Carvalho Chehab) [582776]\n- [fs] ioctl: make fiemap map at least a blocksize amount (Josef Bacik) [663041]\n- [net] forcedeth/r8169: call netif_carrier_off at end of probe (Ivan Vecera) [664705 664707]\n- [net] ixgbevf: update to upstream version 2.0.0-k2 (Andy Gospodarek) [653237]\n- [net] e1000e: update to upstream version 1.3.10 (Andy Gospodarek) [653242 653548]\n- [x86] amd: Extend support to future families (Frank Arnold) [682835]\n- [x86] smpboot: Use compute unit info to determine thread siblings (Frank Arnold) [682835]\n- [x86] amd: Extract compute unit information for AMD CPUs (Frank Arnold) [682835]\n- [x86] amd: Add support for CPUID topology extension of AMD CPUs (Frank Arnold) [682835]\n- [x86] cpufeature: Update AMD CPUID feature bits (Frank Arnold) [682835]\n- [x86_64] Support NMI watchdog on newer AMD CPU families (Frank Arnold) [682835]\n- [net] ixgbe: fix for 82599 erratum on Header Splitting (Andy Gospodarek) [680531]\n- [net] ixgbe: limit VF access to network traffic (Andy Gospodarek) [680531]\n- [net] igbvf driver update for RHEL5.7 (Stefan Assmann) [653241]\n- [fs] ext3: Always set dx_nodes fake_dirent explicitly (Eric Sandeen) [662838]\n- [virt] xen/netback: signal front-end close event via udev (Paolo Bonzini) [661985]\n- [net] bnx2x: fix swap of rx-ticks and tx-ticks parameters in interrupt coalescing flow (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: fix MaxBW configuration (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: (NPAR) prevent HW access in D3 state (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: fix link notification (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: fix non-pmf device load flow (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: update driver version to 1.62.00-6 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: properly calculate lro_mss (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: perform statistics 'action' before state transition. (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: properly configure coefficients for MinBW algorithm (NPAR mode). (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix ethtool -t link test for MF (non-pmf) devices. (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix nvram test for single port devices. (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: (NPAR mode) Fix FW initialization (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Add a missing bit for PXP parity register of 57712. (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Duplication in promisc mode (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: multicasts in NPAR mode (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Update bnx2x version to 1.62.00-5 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix potential link loss in multi-function mode (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix port swap for BCM8073 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix LED blink rate on BCM84823 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Remove setting XAUI low-power for BCM8073 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Update bnx2x version to 1.62.00-4 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix AER setting for BCM57712 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix BCM84823 LED behavior (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Mark full duplex on some external PHYs (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix BCM8073/BCM8727 microcode loading (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: LED fix for BCM8727 over BCM57712 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Common init will be executed only once after POR (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Swap BCM8073 PHY polarity if required (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: fix typos (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix the race on bp->stats_pending. (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Move to D0 before clearing MSI/MSI-X configuration. (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: registers dump fixes (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Dont prevent RSS configuration in INT#x and MSI interrupt modes. (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: adding dcbnl support (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Use static const (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: remove bogus check (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: update version to 1.62.00-2 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: update firmware to 6.2.5.0 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: bnx2x_request_firmware update for 6.2.5.0 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: replace FW to 6.2.5 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Add DCB/PFC support - link layer (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: add DCB support (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Disable FCoE ring, NETDEV_HW_ADDR_T_SAN for RHEL5.7. (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: add FCoE ring (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Update version number and a date. (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fixed a compilation warning (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Use dma_alloc_coherent() semantics for ILT memory allocation (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: LSO code was broken on BE platforms (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Add Nic partitioning mode (57712 devices) (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Use helpers instead of direct access to the shinfo(skb) fields (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Do interrupt mode initialization and NAPIs adding before register_netdev() (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Disable local BHes to prevent a dead-lock situation (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: fix error value sign (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Remove unnecessary semicolons (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Update version number (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Reset 8073 phy during common init (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Do not enable CL37 BAM unless it is explicitly enabled (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix resetting BCM8726 PHY during common init (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Clear latch indication on link reset (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix port selection in case of E2 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix waiting for reset complete on BCM848x3 PHYs (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Restore appropriate delay during BMAC reset (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: make local function static and remove dead code (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: remove BCM_VLAN (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Dont check for vlan group before vlan_tx_tag_present. (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: update version to 1.60.00-3 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: prevent false parity error in MSI-X memory of HC block (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: fix possible deadlock in HC hw block (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: update version to 1.60.00-2 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: remove unnecessary FUNC_FLG_RSS flag and related (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Use correct FW constant for header padding (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: do not deal with power if no capability (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: remove redundant commands during error handling (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Optimized the branching in the bnx2x_rx_int() (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fixing a typo: added a missing RSS enablement (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: update version to 1.60.00-1 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: properly initialize FW stats (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: code beautify (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix SPQ return credit (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: move msix table initialization to probe() (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: use L1_CACHE_BYTES instead of magic number (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: remove unused fields in main driver structure (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: remove unused parameter in reuse_rx_skb() (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Add 57712 support (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: change type of spq_left to atomic (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Protect statistics ramrod and sequence number (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: rename MF related fields (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: firmware naming from upstream (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: whitespaces like in upstream, remove some #if0 lines (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: use netdev_for_each_mc_addr (Michal Schmidt) [629609 651546 653357 656360]\n- [misc] netdevice.h: add netdev_mc_count (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: use trivial wrappers around get_sset_count (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: remove a few pointless differences from upstream (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: bnx2x_alloc_napi cleanup, caller more similar to upstream (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: remove bnx2x_init_values.h (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x, cnic, bnx2i: use new FW/HSI (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Moved enabling of MSI to the bnx2x_set_num_queues() (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Use netif_set_real_num_{rx, tx}_queues() (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: return operator cleanup (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Spread rx buffers between allocated queues (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: use ARRAY_SIZE macro in bnx2x_main.c (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Update bnx2x version to 1.52.53-6 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Change LED scheme for dual-media (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Add dual-media changes (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Organize PHY functions (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Apply logic changes for the new scheme (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Move common function into aggregated function (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Adjust flow-control with the new scheme (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Adjust alignment of split PHY functions (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Split PHY functions (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Unify PHY attributes (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: avoid skb->ip_summed initialization (Michal Schmidt) [629609 651546 653357 656360]\n- [net] skbuff: add skb_checksum_none_assert (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Update version to 1.52.53-5 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Add BCM84823 to the supported PHYs (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Change BCM848xx LED configuration (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Remove unneeded setting of XAUI low power to BCM8727 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Change BCM848xx configuration according to IEEE (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Reset link before any new link settings (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix potential link issue In BCM8727 based boards (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix potential link issue of BCM8073/BCM8727 (Michal Schmidt) [629609 651546 653357 656360]\n- Revert: [net] bnx2x: force interrupt mode for iscsi unset mac (Michal Schmidt) [629609 651546 653357 656360]\n- [net] ipv4: make accept_local writeable for loopback (Neil Horman) [672570]\n- [net] bnx2: Update to latest upstream for RHEL5.7 (Neil Horman) [651438 660375]\n- [pci] backport common vpd support functions (Neil Horman) [683978]\n- [net] e1000: fix sparse warning (Dean Nelson) [571889 653248 653546]\n- [net] e1000: add support for Marvell Alaska M88E1118R PHY (Dean Nelson) [571889 653248 653546]\n- [net] e1000: Add support for the CE4100 reference platform (Dean Nelson) [571889 653248 653546]\n- [net] e1000: fix return value not set on error (Dean Nelson) [571889 653248 653546]\n- [net] e1000: fix Tx hangs by disabling 64-bit DMA (Dean Nelson) [571889 653248 653546]\n- [net] e1000: allow option to limit number of descriptors down to 48 per ring (Dean Nelson) [571889 653248 653546]\n- [net] e1000: Use new function for copybreak tests (Dean Nelson) [571889 653248 653546]\n- [net] e1000: do not modify tx_queue_len on link speed change (Dean Nelson) [571889 653248 653546]\n- [net] e1000: Fix DMA mapping error handling on RX (Dean Nelson) [571889 653248 653546]\n- [net] e1000: call pci_save_state after pci_restore_state (Dean Nelson) [571889 653248 653546]\n- [net] e1000: dont use small hardware rx buffers (Dean Nelson) [571889 653248 653546]\n- [fs] gfs2: directly write blocks past i_size (Benjamin Marzinski) [684371]\n- [fs] gfs2: fix block allocation check for fallocate (Benjamin Marzinski) [684024]\n- [redhat] spec: trim srpm size and vastly improve prep time (Jarod Wilson) [687950]\n[2.6.18-250.el5]\n- [block] cciss: use short tags where supported (Tomas Henzl) [656343]\n- [block] cciss: Fix memory leak in cciss_sysfs_stat_inquiry (Tomas Henzl) [656343]\n- [block] cciss: do not reorder commands in internal queue (Tomas Henzl) [656343]\n- [block] cciss: add another controller 0x103C3356 (Tomas Henzl) [656343]\n- [block] cciss: fix panic in cciss_revalidate (Tomas Henzl) [656343]\n- [block] cciss: Do not remove /proc entry if we never created it (Tomas Henzl) [656343]\n- [block] cciss: do not leak stack to userland (Tomas Henzl) [656343]\n- [block] cciss: catch kmalloc failure of h->scatter_list (Tomas Henzl) [656343]\n- [block] cciss: fix missed command status value CMD_UNABORTABLE (Tomas Henzl) [656343]\n- [block] cciss: remove ifdefed out interrupt_not_for_us (Tomas Henzl) [656343]\n- [block] cciss: change printks to dev_warn (Tomas Henzl) [656343]\n- [block] cciss: use consistent variable names (Tomas Henzl) [656343]\n- [block] cciss: mark performant mode function as __devinit (Tomas Henzl) [656343]\n- [block] cciss: cleanup some debug ifdefs (Tomas Henzl) [656343]\n- [block] cciss: fix leak of ioremapped memory in init error path (Tomas Henzl) [656343]\n- [block] cciss: Fix panic in multipath configurations (Tomas Henzl) [656343]\n- [message] mptfusion: version update to 3.04.18rh (Tomas Henzl) [662160]\n- [message] mptfusion: Incorrect return value in mptscsih_dev_reset (Tomas Henzl) [662160]\n- [message] mptfusion: remove bus reset (Tomas Henzl) [662160]\n- [message] mptfusion: 3gbps - 6gbps (Tomas Henzl) [662160]\n- [message] mptfusion: sysfs sas addr handle (Tomas Henzl) [662160]\n- [message] mptfusion: Fix 32 bit platforms with 64 bit resources (Tomas Henzl) [662160]\n- [message] mptfusion: use module_param correctly (Tomas Henzl) [662160]\n- [message] mptfusion: Adjust confusing if indentation (Tomas Henzl) [662160]\n- [message] mptfusion: print Doorbell reg on hard reset and timeout (Tomas Henzl) [662160]\n- [message] mptfusion: Cleanup some duplicate calls in mptbase.c (Tomas Henzl) [662160]\n- [message] mptfusion: Extra DMD error handling debug prints (Tomas Henzl) [662160]\n- [message] mptfusion: block errors if deleting devices or DMD (Tomas Henzl) [662160]\n- [message] mptfusion: add ioc_reset_in_progress reset in SoftReset (Tomas Henzl) [662160]\n- [message] mptfusion: handle SATA hotplug failure (Tomas Henzl) [662160]\n- [message] mptfusion: schedule_target_reset from all Reset context (Tomas Henzl) [662160]\n- [message] mptfusion: sanity check for device before adding to OS (Tomas Henzl) [662160]\n- [message] mptfusion: fix declaration of device_missing_delay (Tomas Henzl) [662160]\n- [message] mptfusion: DID_TRANSPORT_DISRUPTED, not DID_BUS_BUSY (Tomas Henzl) [662160]\n- [message] mptfusion: Set fw_events_off to 1 at driver load time (Tomas Henzl) [662160]\n- [scsi] mpt2sas: version change to 08.101.00.00 (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Call _scsih_ir_shutdown before reporting to OS (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Basic Code Cleanup in mpt2sas_base (Tomas Henzl) [662153]\n- [scsi] mpt2sas: fix access to freed memory from port enable (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Fix race between broadcast asyn event (Tomas Henzl) [662153]\n- [scsi] mpt2sas: support for Customer specific branding messages (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Revision P MPI Header Update (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Correct resizing calculation for max_queue_depth (Tomas Henzl) [662153]\n- [scsi] mpt2sas: device reset event not supported on old firmware (Tomas Henzl) [662153]\n- [scsi] mpt2sas: fix device removal handshake with vacant bit set (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Debug string changes from target to device (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Remove code for TASK_SET_FULL from driver (Tomas Henzl) [662153]\n- [scsi] mpt2sas: MPI2.0 Header updated (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Modify code to support Expander switch (Tomas Henzl) [662153]\n- [scsi] mpt2sas: create pool of chain buffers for IO (Tomas Henzl) [662153]\n- [scsi] mpt2sas: add loadtime params for IOMissingDelay and params (Tomas Henzl) [662153]\n- [scsi] mpt2sas: add sanity check for cb_idx and smid access (Tomas Henzl) [662153]\n- [scsi] mpt2sas: remov compiler warnnings when logging is disabled (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Copy message frame before releasing (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Copy sense buffer to work on it (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Add message to error escalation callback (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Add check for responding volumes after Host Reset (Tomas Henzl) [662153]\n- [scsi] mpt2sas: add ENOMEM return type when allocation fails (Tomas Henzl) [662153]\n- [scsi] mpt2sas: device event handling using pd_handles per HBA (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Tie a log info message to a specific PHY (Tomas Henzl) [662153]\n- [scsi] mpt2sas: print level KERN_DEBUG is replaced by KERN_INFO (Tomas Henzl) [662153]\n- [scsi] mpt2sas: add sysfs support for tracebuffer (Tomas Henzl) [662153]\n- [scsi] mpt2sas: MPI header version N is updated (Tomas Henzl) [662153]\n- [scsi] mpt2sas: add sysfs counter for ioc reset (Tomas Henzl) [662153]\n- [scsi] mpt2sas: add expander phy control support (Tomas Henzl) [662153]\n- [scsi] mpt2sas: add expander phy counter support (Tomas Henzl) [662153]\n- [scsi] mpt2sas: add disable_discovery module parameter (Tomas Henzl) [662153]\n- [scsi] mpt2sas: dont reset when another reset is in progress (Tomas Henzl) [662153]\n- [net] ip_conntrack_ftp: fix tracking of sequence numbers (Thomas Graf) [642388]\n- [fs] gfs2: add missing unlock_page in gfs2_write_begin (Steven Whitehouse) [684795]\n- [powerpc] numa: improved kABI breakage fix in paca struct (Steve Best) [651167]\n- [fs] gfs2: Make delayed workqueues submit immediately if delay 0 (Robert S Peterson) [650494]\n- [fs] gfs2: improve performance with bouncing locks in a cluster (Robert S Peterson) [650494]\n- [net] s2io: rx_ring_sz bounds checking (Michal Schmidt) [491786]\n- [net] s2io: resolve statistics issues (Michal Schmidt) [598650]\n- [scsi] iscsi: use kmap instead of kmap_atomic (Mike Christie) [672115]\n- [block] reduce stack footprint of blk_recount_segments() (Jeff Moyer) [638988]\n- [block] fix nr_phys_segments miscalculation bug (Jeff Moyer) [638988]\n- [block] raid fixups for removal of bi_hw_segments (Jeff Moyer) [638988]\n- [block] drop vmerge accounting (Jeff Moyer) [638988]\n- [block] drop virtual merging accounting (Jeff Moyer) [638988]\n- [block] Introduce rq_for_each_segment replacing rq_for_each_bio (Jeff Moyer) [638988]\n- [block] Merge blk_recount_segments into blk_recalc_rq_segments (Jeff Moyer) [638988]\n- [fs] Fix over-zealous flush_disk changing device size (Jeff Moyer) [678359]\n- [fs] lockd: make lockd_down wait for lockd to come down (Jeff Layton) [653286]\n- [net] sunrpc: Dont disconnect if connection in progress (Jeff Layton) [680329]\n- [fs] fix block based fiemap (Josef Bacik) [675986]\n- [fs] proc: protect mm start_/end_code in /proc/pid/stat (Eugene Teo) [684571] {CVE-2011-0726}\n- [net] dccp: fix oops in dccp_rcv_state_process (Eugene Teo) [682956] {CVE-2011-1093}\n- [scsi] libsas: fix bug for vacant phy (David Milburn) [676423]\n- [scsi] libsas: do not set res = 0 in sas_ex_discover_dev (David Milburn) [676423]\n- [scsi] libsas: fix wide port hotplug issues (David Milburn) [676423]\n- [scsi] libsas: fixup kABI breakage (David Milburn) [676423]\n- [scsi] libsas: no commands to hot-removed devices (David Milburn) [676423]\n- [scsi] libsas: transport-level facility to req SAS addrs (David Milburn) [676423]\n- [scsi] libsas: misc fixes to the eh path (David Milburn) [676423]\n- [scsi] libsas: correctly flush LU queue on error recovery (David Milburn) [676423]\n- [scsi] libsas: fix error handling (David Milburn) [676423]\n- [scsi] libsas: fix sense_buffer overrun (David Milburn) [676423]\n- [scsi] libsas: reuse orig port hotplugging phys wide port (David Milburn) [676423]\n- [scsi] libsas: fix NCQ mixing with non-NCQ (David Milburn) [676423]\n- [scsi] libsas: fix endianness bug in sas_ata (David Milburn) [676423]\n- [scsi] libsas: dont use made up error codes (David Milburn) [676423]\n- [net] bluetooth: fix bnep buffer overflow (Don Howard) [681319] {CVE-2011-1079}\n- [pci] intel-iommu: Fix get_domain_for_dev() error path (Alex Williamson) [688646]\n- [pci] intel-iommu: Unlink domain from iommu (Alex Williamson) [688646]\n- [redhat] spec: assorted cleanup and streamlining\n[2.6.18-249.el5]\n- [md] dm-mpath: avoid storing private suspended state (Mike Snitzer) [678670]\n- [md] dm-mpath: reject messages when device is suspended (Mike Snitzer) [678670]\n- [md] dm: export suspended state to targets (Mike Snitzer) [678670]\n- [md] dm: rename dm_suspended to dm_suspended_md (Mike Snitzer) [678670]\n- [md] dm: swap postsuspend call and setting suspended flag (Mike Snitzer) [678670]\n- [md] dm-ioctl: retrieve status from inactive table (Mike Snitzer) [678670]\n- [md] dm: rename dm_get_table to dm_get_live_table (Mike Snitzer) [678670]\n- [md] dm-stripe: avoid div by 0 with invalid stripe count (Mike Snitzer) [678670]\n- [md] dm-ioctl: forbid messages to devices being deleted (Mike Snitzer) [678670]\n- [md] dm: add dm_deleting_md function (Mike Snitzer) [678670]\n- [md] dm: dec_pending needs locking to save error value (Mike Snitzer) [678670]\n- [md] dm-raid1: keep retrying alloc if mempool_alloc fails (Mike Snitzer) [678670]\n- [md] dm-table: fix upgrade mode race (Mike Snitzer) [678670]\n- [md] dm-io: respect BIO_MAX_PAGES limit (Mike Snitzer) [678670]\n- [md] dm-ioctl: validate name length when renaming (Mike Snitzer) [678670]\n- [md] dm-log: fix dm_io_client leak on error paths (Mike Snitzer) [678670]\n- [md] dm: avoid destroying table in dm_any_congested (Mike Snitzer) [678670]\n- [md] dm-raid1: fix leakage (Mike Snitzer) [678670]\n- [md] dm-mpath: validate hw_handler argument count (Mike Snitzer) [678670]\n- [md] dm-mpath: validate table argument count (Mike Snitzer) [678670]\n- [md] dm-mpath: fix NULL deref when path parameter missing (Mike Snitzer) [673058]\n- [md] dm-mpath: wait for pg_init completion on suspend (Mike Snitzer) [673058]\n- [md] dm-mpath: hold io until all pg_inits completed (Mike Snitzer) [673058]\n- [md] dm-mpath: skip activate_path for failed paths (Mike Snitzer) [673058]\n- [md] dm-mpath: pass struct pgpath to pg init done (Mike Snitzer) [673058]\n- [md] dm-mpath: prevent io from work queue while suspended (Mike Snitzer) [673058]\n- [md] dm-mpath: add mutex to sync adding and flushing work (Mike Snitzer) [673058]\n- [md] dm-mpath: flush workqueues before suspend completes (Mike Snitzer) [673058]\n- [powerpc] numa: Fix kABI breakage in paca struct (Steve Best) [651167]\n- [powerpc] Disable VPHN polling during a suspend operation (Steve Best) [651167]\n- [powerpc] mm: Poll VPA for topo changes, update NUMA maps (Steve Best) [651167]\n- [powerpc] Add VPHN firmware feature (Steve Best) [651167]\nwith external journal (Lukas Czerner) [652321]\n- [fs] nfs: wait for COMMIT RPC complete before task put (Jeff Layton) [441730]\n- [fs] nfs: ->flush and ->fsync should use FLUSH_SYNC (Jeff Layton) [441730]\n- [net] sunrpc: fix race in __rpc_wait_for_completion_task (Jeff Layton) [441730]\n- [fs] nfs: Ensure proper cleanup on rpc_run_task fail (Jeff Layton) [441730]\n- [fs] nfs: clean up the unstable write code (Jeff Layton) [441730]\n- [fs] nfs: Dont use ClearPageUptodate if writeback fails (Jeff Layton) [441730]\n- [fs] nfs: Fix an unstable write data integrity race (Jeff Layton) [441730]\n- [fs] nfs: make sure WRITE and COMMIT are uninterruptible (Jeff Layton) [441730]\n- [fs] nfs: change how FLUSH_STABLE flag is used (Jeff Layton) [441730]\n- [mm] writeback: fix queue handling in blk_congestion_wait (Jeff Layton) [516490]\n- [fs] nfs: clean up nfs congestion control (Jeff Layton) [516490]\n- [block] Add real API for dealing with blk_congestion_wait (Jeff Layton) [516490]\n- [fs] nfs: kswapd must not block in nfs_release_page (Jeff Layton) [516490]\n- [fs] nfs: Prevent another deadlock in nfs_release_page (Jeff Layton) [516490]\n- [fs] nfs: Try commit unstable writes in nfs_release_page (Jeff Layton) [516490]\n- [fs] nfs: Add debugging facility for NFS aops (Jeff Layton) [516490]\n- [fs] nfs: Fix race in nfs_release_page() (Jeff Layton) [516490]\n- [fs] nfs: Fix nfs_release_page (Jeff Layton) [516490]\n- [fs] nfs: reduce number of unnecessary commit calls (Jeff Layton) [516490]\n- [fs] nfs: nfs_writepages() cleanup (Jeff Layton) [516490]\n[2.6.18-248.el5]\n- [virt] xen: make more room for event channel IRQs (Paolo Bonzini) [650838]\n- [message] mptfusion: fix msgContext in mptctl_hp_hostinfo (Tomas Henzl) [646513]\n- [net] ipv6: Add GSO support on forwarding path (Thomas Graf) [648572]\n- [net] tc: Ignore noqueue_qdisc default qdisc when dumping (Thomas Graf) [627850]\n- [serial] 8250_pci: add support for PowerPC PLX 8250 (Steve Best) [651431]\n- [scsi] ibmveth: Free irq on error path (Steve Best) [651872]\n- [scsi] ibmveth: Cleanup error handling in ibmveth_open (Steve Best) [651872]\n- [scsi] ibmveth: Remove some unnecessary include files (Steve Best) [651872]\n- [scsi] ibmveth: Convert driver specific assert to BUG_ON (Steve Best) [651872]\n- [scsi] ibmveth: Return -EINVAL on all ->probe errors (Steve Best) [651872]\n- [scsi] ibmveth: Some formatting fixes (Steve Best) [651872]\n- [scsi] ibmveth: Remove redundant function prototypes (Steve Best) [651872]\n- [scsi] ibmveth: Convert to netdev_alloc_skb (Steve Best) [651872]\n- [scsi] ibmveth: Remove dupe checksum offload setup code (Steve Best) [651872]\n- [scsi] ibmveth: Add optional flush of rx buffer (Steve Best) [651872]\n- [scsi] ibmveth: Add scatter-gather support (Steve Best) [651872]\n- [scsi] ibmveth: Add rx_copybreak (Steve Best) [651872]\n- [scsi] ibmveth: Add tx_copybreak (Steve Best) [651872]\n- [scsi] ibmveth: Remove LLTX (Steve Best) [651872]\n- [scsi] ibmveth: batch rx buffer replacement (Steve Best) [651872]\n- [scsi] ibmveth: Remove integer divide caused by modulus (Steve Best) [651872]\n- [fs] gfs2: creating large files suddenly slow to a crawl (Robert S Peterson) [683155]\n- [virt] xen: performance improvement for 32-bit domains (Paolo Bonzini) [390451]\n- [fs] nfs: fix use of slab allocd pages in skb frag list (Neil Horman) [682643] {CVE-2011-1090}\n- [net] af_packet: allow multicast traffic on bond ORIGDEV (Jiri Pirko) [579000]\n- [net] af_packet: option to return orig_dev to userspace (Jiri Pirko) [579000]\n- [fs] nfs: back out the FS-Cache patches (Jeff Layton) [631950]\n- [x86_64]: fix section mismatches in kernel setup (Frank Arnold) [683078]\n- [char] tty_audit: fix live lock on audit disabled (Danny Feng) [679563]\n- [s390] remove task_show_regs (Danny Feng) [677853] {CVE-2011-0710}\n- [scsi] qla2xxx: Query proper reg bits to determine state (Chad Dupuis) [537277]\n- [scsi] qla2xxx: update version to 8.03.07.00.05.07 (Chad Dupuis) [660386]\n- [scsi] qla2xxx: online ISP82XX for commands completion (Chad Dupuis) [660386]\n- [scsi] qla2xxx: fix tagging modifier while executing IOs (Chad Dupuis) [660386]\n- [scsi] qla2xxx: fix FCP_RSP response-info check after TMF (Chad Dupuis) [660386]\n- [scsi] qla2xxx: no reset/fw-dump on CT/ELS pt req timeout (Chad Dupuis) [660386]\n- [scsi] qla2xxx: return all loopback mbox out regs to API (Chad Dupuis) [660386]\n- [scsi] qla2xxx: fix IO failure during chip reset (Chad Dupuis) [660386]\n- [scsi] qla2xxx: show mbox reg 4 in 8012 AEN on ISP82XX (Chad Dupuis) [660386]\n- [scsi] qla2xxx: show more mailbox regs during AEN handle (Chad Dupuis) [660386]\n- [scsi] qla2xxx: no BIG_HAMMER if 0x20 cmd fails on CNAs (Chad Dupuis) [660386]\n- [scsi] qla2xxx: Remove redundant modparam permission bits (Chad Dupuis) [660386]\n- [scsi] qla2xxx: set right ret val in qla2xxx_eh_abort (Chad Dupuis) [660386]\n- [scsi] qla2xxx: set FCP prio info to firmware before IOs (Chad Dupuis) [660386]\n- [scsi] qla2xxx: Memory wedge with peg_halt test in loop (Chad Dupuis) [660386]\n- [scsi] qla2xxx: populate FCP_PRIO loc for no flt case (Chad Dupuis) [660386]\n- [scsi] qla2xxx: avoid SCSI host_lock dep in queuecommand (Chad Dupuis) [660386]\n- [scsi] qla2xxx: drop srb ref before wait for completion (Chad Dupuis) [660386]\n- [scsi] qla2xxx: log FCP priority data messages (Chad Dupuis) [660386]\n- [scsi] qla2xxx: add sysfs node for board temperature (Chad Dupuis) [660386]\n- [scsi] qla2xxx: fix check for need quiescence state (Chad Dupuis) [660386]\n- [scsi] qla2xxx: clear local rport refs on timeout from FC (Chad Dupuis) [660386]\n- [scsi] qla2xxx: remove unwanted check for bad spd (Chad Dupuis) [660386]\n- [scsi] qla2xxx: no continuous log when dontreset is set (Chad Dupuis) [660386]\n- [scsi] qla2xxx: quiescence mode support for ISP82xx (Chad Dupuis) [660386]\n- [virtio] console: no device_destroy on port device (Amit Shah) [681179]\n- [virtio] console: dont access vqs if device unplugged (Amit Shah) [681179]\n- [virtio] pci: fix config change oops w/no driver loaded (Amit Shah) [681179]\n- [xen] hap: preserve domain context (Radim Krcmar) [678571]\n[2.6.18-247.el5]\n- [mm] set barrier and send tlb flush to all affected cpus (Prarit Bhargava) [675793]\n- [misc] vdso: export wall_to_monotonic (Prarit Bhargava) [675727]\n- [mm] add vzalloc and vzalloc_node helpers (Neil Horman) [681303]\n- [fs] add lockd endianness annotations (Jeff Layton) [526829]\n- [misc] add key_revoke() dummy for KEYS=n (Jeff Layton) [640891]\n- [fs] nfs: Fix a use-after-free case in nfs_async_rename() (Jeff Layton) [511901]\n- [fs] nfs: make sillyrename an async operation (Jeff Layton) [511901]\n- [fs] nfs: move nfs_sillyrename to unlink.c (Jeff Layton) [511901]\n- [fs] nfs: standardize the rename response container (Jeff Layton) [511901]\n- [fs] nfs: standardize the rename args container (Jeff Layton) [511901]\n- [scsi] scsi_dh_emc: Set request flags consistently (Dave Wysochanski) [670367]\n- [i2c] i2c-i801: Add PCI idents for Patsburg 'IDF' devices (David Milburn) [651513]\n- [i2c] i2c-i801: Handle multiple instances properly (David Milburn) [651513]\n- [i2c] i2c-i801: Dont use block buffer for block writes (David Milburn) [651513]\n- [i2c] i2c-i801: Fix handling of error conditions (David Milburn) [651513]\n- [i2c] i2c-i801: Rename local variable temp to status (David Milburn) [651513]\n- [i2c] i2c-i801: Properly report bus arbitration loss (David Milburn) [651513]\n- [i2c] i2c-i801: Remove verbose debugging messages (David Milburn) [651513]\n- [i2c] i2c-i801: Implement I2C block read support (David Milburn) [651513]\n- [i2c] i2c-i801: Clear special mode bits as needed (David Milburn) [651513]\n- [i2c] i2c-i801: More explicit names for chip features (David Milburn) [651513]\n- [i2c] i2c-i801: Use the internal 32-byte buffer on ICH4+ (David Milburn) [651513]\n- [i2c] i2c-i801: Various cleanups (David Milburn) [651513]\n- [fs] xfs: disable CONFIG_XFS_DEBUG on kernel-debug (Dave Chinner) [658012]\n- [fs] xfs: remove cmn_err log buffer and lock (Dave Chinner) [658012]\n- [fs] fix select/poll timeout overflow (Bob Picco) [591607]\n- [x86_64] Use u32, not long, to set reset vector back to 0 (Don Zickus) [675258]\n- [net] sctp: fix race allowing access before full init (Neil Horman) [465876]\n- [xen] gdbsx: hypervisor part backport (Radim Krcmar) [678618]\n- [xen] add arch/x86/debug.c, debugger routines (Radim Krcmar) [678618]\n- [xen] x86/vmx: making TRAP_debug and TRAP_int3 useful (Radim Krcmar) [678618]\n[2.6.18-246.el5]\n- [net] bridge: restore ebt ksym versions (Herbert Xu) [626659]\n- [net] bridge: Fix mglist corruption (Herbert Xu) [506630]\n- [net] Fix IGMP3 report parsing (Herbert Xu) [506630]\n- [net] bridge: Fix IGMPv3 report parsing (Herbert Xu) [506630]\n- [net] bridge: Fix skb leak in multicast TX parse fail (Herbert Xu) [506630]\n- [net] bridge: Fix OOM crash in deliver_clone (Herbert Xu) [506630]\n- [net] bridge: Make first arg to deliver_clone const (Herbert Xu) [506630]\n- [net] bridge: Fix build error w/IGMP_SNOOPING not enabled (Herbert Xu) [506630]\n- [net] bridge: Add multicast count/interval sysfs entries (Herbert Xu) [506630]\n- [net] bridge: Add hash elasticity/max sysfs entries (Herbert Xu) [506630]\n- [net] bridge: Add multicast_snooping sysfs toggle (Herbert Xu) [506630]\n- [net] bridge: Add multicast_router sysfs entries (Herbert Xu) [506630]\n- [net] bridge: Add multicast data-path hooks (Herbert Xu) [506630]\n- [net] bridge: Add multicast start/stop hooks (Herbert Xu) [506630]\n- [net] bridge: Add multicast forwarding functions (Herbert Xu) [506630]\n- [net] bridge: Move NULL mdb check into br_mdb_ip_get (Herbert Xu) [506630]\n- [net] bridge: ensure br_multicast_query error path unlock (Herbert Xu) [506630]\n- [net] bridge: Fix RCU race in br_multicast_stop (Herbert Xu) [506630]\n- [net] bridge: Use RCU list primitive in __br_mdb_ip_get (Herbert Xu) [506630]\n- [net] bridge: cleanup: remove unneed check (Herbert Xu) [506630]\n- [net] bridge: depends on INET (Herbert Xu) [506630]\n- [net] bridge: Make IGMP snooping depend upon BRIDGE. (Herbert Xu) [506630]\n- [net] bridge: Add core IGMP snooping support (Herbert Xu) [506630]\n- [net] bridge: Fix br_forward crash in promiscuous mode (Herbert Xu) [506630]\n- [net] bridge: Split may_deliver/deliver_clone out (Herbert Xu) [506630]\n- [net] bridge: Use BR_INPUT_SKB_CB on xmit path (Herbert Xu) [506630]\n- [net] bridge: Avoid unnecessary clone on forward path (Herbert Xu) [506630]\n- [net] bridge: Allow tail-call on br_pass_frame_up (Herbert Xu) [506630]\n- [net] bridge: Do br_pass_frame_up after other ports (Herbert Xu) [506630]\n- [net] bridge: Kill clone argument to br_flood_* (Herbert Xu) [506630]\n- [net] Add netdev_alloc_skb_ip_align() helper (Herbert Xu) [506630]\n- [fs] partitions: Validate map_count in Mac part tables (Danny Feng) [679284] {CVE-2011-1010}\n- [fs] nfs: Only increment seqid for cmds seen by server (Sachin Prabhu) [651409]\n- [scsi] ipr: fix a race on multiple configuration changes (Steve Best) [651429]\n- [misc] vmware: increase apic_calibration_diff to 10000 (Prarit Bhargava) [665197]\n- [net] tun: introduce tun_file (Michael S. Tsirkin) [672619]\n- [virt] xen blktap: bump MAX_TAP_DEV from 100 to 256 (Laszlo Ersek) [452650]\n- [fs] nfs: Too many GETATTR/ACCESS calls after direct I/O (Jeff Layton) [626974]\n- [net] bonding: fix add/remove of slaves when master down (Flavio Leitner) [671238]\n- [net] sctp: make sctp_ctl_sock_init try IPv4 if v6 fails (Jiri Pirko) [674175]\n- [net] Fix netdev_run_todo dead-lock (Jiri Pirko) [679487]\n- [net] niu: Fix races between up/down and get_stats (Jiri Pirko) [679407]\n- [misc] introduce ACCESS_ONCE (Jiri Pirko) [679407]\n- [x86] fix AMD family 0x15 guest boot issue on 64-bit host (Frank Arnold) [667234]\n- [sound] alsa: cache mixer values on usb-audio devices (Don Zickus) [678074]\n- [xen] prevent cross-vendor migration of HVM domains (Paolo Bonzini) [621916]\n- [xen] new domctl to get 1 record from HVM save context (Michal Novotny) [674514]\n[2.6.18-245.el5]\n- [block] cciss: version bump (Tomas Henzl) [635143]\n- [block] cciss: add option to enforce simple mode (Tomas Henzl) [635143]\n- [block] cciss: patch to make kdump work in rhel5 (Tomas Henzl) [635143]\n- [block] cciss: cleanup warnings (Tomas Henzl) [635143]\n- [block] cciss: patch to support kdump on new controllers (Tomas Henzl) [635143]\n- [block] cciss: factor out code to find max commands (Tomas Henzl) [635143]\n- [block] cciss: split out cciss_defs (Tomas Henzl) [635143]\n- [block] cciss: scsi tape updates (Tomas Henzl) [635143]\n- [block] cciss: remove fail_all_cmds (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_passthru (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_getdrivver (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_getfirmver (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_getbustypes (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_getheartbeat (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_setnodename (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_getnodename (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_setintinfo (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_getintinfo (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_getpciinfo (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_reset_devices (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_find_cfg_addrs (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_wait_for_mode_change_ack (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_p600_dma_prefetch_quirk (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_enable_scsi_prefetch (Tomas Henzl) [635143]\n- [block] cciss: factor out CISS_signature_present (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_find_board_params (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_find_cfgtables (Tomas Henzl) [635143]\n- [block] cciss: factor out wait_for_board_ready (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_find_memory_BAR (Tomas Henzl) [635143]\n- [block] cciss: remove board_id from cciss_interrupt_mode (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_board_disabled (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_lookup_board_id (Tomas Henzl) [635143]\n- [block] cciss: save off pdev struct early (Tomas Henzl) [635143]\n- [block] cciss: add performant mode support (Tomas Henzl) [635143]\n- [block] cciss: new controller support (Tomas Henzl) [635143]\n- [block] cciss: remove generic sa support (Tomas Henzl) [635143]\n- [block] cciss: copyright update (Tomas Henzl) [635143]\n- [x86_64] vdso: fix gtod via export of sysctl_vsyscall (Prarit Bhargava) [673616]\n- [pci] msi: remove infiniband compat code (Prarit Bhargava) [636260]\n- [pci] msi: remove pci_save_msi|x_state() functions (Prarit Bhargava) [636260]\n- [pci] msi: use msi_desc save areas in msi state functions (Prarit Bhargava) [636260]\n- [pci] msi: use msi_desc save areas in drivers/pci code (Prarit Bhargava) [636260]\n- [misc] kdump: fixup mcp55 quick to skip non HT devices (Neil Horman) [477032]\n- [security] selinux: properly handle empty tty_files list (Lachlan McIlroy) [674226]\n- [fs] xfs: fix double free of log tickets (Lachlan McIlroy) [657166]\n- [fs] ext4: protect inode bitmap clearing w/ spinlock (Lukas Czerner) [663563]\n- [fs] procfs: fix numbering in /proc/locks (Jerome Marchand) [622647]\n- [fs] seq_file: Introduce the seq_open_private() (Jerome Marchand) [622647]\n- [fs] Rework /proc/locks w/seq_files and seq_list helpers (Jerome Marchand) [622647]\n- [fs] common helpers for seq_files working with list_heads (Jerome Marchand) [622647]\n- [fs] nfs: Remove incorrect do_vfs_lock message (Jeff Layton) [632399]\n- [fs] nfs: allow redirtying of a completed unstable write (Jeff Layton) [648657]\n- [fs] nfsd4: fix seqid on lock req incompat w/open mode (Jeff Layton) [517629]\n- [net] sunrpc: a better way to set tcp_slot_table_entries (Harshula Jayasuriya) [654293]\n- [x86] Convert BUG() to use unreachable() (Dean Nelson) [677396]\n- [s390] Convert BUG() to use unreachable() (Dean Nelson) [677396]\n- [powerpc] Convert BUG() to use unreachable() (Dean Nelson) [677396]\n- [misc] add support for __builtin_unreachable (Dean Nelson) [677396]\n- [fs] xfs: more swap extent fixes for dynamic fork offsets (Dave Chinner) [661300]\n- [fs] xfs: handle dynamic fork offsets in xfs_swap_extents (Dave Chinner) [661300]\n- [lib] fix vscnprintf() if @size is == 0 (Anton Arapov) [667327]\n- [net] netpoll: fix use after free (Amerigo Wang) [556811]\n- [net] netpoll: fix a softirq warning (Amerigo Wang) [556811]\n- [net] netconsole: Introduce netconsole netdev notifier (Amerigo Wang) [556811]\n- [net] bridge: support netpoll over bridge (Amerigo Wang) [556811]\n- [net] netconsole: Use netif_running() in write_msg() (Amerigo Wang) [556811]\n- [net] netconsole: Simplify boot/module option setup logic (Amerigo Wang) [556811]\n- [net] netconsole: Remove bogus check (Amerigo Wang) [556811]\n- [net] netconsole: Cleanups, codingstyle, prettyfication (Amerigo Wang) [556811]\n- [net] netpoll: setup error handling (Amerigo Wang) [556811]\n- [char] virtio_console: fix memory leak (Amit Shah) [656836]\n- [media] dvb: fix av7110 negative array offset (Mauro Carvalho Chehab) [672402] {CVE-2011-0521}\n[2.6.18-244.el5]\n- [message] mptfusion: add required mptctl_release call (Tomas Henzl) [660871]\n- [fs] gfs2: no exclusive glocks on mmapped read-only fs (Steven Whitehouse) [672724]\n- [scsi] ibmvfc: Driver version 1.0.9 (Steve Best) [651885]\n- [scsi] ibmvfc: Handle Virtual I/O Server reboot (Steve Best) [651885]\n- [scsi] ibmvfc: Log link up/down events (Steve Best) [651885]\n- [scsi] ibmvfc: Fix rport add/delete race oops (Steve Best) [651885]\n- [scsi] ibmvfc: Remove stale param to ibmvfc_init_host (Steve Best) [651885]\n- [scsi] ibmvfc: Fix locking in ibmvfc_remove (Steve Best) [651885]\n- [scsi] ibmvfc: Fixup TMF response handling (Steve Best) [651885]\n- [fs] nfs: pure nfs client performance using odirect (Jeff Layton) [643441]\n- [mm] fix install_special_mapping skips security_file_mmap (Frantisek Hrbata) [662197] {CVE-2010-4346}\n- [virt] xen: setup memory zones the same way as native (Andrew Jones) [525898]\n- [s390] qeth: wait for recovery finish in open function (Hendrik Brueckner) [668844]\n- [s390] cio: fix unuseable device after offline operation (Hendrik Brueckner) [668842]\n- [s390] qdio: use proper QEBSM operand for SIGA-{R,S} (Hendrik Brueckner) [668464]\n- [s390] qdio: zfcp stall with > 63 active qdio devices (Hendrik Brueckner) [662134]\n- [s390] qeth: enable VIPA add/remove for offline devices (Hendrik Brueckner) [661106]\n- [s390] hvc_iucv: no iucv_unregister if register failed (Hendrik Brueckner) [661021]\n- [s390] qeth: l3 add vlan hdr in passthru frames (Hendrik Brueckner) [659822]\n- [s390] cio: suppress chpid event in case of config error (Hendrik Brueckner) [668838]\n- [xen] x86: fix guest memmove in __pirq_guest_unbind (Yufang Zhang) [659642]\n[2.6.18-243.el5]\n- [scsi] device_handler: fix alua_rtpg port group id check (Mike Snitzer) [669961]\n- [net] cnic: fix big endian bug with device page tables (Steve Best) [669527]\n- [fs] only return EIO once on msync/fsync after IO failure (Rik van Riel) [652369]\n- [net] bonding: convert netpoll tx blocking to a counter (Neil Horman) [659594]\n- [net] conntrack: fix oops specify hashsize module option (Neil Horman) [667810]\n- [misc] mce: reduce thermal throttle message severity (Matthew Garrett) [666972]\n- [acpi] reduce the number of resched IPIs (Matthew Garrett) [653398]\n- [virt] xen: make netfront driver return info to ethtool (Laszlo Ersek) [643292]\n- [virt] xen: synch arch/i386/pci/irq-xen.c (Laszlo Ersek) [623979]\n- [virt] netback: take lock when removing entry from list (Laszlo Ersek) [648854]\n- [virt] xen: make netloop permanent (Laszlo Ersek) [567540]\n- [net] virtio: add get_drvinfo support to virtio_net (Laszlo Ersek) [645646]\n- [virt] xen: implement get_drvinfo for netloop driver (Laszlo Ersek) [643872]\n- [virt] xen: implement get_drvinfo for netback driver (Laszlo Ersek) [643872]\n- [net] virtio_net: update trans_start properly (Jiri Olsa) [653828]\n- [net] gro: reset dev pointer on reuse (Andy Gospodarek) [600350]\n- [net] atl1e: add new Atheros GbE NIC driver (Bob Picco) [465379]\n- [fs] gfs2: support for growing a full filesytem (Benjamin Marzinski) [661904]\n- [fs] gfs2: reserve more blocks for transactions (Benjamin Marzinski) [637970]\n- [fs] gfs2: add fallocate support (Benjamin Marzinski) [626585]\n- [fs] nfs: break nfsd v4 lease on unlink, link, and rename (J. Bruce Fields) [610093]\n- [fs] nfs: break lease on nfsd v4 setattr (J. Bruce Fields) [610093]\n- [net] ipv6: add missing support for local_reserved_ports (Amerigo Wang) [669603]\n- [misc] add ignore_loglevel kernel parameter (Amerigo Wang) [662102]\n- [misc] add bootmem_debug kernel parameter (Amerigo Wang) [662102]\n- [xen] unmask ISVM bit on SVM guests (Paolo Bonzini) [665972]\n- [xen] add MSR_IA32_THERM_CONTROL for dom0 CPU throttling (Laszlo Ersek) [614007]\n[2.6.18-242.el5]\n- [net] be2net: fix missing trans_start update (Ivan Vecera) [671595]\n- [message] mptfusion: release resources in error path (Tomas Henzl) [648413]\n- [fs] gfs2: fix recovery stuck on transaction lock (Robert S Peterson) [553803]\n- [net] fix unix socket local dos (Neil Horman) [656760] {CVE-2010-4249}\n- [net] core: clear allocs for privileged ethtool actions (Jiri Pirko) [672433] {CVE-2010-4655}\n- [net] limit socket backlog add operation to prevent DoS (Jiri Pirko) [657309] {CVE-2010-4251}\n- [block] fix accounting bug on cross partition merges (Jerome Marchand) [646816]\n- [fs] nfs: fix units bug causing hang on nfsv4 recovery (J. Bruce Fields) [659243]\n- [fs] nfs: set source addr when v4 callback is generated (J. Bruce Fields) [659255]\n- [char] virtio: Wake console outvq on host notifications (Amit Shah) [673459]\n- [net] ipv4: fix IGMP behavior on v2/v3 query responses (Jiri Pirko) [634276]\n- [net] ipv6: honor SO_BINDTODEVICE parameter when routing (Jiri Olsa) [568881]\n[2.6.18-241.el5]\n- [net] tcp: fix shrinking windows with window scaling (Jiri Pirko) [627496]\n- [virt] xen: no enable extended PCI cfg space via IOports (Don Dutile) [661478]\n- [fs] gfs2: remove iopen glocks from cache on delete fail (Benjamin Marzinski) [666080]\n- [char] virtio: make console port names a KOBJ_ADD event (Amit Shah) [669909]\n- [net] e1000: Avoid unhandled IRQ (Dean Nelson) [651512]\n- [net] e1000: fix screaming IRQ (Dean Nelson) [651512]\n[2.6.18-240.el5]\n- [acpi] bus: check if list is empty before kfree()ing it (Matthew Garrett) [670373]\n- [net] ipv6: fragment local tunnel IPSec6 pkts if needed (Herbert Xu) [661110]\n- [block] cciss: fix null pointer problem in tur usage (Tomas Henzl) [664592]\n[2.6.18-239.el5]\n- [scsi] megaraid: give FW more time to recover from reset (Tomas Henzl) [665427]\n- [fs] gfs2: fix statfs error after gfs2_grow (Robert S Peterson) [660661]\n- [mm] prevent file lock corruption using popen(3) (Larry Woodman) [664931]\n- [net] sctp: fix panic from bad socket lock on icmp error (Neil Horman) [665477] {CVE-2010-4526}", "edition": 72, "modified": "2011-07-31T00:00:00", "published": "2011-07-31T00:00:00", "id": "ELSA-2011-1065", "href": "http://linux.oracle.com/errata/ELSA-2011-1065.html", "title": "Oracle Linux 5.7 kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "redhat": [{"lastseen": "2019-08-13T18:47:02", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1078", "CVE-2012-2383"], "description": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* An integer overflow flaw was found in the i915_gem_execbuffer2() function\nin the Intel i915 driver in the Linux kernel. A local, unprivileged user\ncould use this flaw to cause a denial of service. This issue only affected\n32-bit systems. (CVE-2012-2383, Moderate)\n\n* A missing initialization flaw was found in the sco_sock_getsockopt_old()\nfunction in the Linux kernel's Bluetooth implementation. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2011-1078, Low)\n\nRed Hat would like to thank Vasiliy Kulikov of Openwall for reporting the\nCVE-2011-1078 issue.\n\nThis update also fixes several bugs. Documentation for these changes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues, and fix the bugs noted in the Technical\nNotes. The system must be rebooted for this update to take effect.\n", "modified": "2018-06-06T20:24:15", "published": "2012-08-14T04:00:00", "id": "RHSA-2012:1156", "href": "https://access.redhat.com/errata/RHSA-2012:1156", "type": "redhat", "title": "(RHSA-2012:1156) Moderate: kernel security and bug fix update", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:45:49", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1078", "CVE-2012-0441", "CVE-2012-1013", "CVE-2012-1015", "CVE-2012-2337", "CVE-2012-2383", "CVE-2012-2668", "CVE-2012-3404", "CVE-2012-3405", "CVE-2012-3406", "CVE-2012-3571", "CVE-2012-3817", "CVE-2012-3954"], "description": "The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: A subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nMultiple errors in glibc's formatted printing functionality could allow an\nattacker to bypass FORTIFY_SOURCE protections and execute arbitrary code\nusing a format string flaw in an application, even though these protections\nare expected to limit the impact of such flaws to an application abort.\n(CVE-2012-3404, CVE-2012-3405, CVE-2012-3406)\n\nThis updated package provides updated components that include fixes for\nvarious security issues. These issues have no security impact on Red Hat\nEnterprise Virtualization Hypervisor itself, however. The security fixes\nincluded in this update address the following CVE numbers:\n\nCVE-2012-3817 (bind issue)\n\nCVE-2012-3571 and CVE-2012-3954 (dhcp issues)\n\nCVE-2011-1078 and CVE-2012-2383 (kernel issues)\n\nCVE-2012-1013 and CVE-2012-1015 (krb5 issues)\n\nCVE-2012-0441 (nss issue)\n\nCVE-2012-2668 (openldap issue)\n\nCVE-2012-2337 (sudo issue)\n\nUsers of Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package, which fixes these issues.\n", "modified": "2018-06-07T08:59:35", "published": "2012-08-23T04:00:00", "id": "RHSA-2012:1200", "href": "https://access.redhat.com/errata/RHSA-2012:1200", "type": "redhat", "title": "(RHSA-2012:1200) Moderate: rhev-hypervisor6 security and bug fix update", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:46:01", "bulletinFamily": "unix", "cvelist": ["CVE-2011-0726", "CVE-2011-1078", "CVE-2011-1079", "CVE-2011-1080", "CVE-2011-1093", "CVE-2011-1163", "CVE-2011-1166", "CVE-2011-1170", "CVE-2011-1171", "CVE-2011-1172", "CVE-2011-1494", "CVE-2011-1495", "CVE-2011-1577", "CVE-2011-1763"], "description": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* A flaw in the dccp_rcv_state_process() function could allow a remote\nattacker to cause a denial of service, even when the socket was already\nclosed. (CVE-2011-1093, Important)\n\n* Multiple buffer overflow flaws were found in the Linux kernel's\nManagement Module Support for Message Passing Technology (MPT) based\ncontrollers. A local, unprivileged user could use these flaws to cause a\ndenial of service, an information leak, or escalate their privileges.\n(CVE-2011-1494, CVE-2011-1495, Important)\n\n* A missing validation of a null-terminated string data structure element\nin the bnep_sock_ioctl() function could allow a local user to cause an\ninformation leak or a denial of service. (CVE-2011-1079, Moderate)\n\n* Missing error checking in the way page tables were handled in the Xen\nhypervisor implementation could allow a privileged guest user to cause the\nhost, and the guests, to lock up. (CVE-2011-1166, Moderate)\n\n* A flaw was found in the way the Xen hypervisor implementation checked for\nthe upper boundary when getting a new event channel port. A privileged\nguest user could use this flaw to cause a denial of service or escalate\ntheir privileges. (CVE-2011-1763, Moderate)\n\n* The start_code and end_code values in \"/proc/[pid]/stat\" were not\nprotected. In certain scenarios, this flaw could be used to defeat Address\nSpace Layout Randomization (ASLR). (CVE-2011-0726, Low)\n\n* A missing initialization flaw in the sco_sock_getsockopt() function could\nallow a local, unprivileged user to cause an information leak.\n(CVE-2011-1078, Low)\n\n* A missing validation of a null-terminated string data structure element\nin the do_replace() function could allow a local user who has the\nCAP_NET_ADMIN capability to cause an information leak. (CVE-2011-1080, Low)\n\n* A buffer overflow flaw in the DEC Alpha OSF partition implementation in\nthe Linux kernel could allow a local attacker to cause an information leak\nby mounting a disk that contains specially-crafted partition tables.\n(CVE-2011-1163, Low)\n\n* Missing validations of null-terminated string data structure elements in\nthe do_replace(), compat_do_replace(), do_ipt_get_ctl(), do_ip6t_get_ctl(),\nand do_arpt_get_ctl() functions could allow a local user who has the\nCAP_NET_ADMIN capability to cause an information leak. (CVE-2011-1170,\nCVE-2011-1171, CVE-2011-1172, Low)\n\n* A heap overflow flaw in the Linux kernel's EFI GUID Partition Table (GPT)\nimplementation could allow a local attacker to cause a denial of service\nby mounting a disk that contains specially-crafted partition tables.\n(CVE-2011-1577, Low)\n\nRed Hat would like to thank Dan Rosenberg for reporting CVE-2011-1494 and\nCVE-2011-1495; Vasiliy Kulikov for reporting CVE-2011-1079, CVE-2011-1078,\nCVE-2011-1080, CVE-2011-1170, CVE-2011-1171, and CVE-2011-1172; Kees Cook\nfor reporting CVE-2011-0726; and Timo Warns for reporting CVE-2011-1163\nand CVE-2011-1577.\n\nThis update also fixes several bugs. Documentation for these bug fixes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues, and fix the bugs noted in the Technical\nNotes. The system must be rebooted for this update to take effect.\n", "modified": "2017-09-08T12:14:44", "published": "2011-05-31T04:00:00", "id": "RHSA-2011:0833", "href": "https://access.redhat.com/errata/RHSA-2011:0833", "type": "redhat", "title": "(RHSA-2011:0833) Important: kernel security and bug fix update", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:46:51", "bulletinFamily": "unix", "cvelist": ["CVE-2011-0695", "CVE-2011-0711", "CVE-2011-0726", "CVE-2011-1010", "CVE-2011-1013", "CVE-2011-1019", "CVE-2011-1078", "CVE-2011-1079", "CVE-2011-1080", "CVE-2011-1082", "CVE-2011-1093", "CVE-2011-1163", "CVE-2011-1170", "CVE-2011-1171", "CVE-2011-1172"], "description": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* A race condition in the way the Linux kernel's InfiniBand implementation\nset up new connections could allow a remote user to cause a denial of\nservice. (CVE-2011-0695, Important)\n\n* An integer signedness flaw in drm_modeset_ctl() could allow a local,\nunprivileged user to cause a denial of service or escalate their\nprivileges. (CVE-2011-1013, Important)\n\n* A flaw in dccp_rcv_state_process() could allow a remote attacker to cause\na denial of service, even when the socket was already closed.\n(CVE-2011-1093, Important)\n\n* A missing validation of a null-terminated string data structure element\nin bnep_sock_ioctl() could allow a local user to cause an information leak\nor a denial of service. (CVE-2011-1079, Moderate)\n\n* A flaw in the Linux kernel's Event Poll (epoll) implementation could\nallow a local, unprivileged user to cause a denial of service.\n(CVE-2011-1082, Moderate)\n\n* A missing initialization flaw in the XFS file system implementation could\nlead to an information leak. (CVE-2011-0711, Low)\n\n* The start_code and end_code values in \"/proc/[pid]/stat\" were not\nprotected. In certain scenarios, this flaw could be used to defeat Address\nSpace Layout Randomization (ASLR). (CVE-2011-0726, Low)\n\n* A missing validation check in the Linux kernel's mac_partition()\nimplementation, used for supporting file systems created on Mac OS\noperating systems, could allow a local attacker to cause a denial of\nservice by mounting a disk that contains specially-crafted partitions.\n(CVE-2011-1010, Low)\n\n* A flaw in dev_load() could allow a local user who has the CAP_NET_ADMIN\ncapability to load arbitrary modules from \"/lib/modules/\", instead of only\nnetdev modules. (CVE-2011-1019, Low)\n\n* A missing initialization flaw in sco_sock_getsockopt_old() could allow a\nlocal, unprivileged user to cause an information leak. (CVE-2011-1078, Low)\n\n* A buffer overflow flaw in the DEC Alpha OSF partition implementation in\nthe Linux kernel could allow a local attacker to cause an information leak\nby mounting a disk that contains specially-crafted partition tables.\n(CVE-2011-1163, Low)\n\n* Missing validations of null-terminated string data structure elements\nin the do_replace(), compat_do_replace(), do_ipt_get_ctl(),\ndo_ip6t_get_ctl(), and do_arpt_get_ctl() functions could allow a local user\nwho has the CAP_NET_ADMIN capability to cause an information leak.\n(CVE-2011-1170, CVE-2011-1171, CVE-2011-1172, CVE-2011-1080, Low)\n\nRed Hat would like to thank Jens Kuehnel for reporting CVE-2011-0695;\nVasiliy Kulikov for reporting CVE-2011-1079, CVE-2011-1019, CVE-2011-1078,\nCVE-2011-1170, CVE-2011-1171, CVE-2011-1172, and CVE-2011-1080; Nelson\nElhage for reporting CVE-2011-1082; Dan Rosenberg for reporting\nCVE-2011-0711; Kees Cook for reporting CVE-2011-0726; and Timo Warns for\nreporting CVE-2011-1010 and CVE-2011-1163.\n\nThis update also fixes various bugs. Documentation for these bug fixes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section.\n\nUsers should upgrade to these updated packages, which upgrade the kernel-rt\nkernel to version 2.6.33.9-rt31, and correct these issues. The system must\nbe rebooted for this update to take effect.\n", "modified": "2019-03-22T23:44:44", "published": "2011-05-10T04:00:00", "id": "RHSA-2011:0500", "href": "https://access.redhat.com/errata/RHSA-2011:0500", "type": "redhat", "title": "(RHSA-2011:0500) Important: kernel-rt security and bug fix update", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "centos": [{"lastseen": "2019-12-20T18:28:33", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1078", "CVE-2012-2383"], "description": "**CentOS Errata and Security Advisory** CESA-2012:1156\n\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* An integer overflow flaw was found in the i915_gem_execbuffer2() function\nin the Intel i915 driver in the Linux kernel. A local, unprivileged user\ncould use this flaw to cause a denial of service. This issue only affected\n32-bit systems. (CVE-2012-2383, Moderate)\n\n* A missing initialization flaw was found in the sco_sock_getsockopt_old()\nfunction in the Linux kernel's Bluetooth implementation. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2011-1078, Low)\n\nRed Hat would like to thank Vasiliy Kulikov of Openwall for reporting the\nCVE-2011-1078 issue.\n\nThis update also fixes several bugs. Documentation for these changes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues, and fix the bugs noted in the Technical\nNotes. The system must be rebooted for this update to take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2012-August/030841.html\n\n**Affected packages:**\nkernel\nkernel-debug\nkernel-debug-devel\nkernel-devel\nkernel-doc\nkernel-firmware\nkernel-headers\nperf\npython-perf\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2012-1156.html", "edition": 3, "modified": "2012-08-15T04:21:07", "published": "2012-08-15T04:21:07", "href": "http://lists.centos.org/pipermail/centos-announce/2012-August/030841.html", "id": "CESA-2012:1156", "title": "kernel, perf, python security update", "type": "centos", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-12-20T18:27:16", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1078", "CVE-2011-1494", "CVE-2011-1166", "CVE-2011-1079", "CVE-2011-1495", "CVE-2011-1163", "CVE-2011-1093", "CVE-2011-1170", "CVE-2011-1172", "CVE-2011-1171", "CVE-2011-0726", "CVE-2011-1763", "CVE-2011-1080", "CVE-2011-1577"], "description": "**CentOS Errata and Security Advisory** CESA-2011:0833\n\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* A flaw in the dccp_rcv_state_process() function could allow a remote\nattacker to cause a denial of service, even when the socket was already\nclosed. (CVE-2011-1093, Important)\n\n* Multiple buffer overflow flaws were found in the Linux kernel's\nManagement Module Support for Message Passing Technology (MPT) based\ncontrollers. A local, unprivileged user could use these flaws to cause a\ndenial of service, an information leak, or escalate their privileges.\n(CVE-2011-1494, CVE-2011-1495, Important)\n\n* A missing validation of a null-terminated string data structure element\nin the bnep_sock_ioctl() function could allow a local user to cause an\ninformation leak or a denial of service. (CVE-2011-1079, Moderate)\n\n* Missing error checking in the way page tables were handled in the Xen\nhypervisor implementation could allow a privileged guest user to cause the\nhost, and the guests, to lock up. (CVE-2011-1166, Moderate)\n\n* A flaw was found in the way the Xen hypervisor implementation checked for\nthe upper boundary when getting a new event channel port. A privileged\nguest user could use this flaw to cause a denial of service or escalate\ntheir privileges. (CVE-2011-1763, Moderate)\n\n* The start_code and end_code values in \"/proc/[pid]/stat\" were not\nprotected. In certain scenarios, this flaw could be used to defeat Address\nSpace Layout Randomization (ASLR). (CVE-2011-0726, Low)\n\n* A missing initialization flaw in the sco_sock_getsockopt() function could\nallow a local, unprivileged user to cause an information leak.\n(CVE-2011-1078, Low)\n\n* A missing validation of a null-terminated string data structure element\nin the do_replace() function could allow a local user who has the\nCAP_NET_ADMIN capability to cause an information leak. (CVE-2011-1080, Low)\n\n* A buffer overflow flaw in the DEC Alpha OSF partition implementation in\nthe Linux kernel could allow a local attacker to cause an information leak\nby mounting a disk that contains specially-crafted partition tables.\n(CVE-2011-1163, Low)\n\n* Missing validations of null-terminated string data structure elements in\nthe do_replace(), compat_do_replace(), do_ipt_get_ctl(), do_ip6t_get_ctl(),\nand do_arpt_get_ctl() functions could allow a local user who has the\nCAP_NET_ADMIN capability to cause an information leak. (CVE-2011-1170,\nCVE-2011-1171, CVE-2011-1172, Low)\n\n* A heap overflow flaw in the Linux kernel's EFI GUID Partition Table (GPT)\nimplementation could allow a local attacker to cause a denial of service\nby mounting a disk that contains specially-crafted partition tables.\n(CVE-2011-1577, Low)\n\nRed Hat would like to thank Dan Rosenberg for reporting CVE-2011-1494 and\nCVE-2011-1495; Vasiliy Kulikov for reporting CVE-2011-1079, CVE-2011-1078,\nCVE-2011-1080, CVE-2011-1170, CVE-2011-1171, and CVE-2011-1172; Kees Cook\nfor reporting CVE-2011-0726; and Timo Warns for reporting CVE-2011-1163\nand CVE-2011-1577.\n\nThis update also fixes several bugs. Documentation for these bug fixes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues, and fix the bugs noted in the Technical\nNotes. The system must be rebooted for this update to take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2011-May/029647.html\nhttp://lists.centos.org/pipermail/centos-announce/2011-May/029648.html\n\n**Affected packages:**\nkernel\nkernel-PAE\nkernel-PAE-devel\nkernel-debug\nkernel-debug-devel\nkernel-devel\nkernel-doc\nkernel-headers\nkernel-xen\nkernel-xen-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2011-0833.html", "edition": 3, "modified": "2011-05-31T23:49:25", "published": "2011-05-31T23:49:24", "href": "http://lists.centos.org/pipermail/centos-announce/2011-May/029647.html", "id": "CESA-2011:0833", "title": "kernel security update", "type": "centos", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:47", "bulletinFamily": "software", "cvelist": ["CVE-2012-2375", "CVE-2012-2319", "CVE-2012-2313", "CVE-2012-2384", "CVE-2012-2383"], "description": "DoS, privilege escalation.", "edition": 1, "modified": "2012-07-09T00:00:00", "published": "2012-07-09T00:00:00", "id": "SECURITYVULNS:VULN:12462", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:12462", "title": "Linux kernel multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:45", "bulletinFamily": "software", "cvelist": ["CVE-2012-2133", "CVE-2012-2319", "CVE-2012-2313", "CVE-2012-2384", "CVE-2012-2383", "CVE-2012-2121"], "description": "==========================================================================\r\nUbuntu Security Notice USN-1473-1\r\nJune 13, 2012\r\n\r\nlinux vulnerabilities\r\n==========================================================================\r\n\r\nA security issue affects these releases of Ubuntu and its derivatives:\r\n\r\n- Ubuntu 12.04 LTS\r\n\r\nSummary:\r\n\r\nSeveral security issues were fixed in the kernel.\r\n\r\nSoftware Description:\r\n- linux: Linux kernel\r\n\r\nDetails:\r\n\r\nA flaw was discovered in the Linux kernel's KVM (kernel virtual machine).\r\nAn administrative user in the guest OS could leverage this flaw to cause a\r\ndenial of service in the host OS. (CVE-2012-2121)\r\n\r\nSchacher Raindel discovered a flaw in the Linux kernel's memory handling\r\nwhen hugetlb is enabled. An unprivileged local attacker could exploit this\r\nflaw to cause a denial of service and potentially gain higher privileges.\r\n(CVE-2012-2133)\r\n\r\nStephan Mueller reported a flaw in the Linux kernel's dl2k network driver's\r\nhandling of ioctls. An unprivileged local user could leverage this flaw to\r\ncause a denial of service. (CVE-2012-2313)\r\n\r\nTimo Warns reported multiple flaws in the Linux kernel's hfsplus\r\nfilesystem. An unprivileged local user could exploit these flaws to gain\r\nroot system priviliges. (CVE-2012-2319)\r\n\r\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver\r\nhandling of cliprect on 32 bit systems. An unprivileged local attacker\r\ncould leverage this flaw to cause a denial of service or potentially gain\r\nroot privileges. (CVE-2012-2383)\r\n\r\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver\r\nhandling of buffer_count on 32 bit systems. An unprivileged local attacker\r\ncould leverage this flaw to cause a denial of service or potentially gain\r\nroot privileges. (CVE-2012-2384)\r\n\r\nUpdate instructions:\r\n\r\nThe problem can be corrected by updating your system to the following\r\npackage versions:\r\n\r\nUbuntu 12.04 LTS:\r\n linux-image-3.2.0-25-generic 3.2.0-25.40\r\n linux-image-3.2.0-25-generic-pae 3.2.0-25.40\r\n linux-image-3.2.0-25-highbank 3.2.0-25.40\r\n linux-image-3.2.0-25-omap 3.2.0-25.40\r\n linux-image-3.2.0-25-powerpc-smp 3.2.0-25.40\r\n linux-image-3.2.0-25-powerpc64-smp 3.2.0-25.40\r\n linux-image-3.2.0-25-virtual 3.2.0-25.40\r\n\r\nAfter a standard system update you need to reboot your computer to make\r\nall the necessary changes.\r\n\r\nATTENTION: Due to an unavoidable ABI change the kernel updates have\r\nbeen given a new version number, which requires you to recompile and\r\nreinstall all third party kernel modules you might have installed. If\r\nyou use linux-restricted-modules, you have to update that package as\r\nwell to get modules which work with the new kernel version. Unless you\r\nmanually uninstalled the standard kernel metapackages (e.g. linux-generic,\r\nlinux-server, linux-powerpc), a standard system upgrade will automatically\r\nperform this as well.\r\n\r\nReferences:\r\n http://www.ubuntu.com/usn/usn-1473-1\r\n CVE-2012-2121, CVE-2012-2133, CVE-2012-2313, CVE-2012-2319,\r\n CVE-2012-2383, CVE-2012-2384\r\n\r\nPackage Information:\r\n https://launchpad.net/ubuntu/+source/linux/3.2.0-25.40\r\n", "edition": 1, "modified": "2012-07-09T00:00:00", "published": "2012-07-09T00:00:00", "id": "SECURITYVULNS:DOC:28266", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:28266", "title": "[USN-1473-1] Linux kernel vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:54", "bulletinFamily": "software", "cvelist": ["CVE-2010-4008", "CVE-2012-2375", "CVE-2011-3188", "CVE-2011-2723", "CVE-2011-4110", "CVE-2011-2518", "CVE-2013-6206", "CVE-2011-2492", "CVE-2012-2137", "CVE-2013-6205", "CVE-2012-2313", "CVE-2011-2182", "CVE-2012-2373", "CVE-2012-2384", "CVE-2010-4494", "CVE-2011-4077", "CVE-2011-2213", "CVE-2011-2689", "CVE-2012-2383", "CVE-2012-1179", "CVE-2012-0879", "CVE-2012-1088", "CVE-2012-2372", "CVE-2012-0058"], "description": "Multiple different vulnerabilities.", "edition": 1, "modified": "2014-03-27T00:00:00", "published": "2014-03-27T00:00:00", "id": "SECURITYVULNS:VULN:13641", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13641", "title": "HP Rapid Deployment Pack / HP Insight Control Server Deployment multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:51", "bulletinFamily": "software", "cvelist": ["CVE-2010-4008", "CVE-2012-2375", "CVE-2011-3188", "CVE-2011-2723", "CVE-2011-4110", "CVE-2011-2518", "CVE-2013-6206", "CVE-2011-2492", "CVE-2012-2137", "CVE-2013-6205", "CVE-2012-2313", "CVE-2011-2182", "CVE-2012-2373", "CVE-2012-2384", "CVE-2010-4494", "CVE-2011-4077", "CVE-2011-2213", "CVE-2011-2689", "CVE-2012-2383", "CVE-2012-1179", "CVE-2012-0879", "CVE-2012-1088", "CVE-2012-2372", "CVE-2012-0058"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\nNote: the current version of the following document is available here:\r\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\r\ndocDisplay?docId=emr_na-c04135307\r\n\r\nSUPPORT COMMUNICATION - SECURITY BULLETIN\r\n\r\nDocument ID: c04135307\r\nVersion: 1\r\n\r\nHPSBGN02970 rev.1 - HP Rapid Deployment Pack (RDP) or HP Insight Control\r\nServer Deployment, Multiple Remote Vulnerabilities affecting Confidentiality,\r\nIntegrity and Availability\r\n\r\nNOTICE: The information in this Security Bulletin should be acted upon as\r\nsoon as possible.\r\n\r\nRelease Date: 2014-03-10\r\nLast Updated: 2014-03-10\r\n\r\nPotential Security Impact: Multiple remote vulnerabilities affecting\r\nconfidentiality, integrity and availability\r\n\r\nSource: Hewlett-Packard Company, HP Software Security Response Team\r\n\r\nVULNERABILITY SUMMARY\r\nPotential vulnerabilities have been identified with HP Rapid Deployment Pack\r\n(RDP) or HP Insight Control Server Deployment. The vulnerabilities could be\r\nexploited remotely affecting confidentiality, integrity and availability.\r\n\r\nReferences: CVE-2010-4008\r\n CVE-2010-4494\r\n CVE-2011-2182\r\n CVE-2011-2213\r\n CVE-2011-2492\r\n\r\nCVE-2011-2518\r\n CVE-2011-2689\r\n CVE-2011-2723\r\n CVE-2011-3188\r\n CVE-2011-4077\r\n\r\nCVE-2011-4110\r\n CVE-2012-0058\r\n CVE-2012-0879\r\n CVE-2012-1088\r\n CVE-2012-1179\r\n\r\nCVE-2012-2137\r\n CVE-2012-2313\r\n CVE-2012-2372\r\n CVE-2012-2373\r\n CVE-2012-2375\r\n\r\nCVE-2012-2383\r\n CVE-2012-2384\r\n CVE-2013-6205\r\n CVE-2013-6206\r\n SSRT101443\r\n\r\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.\r\n\r\nHP Rapid Deployment Pack (RDP) -- All versions\r\nHP Insight Control Server Deployment -- All versions\r\n\r\nBACKGROUND\r\n\r\nCVSS 2.0 Base Metrics\r\n===========================================================\r\n Reference Base Vector Base Score\r\nCVE-2013-6205 (AV:L/AC:M/Au:S/C:P/I:P/A:P) 4.1\r\nCVE-2013-6206 (AV:N/AC:L/Au:N/C:C/I:P/A:P) 9.0\r\nCVE-2010-4008 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3\r\nCVE-2010-4494 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\r\nCVE-2011-2182 (AV:L/AC:L/Au:N/C:C/I:C/A:C) 7.2\r\nCVE-2011-2213 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9\r\nCVE-2011-2492 (AV:L/AC:M/Au:N/C:P/I:N/A:N) 1.9\r\nCVE-2011-2518 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9\r\nCVE-2011-2689 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9\r\nCVE-2011-2723 (AV:A/AC:M/Au:N/C:N/I:N/A:C) 5.7\r\nCVE-2011-3188 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8\r\nCVE-2011-4077 (AV:L/AC:M/Au:N/C:C/I:C/A:C) 6.9\r\nCVE-2011-4110 (AV:L/AC:L/Au:N/C:N/I:N/A:P) 2.1\r\nCVE-2012-0058 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9\r\nCVE-2012-0879 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9\r\nCVE-2012-1088 (AV:L/AC:M/Au:N/C:N/I:P/A:P) 3.3\r\nCVE-2012-1179 (AV:A/AC:M/Au:S/C:N/I:N/A:C) 5.2\r\nCVE-2012-2137 (AV:L/AC:M/Au:N/C:C/I:C/A:C) 6.9\r\nCVE-2012-2313 (AV:L/AC:H/Au:N/C:N/I:N/A:P) 1.2\r\nCVE-2012-2372 (AV:L/AC:M/Au:S/C:N/I:N/A:C) 4.4\r\nCVE-2012-2373 (AV:L/AC:H/Au:N/C:N/I:N/A:C) 4.0\r\nCVE-2012-2375 (AV:A/AC:H/Au:N/C:N/I:N/A:C) 4.6\r\nCVE-2012-2383 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9\r\nCVE-2012-2384 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9\r\n===========================================================\r\n Information on CVSS is documented\r\n in HP Customer Notice: HPSN-2008-002\r\n\r\nRESOLUTION\r\n\r\nHP recommends that HP Rapid Deployment Pack (RDP) or HP Insight Control\r\nServer Deployment should only be run on private secure networks to prevent\r\nthe risk of security compromise.\r\n\r\nHISTORY\r\nVersion:1 (rev.1) - 10 March 2014 Initial release\r\n\r\nThird Party Security Patches: Third party security patches that are to be\r\ninstalled on systems running HP software products should be applied in\r\naccordance with the customer's patch management policy.\r\n\r\nSupport: For issues about implementing the recommendations of this Security\r\nBulletin, contact normal HP Services support channel. For other issues about\r\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com.\r\n\r\nReport: To report a potential security vulnerability with any HP supported\r\nproduct, send Email to: security-alert@hp.com\r\n\r\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\r\nalerts via Email:\r\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\r\n\r\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\r\navailable here:\r\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\r\n\r\nSoftware Product Category: The Software Product Category is represented in\r\nthe title by the two characters following HPSB.\r\n\r\n3C = 3COM\r\n3P = 3rd Party Software\r\nGN = HP General Software\r\nHF = HP Hardware and Firmware\r\nMP = MPE/iX\r\nMU = Multi-Platform Software\r\nNS = NonStop Servers\r\nOV = OpenVMS\r\nPI = Printing and Imaging\r\nPV = ProCurve\r\nST = Storage Software\r\nTU = Tru64 UNIX\r\nUX = HP-UX\r\n\r\nCopyright 2014 Hewlett-Packard Development Company, L.P.\r\nHewlett-Packard Company shall not be liable for technical or editorial errors\r\nor omissions contained herein. The information provided is provided "as is"\r\nwithout warranty of any kind. To the extent permitted by law, neither HP or\r\nits affiliates, subcontractors or suppliers will be liable for\r\nincidental,special or consequential damages including downtime cost; lost\r\nprofits; damages relating to the procurement of substitute products or\r\nservices; or damages for loss of data, or software restoration. The\r\ninformation in this document is subject to change without notice.\r\nHewlett-Packard Company and the names of Hewlett-Packard products referenced\r\nherein are trademarks of Hewlett-Packard Company in the United States and\r\nother countries. Other product and company names mentioned herein may be\r\ntrademarks of their respective owners.\r\n\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v2.0.19 (GNU/Linux)\r\n\r\niEYEARECAAYFAlMd70EACgkQ4B86/C0qfVnXowCgnnw+HySvDNjCV7VPwZHplLwc\r\nGw4An38h3204bsbLQN/gJQVEqFTo5IfX\r\n=sWmR\r\n-----END PGP SIGNATURE-----\r\n", "edition": 1, "modified": "2014-03-27T00:00:00", "published": "2014-03-27T00:00:00", "id": "SECURITYVULNS:DOC:30403", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:30403", "title": "[security bulletin] HPSBGN02970 rev.1 - HP Rapid Deployment Pack (RDP) or HP Insight Control Server Deployment, Multiple Remote Vulnerabilities affecting Confidentiality, Integrity and Availability", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:42", "bulletinFamily": "software", "cvelist": ["CVE-2011-1017", "CVE-2011-1476", "CVE-2011-1746", "CVE-2011-0695", "CVE-2011-1160", "CVE-2011-1078", "CVE-2011-1494", "CVE-2011-1478", "CVE-2011-1767", "CVE-2011-1598", "CVE-2011-1173", "CVE-2011-1759", "CVE-2011-2182", "CVE-2011-2022", "CVE-2011-1180", "CVE-2011-1079", "CVE-2011-1770", "CVE-2011-1747", "CVE-2011-1495", "CVE-2011-1163", "CVE-2011-1016", "CVE-2011-1593", "CVE-2011-1170", "CVE-2011-1172", "CVE-2011-1748", "CVE-2011-1171", "CVE-2011-1477", "CVE-2011-1493", "CVE-2011-0726", "CVE-2011-1745", "CVE-2011-1182", "CVE-2011-1090", "CVE-2011-1080", "CVE-2011-1585"], "description": "DoS via InfiniBand, DoS via InfinyBand disks, multiple DoS conditions, memory corruptions and information leaks, buffer overflow in IrDA, DoS via VLANs, CIFS authentication bypass, DoS via GRE.", "edition": 1, "modified": "2011-05-26T00:00:00", "published": "2011-05-26T00:00:00", "id": "SECURITYVULNS:VULN:11656", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:11656", "title": "Linux kernel security vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:40", "bulletinFamily": "software", "cvelist": ["CVE-2011-1476", "CVE-2011-1746", "CVE-2011-0695", "CVE-2011-1160", "CVE-2011-1078", "CVE-2011-1494", "CVE-2011-1478", "CVE-2011-1776", "CVE-2011-1767", "CVE-2011-1598", "CVE-2010-3875", "CVE-2011-1173", "CVE-2011-1759", "CVE-2011-0711", "CVE-2011-2022", "CVE-2011-1180", "CVE-2011-1079", "CVE-2011-1770", "CVE-2011-1495", "CVE-2011-1163", "CVE-2011-1016", "CVE-2011-1593", "CVE-2011-1170", "CVE-2011-1172", "CVE-2011-1748", "CVE-2011-1171", "CVE-2011-1477", "CVE-2011-1493", "CVE-2011-0726", "CVE-2011-1745", "CVE-2011-1182", "CVE-2011-1090", "CVE-2011-1080", "CVE-2011-1585"], "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n- ----------------------------------------------------------------------\r\nDebian Security Advisory DSA-2240-1 security@debian.org\r\nhttp://www.debian.org/security/ dann frazier\r\nMay 24, 2011 http://www.debian.org/security/faq\r\n- ----------------------------------------------------------------------\r\n\r\nPackage : linux-2.6\r\nVulnerability : privilege escalation/denial of service/information leak\r\nProblem type : local/remote\r\nDebian-specific: no\r\nCVE Id(s) : CVE-2010-3875 CVE-2011-0695 CVE-2011-0711 CVE-2011-0726\r\n CVE-2011-1016 CVE-2011-1078 CVE-2011-1079 CVE-2011-1080\r\n CVE-2011-1090 CVE-2011-1160 CVE-2011-1163 CVE-2011-1170\r\n CVE-2011-1171 CVE-2011-1172 CVE-2011-1173 CVE-2011-1180\r\n CVE-2011-1182 CVE-2011-1476 CVE-2011-1477 CVE-2011-1478\r\n CVE-2011-1493 CVE-2011-1494 CVE-2011-1495 CVE-2011-1585\r\n CVE-2011-1593 CVE-2011-1598 CVE-2011-1745 CVE-2011-1746\r\n CVE-2011-1748 CVE-2011-1759 CVE-2011-1767 CVE-2011-1770\r\n CVE-2011-1776 CVE-2011-2022\r\nDebian Bug(s) : \r\n \r\nSeveral vulnerabilities have been discovered in the Linux kernel that may lead\r\nto a denial of service or privilege escalation. The Common Vulnerabilities and\r\nExposures project identifies the following problems:\r\n\r\nCVE-2010-3875\r\n\r\n Vasiliy Kulikov discovered an issue in the Linux implementation of the\r\n Amateur Radio AX.25 Level 2 protocol. Local users may obtain access to\r\n sensitive kernel memory.\r\n\r\nCVE-2011-0695\r\n\r\n Jens Kuehnel reported an issue in the InfiniBand stack. Remote attackers can\r\n exploit a race condition to cause a denial of service (kernel panic).\r\n\r\nCVE-2011-0711\r\n\r\n Dan Rosenberg reported an issue in the XFS filesystem. Local users may\r\n obtain access to sensitive kernel memory.\r\n\r\nCVE-2011-0726\r\n\r\n Kees Cook reported an issue in the /proc/pid/stat implementation. Local\r\n users could learn the text location of a process, defeating protections\r\n provided by address space layout randomization (ASLR).\r\n\r\nCVE-2011-1016\r\n\r\n Marek Olsak discovered an issue in the driver for ATI/AMD Radeon video\r\n chips. Local users could pass arbitrary values to video memory and the\r\n graphics translation table, resulting in denial of service or escalated\r\n privileges. On default Debian installations, this is exploitable only by\r\n members of the 'video' group.\r\n\r\nCVE-2011-1078\r\n\r\n Vasiliy Kulikov discovered an issue in the Bluetooth subsystem. Local users\r\n can obtain access to sensitive kernel memory.\r\n\r\nCVE-2011-1079\r\n\r\n Vasiliy Kulikov discovered an issue in the Bluetooth subsystem. Local users\r\n with the CAP_NET_ADMIN capability can cause a denial of service (kernel\r\n Oops).\r\n \r\nCVE-2011-1080\r\n\r\n Vasiliy Kulikov discovered an issue in the Netfilter subsystem. Local users\r\n can obtain access to sensitive kernel memory.\r\n\r\nCVE-2011-1090\r\n\r\n Neil Horman discovered a memory leak in the setacl() call on NFSv4\r\n filesystems. Local users can explot this to cause a denial of service\r\n (Oops).\r\n\r\nCVE-2011-1160\r\n\r\n Peter Huewe reported an issue in the Linux kernel's support for TPM security\r\n chips. Local users with permission to open the device can gain access to\r\n sensitive kernel memory.\r\n\r\nCVE-2011-1163\r\n\r\n Timo Warns reported an issue in the kernel support for Alpha OSF format disk\r\n partitions. Users with physical access can gain access to sensitive kernel\r\n memory by adding a storage device with a specially crafted OSF partition.\r\n\r\nCVE-2011-1170\r\n\r\n Vasiliy Kulikov reported an issue in the Netfilter arp table\r\n implementation. Local users with the CAP_NET_ADMIN capability can gain\r\n access to sensitive kernel memory.\r\n\r\nCVE-2011-1171\r\n\r\n Vasiliy Kulikov reported an issue in the Netfilter IP table\r\n implementation. Local users with the CAP_NET_ADMIN capability can gain\r\n access to sensitive kernel memory.\r\n \r\nCVE-2011-1172\r\n\r\n Vasiliy Kulikov reported an issue in the Netfilter IP6 table\r\n implementation. Local users with the CAP_NET_ADMIN capability can gain\r\n access to sensitive kernel memory.\r\n \r\nCVE-2011-1173\r\n\r\n Vasiliy Kulikov reported an issue in the Acorn Econet protocol\r\n implementation. Local users can obtain access to sensitive kernel memory on\r\n systems that use this rare hardware.\r\n\r\nCVE-2011-1180\r\n\r\n Dan Rosenberg reported a buffer overflow in the Information Access Service\r\n of the IrDA protocol, used for Infrared devices. Remote attackers within IR\r\n device range can cause a denial of service or possibly gain elevated\r\n privileges.\r\n\r\nCVE-2011-1182\r\n\r\n Julien Tinnes reported an issue in the rt_sigqueueinfo interface. Local\r\n users can generate signals with falsified source pid and uid information.\r\n\r\nCVE-2011-1476\r\n\r\n Dan Rosenberg reported issues in the Open Sound System MIDI interface that\r\n allow local users to cause a denial of service. This issue does not affect\r\n official Debian Linux image packages as they no longer provide support for\r\n OSS. However, custom kernels built from Debians linux-source-2.6.32 may\r\n have enabled this configuration and would therefore be vulnerable.\r\n\r\nCVE-2011-1477\r\n\r\n Dan Rosenberg reported issues in the Open Sound System driver for cards that\r\n include a Yamaha FM synthesizer chip. Local users can cause memory\r\n corruption resulting in a denial of service. This issue does not affect\r\n official Debian Linux image packages as they no longer provide support for\r\n OSS. However, custom kernels built from Debians linux-source-2.6.32 may\r\n have enabled this configuration and would therefore be vulnerable.\r\n\r\nCVE-2011-1478\r\n\r\n Ryan Sweat reported an issue in the Generic Receive Offload (GRO) support in\r\n the Linux networking subsystem. If an interface has GRO enabled and is\r\n running in promiscuous mode, remote users can cause a denial of service\r\n (NULL pointer dereference) by sending packets on an unknown VLAN.\r\n\r\nCVE-2011-1493\r\n\r\n Dan Rosenburg reported two issues in the Linux implementation of the Amateur\r\n Radio X.25 PLP (Rose) protocol. A remote user can cause a denial of service\r\n by providing specially crafted facilities fields.\r\n\r\nCVE-2011-1494\r\n\r\n Dan Rosenberg reported an issue in the /dev/mpt2ctl interface provided by\r\n the driver for LSI MPT Fusion SAS 2.0 controllers. Local users can obtain\r\n elevated privileges by specially crafted ioctl calls. On default Debian\r\n installations this is not exploitable as this interface is only accessible\r\n to root.\r\n\r\nCVE-2011-1495\r\n\r\n Dan Rosenberg reported two additional issues in the /dev/mpt2ctl interface\r\n provided by the driver for LSI MPT Fusion SAS 2.0 controllers. Local users\r\n can obtain elevated privileges and ready arbitrary kernel memory by using\r\n specially crafted ioctl calls. On default Debian installations this is not\r\n exploitable as this interface is only accessible to root.\r\n\r\nCVE-2011-1585\r\n\r\n Jeff Layton reported an issue in the Common Internet File System (CIFS).\r\n Local users can bypass authentication requirements for shares that are\r\n already mounted by another user.\r\n\r\nCVE-2011-1593\r\n\r\n Robert Swiecki reported a signednes issue in the next_pidmap() function,\r\n which can be exploited my local users to cause a denial of service.\r\n\r\nCVE-2011-1598\r\n\r\n Dave Jones reported an issue in the Broadcast Manager Controller Area\r\n Network (CAN/BCM) protocol that may allow local users to cause a NULL\r\n pointer dereference, resulting in a denial of service.\r\n\r\nCVE-2011-1745\r\n\r\n Vasiliy Kulikov reported an issue in the Linux support for AGP devices.\r\n Local users can obtain elevated privileges or cause a denial of service due\r\n to missing bounds checking in the AGPIOC_BIND ioctl. On default Debian\r\n installations, this is exploitable only by users in the video group.\r\n\r\nCVE-2011-1746\r\n\r\n Vasiliy Kulikov reported an issue in the Linux support for AGP devices.\r\n Local users can obtain elevated privileges or cause a denial of service due\r\n to missing bounds checking in the agp_allocate_memory and\r\n agp_create_user_memory. On default Debian installations, this is exploitable\r\n only by users in the video group.\r\n\r\nCVE-2011-1748\r\n\r\n Oliver Kartkopp reported an issue in the Controller Area Network (CAN) raw\r\n socket implementation which permits ocal users to cause a NULL pointer\r\n dereference, resulting in a denial of service.\r\n \r\nCVE-2011-1759\r\n\r\n Dan Rosenberg reported an issue in the support for executing "old ABI"\r\n binaries on ARM processors. Local users can obtain elevated privileges due\r\n to insufficient bounds checking in the semtimedop system call.\r\n\r\nCVE-2011-1767\r\n\r\n Alexecy Dobriyan reported an issue in the GRE over IP implementation.\r\n Remote users can cause a denial of service by sending a packet during module\r\n initialization.\r\n\r\nCVE-2011-1770\r\n\r\n Dan Rosenberg reported an issue in the Datagram Congestion Control Protocol\r\n (DCCP). Remote users can cause a denial of service or potentially obtain\r\n access to sensitive kernel memory.\r\n\r\nCVE-2011-1776\r\n\r\n Timo Warns reported an issue in the Linux implementation for GUID\r\n partitions. Users with physical access can gain access to sensitive kernel\r\n memory by adding a storage device with a specially crafted corrupted invalid\r\n partition table.\r\n\r\nCVE-2011-2022\r\n\r\n Vasiliy Kulikov reported an issue in the Linux support for AGP devices.\r\n Local users can obtain elevated privileges or cause a denial of service due\r\n to missing bounds checking in the AGPIOC_UNBIND ioctl. On default Debian\r\n installations, this is exploitable only by users in the video group.\r\n\r\nThis update also includes changes queued for the next point release of\r\nDebian 6.0, which also fix various non-security issues. These additional\r\nchanges are described in the package changelog which can be viewed at:\r\n\r\n http://packages.debian.org/changelogs/pool/main/l/linux-2.6/linux-2.6_26.32-34/changelog\r\n\r\nFor the stable distribution (squeeze), this problem has been fixed in version\r\n2.6.32-34squeeze1. Updates for issues impacting the oldstable distribution\r\n(lenny) will be available soon.\r\n\r\nThe following matrix lists additional source packages that were rebuilt for\r\ncompatibility with or to take advantage of this update:\r\n\r\n Debian 6.0 (squeeze)\r\n user-mode-linux 2.6.32-1um-4+34squeeze1\r\n\r\nWe recommend that you upgrade your linux-2.6 and user-mode-linux packages\r\n\r\nFurther information about Debian Security Advisories, how to apply\r\nthese updates to your system and frequently asked questions can be\r\nfound at: http://www.debian.org/security/\r\n\r\nMailing list: debian-security-announce@lists.debian.org\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.11 (GNU/Linux)\r\n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\r\nKRI5f0ds95H6TsEoTSmO\r\n=gx2x\r\n-----END PGP SIGNATURE-----\r\n", "edition": 1, "modified": "2011-05-26T00:00:00", "published": "2011-05-26T00:00:00", "id": "SECURITYVULNS:DOC:26416", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:26416", "title": "[SECURITY] [DSA 2240-1] linux-2.6 security update", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "ubuntu": [{"lastseen": "2020-07-02T11:38:33", "bulletinFamily": "unix", "cvelist": ["CVE-2012-2133", "CVE-2012-2319", "CVE-2012-2313", "CVE-2012-2384", "CVE-2012-2383", "CVE-2012-2121"], "description": "A flaw was discovered in the Linux kernel's KVM (kernel virtual machine). \nAn administrative user in the guest OS could leverage this flaw to cause a \ndenial of service in the host OS. (CVE-2012-2121)\n\nSchacher Raindel discovered a flaw in the Linux kernel's memory handling \nwhen hugetlb is enabled. An unprivileged local attacker could exploit this \nflaw to cause a denial of service and potentially gain higher privileges. \n(CVE-2012-2133)\n\nStephan Mueller reported a flaw in the Linux kernel's dl2k network driver's \nhandling of ioctls. An unprivileged local user could leverage this flaw to \ncause a denial of service. (CVE-2012-2313)\n\nTimo Warns reported multiple flaws in the Linux kernel's hfsplus \nfilesystem. An unprivileged local user could exploit these flaws to gain \nroot system priviliges. (CVE-2012-2319)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver \nhandling of cliprect on 32 bit systems. An unprivileged local attacker \ncould leverage this flaw to cause a denial of service or potentially gain \nroot privileges. (CVE-2012-2383)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver \nhandling of buffer_count on 32 bit systems. An unprivileged local attacker \ncould leverage this flaw to cause a denial of service or potentially gain \nroot privileges. (CVE-2012-2384)", "edition": 5, "modified": "2012-06-13T00:00:00", "published": "2012-06-13T00:00:00", "id": "USN-1474-1", "href": "https://ubuntu.com/security/notices/USN-1474-1", "title": "Linux kernel (OMAP4) vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-02T11:38:04", "bulletinFamily": "unix", "cvelist": ["CVE-2012-2133", "CVE-2012-2319", "CVE-2012-2313", "CVE-2012-2384", "CVE-2012-2383", "CVE-2012-2121"], "description": "A flaw was discovered in the Linux kernel's KVM (kernel virtual machine). \nAn administrative user in the guest OS could leverage this flaw to cause a \ndenial of service in the host OS. (CVE-2012-2121)\n\nSchacher Raindel discovered a flaw in the Linux kernel's memory handling \nwhen hugetlb is enabled. An unprivileged local attacker could exploit this \nflaw to cause a denial of service and potentially gain higher privileges. \n(CVE-2012-2133)\n\nStephan Mueller reported a flaw in the Linux kernel's dl2k network driver's \nhandling of ioctls. An unprivileged local user could leverage this flaw to \ncause a denial of service. (CVE-2012-2313)\n\nTimo Warns reported multiple flaws in the Linux kernel's hfsplus \nfilesystem. An unprivileged local user could exploit these flaws to gain \nroot system priviliges. (CVE-2012-2319)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver \nhandling of cliprect on 32 bit systems. An unprivileged local attacker \ncould leverage this flaw to cause a denial of service or potentially gain \nroot privileges. (CVE-2012-2383)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver \nhandling of buffer_count on 32 bit systems. An unprivileged local attacker \ncould leverage this flaw to cause a denial of service or potentially gain \nroot privileges. (CVE-2012-2384)", "edition": 5, "modified": "2012-06-13T00:00:00", "published": "2012-06-13T00:00:00", "id": "USN-1473-1", "href": "https://ubuntu.com/security/notices/USN-1473-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-09T00:31:56", "bulletinFamily": "unix", "cvelist": ["CVE-2011-4131", "CVE-2012-2133", "CVE-2012-2319", "CVE-2012-2313", "CVE-2012-2384", "CVE-2012-2383", "CVE-2012-2121"], "description": "Andy Adamson discovered a flaw in the Linux kernel's NFSv4 implementation. \nA remote NFS server (attacker) could exploit this flaw to cause a denial of \nservice. (CVE-2011-4131)\n\nA flaw was discovered in the Linux kernel's KVM (kernel virtual machine). \nAn administrative user in the guest OS could leverage this flaw to cause a \ndenial of service in the host OS. (CVE-2012-2121)\n\nSchacher Raindel discovered a flaw in the Linux kernel's memory handling \nwhen hugetlb is enabled. An unprivileged local attacker could exploit this \nflaw to cause a denial of service and potentially gain higher privileges. \n(CVE-2012-2133)\n\nStephan Mueller reported a flaw in the Linux kernel's dl2k network driver's \nhandling of ioctls. An unprivileged local user could leverage this flaw to \ncause a denial of service. (CVE-2012-2313)\n\nTimo Warns reported multiple flaws in the Linux kernel's hfsplus \nfilesystem. An unprivileged local user could exploit these flaws to gain \nroot system priviliges. (CVE-2012-2319)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver \nhandling of cliprect on 32 bit systems. An unprivileged local attacker \ncould leverage this flaw to cause a denial of service or potentially gain \nroot privileges. (CVE-2012-2383)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver \nhandling of buffer_count on 32 bit systems. An unprivileged local attacker \ncould leverage this flaw to cause a denial of service or potentially gain \nroot privileges. (CVE-2012-2384)", "edition": 5, "modified": "2012-06-15T00:00:00", "published": "2012-06-15T00:00:00", "id": "USN-1476-1", "href": "https://ubuntu.com/security/notices/USN-1476-1", "title": "Linux kernel (OMAP4) vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-09T00:30:18", "bulletinFamily": "unix", "cvelist": ["CVE-2011-4131", "CVE-2012-2133", "CVE-2012-2319", "CVE-2012-2313", "CVE-2012-2384", "CVE-2012-2383", "CVE-2012-2121"], "description": "Andy Adamson discovered a flaw in the Linux kernel's NFSv4 implementation. \nA remote NFS server (attacker) could exploit this flaw to cause a denial of \nservice. (CVE-2011-4131)\n\nA flaw was discovered in the Linux kernel's KVM (kernel virtual machine). \nAn administrative user in the guest OS could leverage this flaw to cause a \ndenial of service in the host OS. (CVE-2012-2121)\n\nSchacher Raindel discovered a flaw in the Linux kernel's memory handling \nwhen hugetlb is enabled. An unprivileged local attacker could exploit this \nflaw to cause a denial of service and potentially gain higher privileges. \n(CVE-2012-2133)\n\nStephan Mueller reported a flaw in the Linux kernel's dl2k network driver's \nhandling of ioctls. An unprivileged local user could leverage this flaw to \ncause a denial of service. (CVE-2012-2313)\n\nTimo Warns reported multiple flaws in the Linux kernel's hfsplus \nfilesystem. An unprivileged local user could exploit these flaws to gain \nroot system priviliges. (CVE-2012-2319)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver \nhandling of cliprect on 32 bit systems. An unprivileged local attacker \ncould leverage this flaw to cause a denial of service or potentially gain \nroot privileges. (CVE-2012-2383)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver \nhandling of buffer_count on 32 bit systems. An unprivileged local attacker \ncould leverage this flaw to cause a denial of service or potentially gain \nroot privileges. (CVE-2012-2384)", "edition": 5, "modified": "2012-06-12T00:00:00", "published": "2012-06-12T00:00:00", "id": "USN-1471-1", "href": "https://ubuntu.com/security/notices/USN-1471-1", "title": "Linux kernel (Oneiric backport) vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-09T00:25:14", "bulletinFamily": "unix", "cvelist": ["CVE-2011-4131", "CVE-2012-2133", "CVE-2012-2319", "CVE-2012-2313", "CVE-2012-2384", "CVE-2012-2383", "CVE-2012-2121"], "description": "Andy Adamson discovered a flaw in the Linux kernel's NFSv4 implementation. \nA remote NFS server (attacker) could exploit this flaw to cause a denial of \nservice. (CVE-2011-4131)\n\nA flaw was discovered in the Linux kernel's KVM (kernel virtual machine). \nAn administrative user in the guest OS could leverage this flaw to cause a \ndenial of service in the host OS. (CVE-2012-2121)\n\nSchacher Raindel discovered a flaw in the Linux kernel's memory handling \nwhen hugetlb is enabled. An unprivileged local attacker could exploit this \nflaw to cause a denial of service and potentially gain higher privileges. \n(CVE-2012-2133)\n\nStephan Mueller reported a flaw in the Linux kernel's dl2k network driver's \nhandling of ioctls. An unprivileged local user could leverage this flaw to \ncause a denial of service. (CVE-2012-2313)\n\nTimo Warns reported multiple flaws in the Linux kernel's hfsplus \nfilesystem. An unprivileged local user could exploit these flaws to gain \nroot system priviliges. (CVE-2012-2319)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver \nhandling of cliprect on 32 bit systems. An unprivileged local attacker \ncould leverage this flaw to cause a denial of service or potentially gain \nroot privileges. (CVE-2012-2383)\n\nXi Wang discovered a flaw in the Linux kernel's i915 graphics driver \nhandling of buffer_count on 32 bit systems. An unprivileged local attacker \ncould leverage this flaw to cause a denial of service or potentially gain \nroot privileges. (CVE-2012-2384)", "edition": 5, "modified": "2012-06-12T00:00:00", "published": "2012-06-12T00:00:00", "id": "USN-1472-1", "href": "https://ubuntu.com/security/notices/USN-1472-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-08T23:37:25", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1160", "CVE-2011-1078", "CVE-2011-2492", "CVE-2011-1180", "CVE-2011-1079", "CVE-2011-4913", "CVE-2011-4914", "CVE-2011-1093", "CVE-2011-1020", "CVE-2011-1493", "CVE-2011-1080"], "description": "It was discovered that the /proc filesystem did not correctly handle \npermission changes when programs executed. A local attacker could hold open \nfiles to examine details about programs running with higher privileges, \npotentially increasing the chances of exploiting additional \nvulnerabilities. (CVE-2011-1020)\n\nVasiliy Kulikov discovered that the Bluetooth stack did not correctly clear \nmemory. A local attacker could exploit this to read kernel stack memory, \nleading to a loss of privacy. (CVE-2011-1078)\n\nVasiliy Kulikov discovered that the Bluetooth stack did not correctly check \nthat device name strings were NULL terminated. A local attacker could \nexploit this to crash the system, leading to a denial of service, or leak \ncontents of kernel stack memory, leading to a loss of privacy. \n(CVE-2011-1079)\n\nVasiliy Kulikov discovered that bridge network filtering did not check that \nname fields were NULL terminated. A local attacker could exploit this to \nleak contents of kernel stack memory, leading to a loss of privacy. \n(CVE-2011-1080)\n\nJohan Hovold discovered that the DCCP network stack did not correctly \nhandle certain packet combinations. A remote attacker could send specially \ncrafted network traffic that would crash the system, leading to a denial of \nservice. (CVE-2011-1093)\n\nPeter Huewe discovered that the TPM device did not correctly initialize \nmemory. A local attacker could exploit this to read kernel heap memory \ncontents, leading to a loss of privacy. (CVE-2011-1160)\n\nDan Rosenberg discovered that the IRDA subsystem did not correctly check \ncertain field sizes. If a system was using IRDA, a remote attacker could \nsend specially crafted traffic to crash the system or gain root privileges. \n(CVE-2011-1180)\n\nDan Rosenberg discovered that the X.25 Rose network stack did not correctly \nhandle certain fields. If a system was running with Rose enabled, a remote \nattacker could send specially crafted traffic to gain root privileges. \n(CVE-2011-1493)\n\nIt was discovered that Bluetooth l2cap and rfcomm did not correctly \ninitialize structures. A local attacker could exploit this to read portions \nof the kernel stack, leading to a loss of privacy. (CVE-2011-2492)\n\nDan Rosenberg discovered flaws in the linux Rose (X.25 PLP) layer used by \namateur radio. A local user or a remote user on an X.25 network could \nexploit these flaws to execute arbitrary code as root. (CVE-2011-4913)\n\nBen Hutchings discovered several flaws in the Linux Rose (X.25 PLP) layer. \nA local user or a remote user on an X.25 network could exploit these flaws \nto execute arbitrary code as root. (CVE-2011-4914)", "edition": 5, "modified": "2011-08-19T00:00:00", "published": "2011-08-19T00:00:00", "id": "USN-1189-1", "href": "https://ubuntu.com/security/notices/USN-1189-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-08-08T14:07:56", "bulletinFamily": "unix", "cvelist": ["CVE-2011-0521", "CVE-2010-4529", "CVE-2011-1476", "CVE-2011-0695", "CVE-2011-1160", "CVE-2011-1078", "CVE-2011-1478", "CVE-2011-1012", "CVE-2011-1573", "CVE-2011-1173", "CVE-2010-4656", "CVE-2011-0463", "CVE-2011-4611", "CVE-2011-0711", "CVE-2010-4263", "CVE-2011-1180", "CVE-2011-3359", "CVE-2011-1079", "CVE-2011-0712", "CVE-2011-1019", "CVE-2010-4243", "CVE-2011-4913", "CVE-2011-1013", "CVE-2010-4342", "CVE-2011-1093", "CVE-2011-1010", "CVE-2011-1016", "CVE-2011-1170", "CVE-2011-1172", "CVE-2011-1171", "CVE-2011-1082", "CVE-2011-1477", "CVE-2011-2534", "CVE-2011-0726", "CVE-2011-1182", "CVE-2010-4565", "CVE-2011-1080"], "description": "Brad Spengler discovered that the kernel did not correctly account for \nuserspace memory allocations during exec() calls. A local attacker could \nexploit this to consume all system memory, leading to a denial of service. \n(CVE-2010-4243)\n\nAlexander Duyck discovered that the Intel Gigabit Ethernet driver did not \ncorrectly handle certain configurations. If such a device was configured \nwithout VLANs, a remote attacker could crash the system, leading to a \ndenial of service. (CVE-2010-4263)\n\nNelson Elhage discovered that Econet did not correctly handle AUN packets \nover UDP. A local attacker could send specially crafted traffic to crash \nthe system, leading to a denial of service. (CVE-2010-4342)\n\nDan Rosenberg discovered that IRDA did not correctly check the size of \nbuffers. On non-x86 systems, a local attacker could exploit this to read \nkernel heap memory, leading to a loss of privacy. (CVE-2010-4529)\n\nDan Rosenburg discovered that the CAN subsystem leaked kernel addresses \ninto the /proc filesystem. A local attacker could use this to increase the \nchances of a successful memory corruption exploit. (CVE-2010-4565)\n\nKees Cook discovered that the IOWarrior USB device driver did not correctly \ncheck certain size fields. A local attacker with physical access could plug \nin a specially crafted USB device to crash the system or potentially gain \nroot privileges. (CVE-2010-4656)\n\nGoldwyn Rodrigues discovered that the OCFS2 filesystem did not correctly \nclear memory when writing certain file holes. A local attacker could \nexploit this to read uninitialized data from the disk, leading to a loss of \nprivacy. (CVE-2011-0463)\n\nDan Carpenter discovered that the TTPCI DVB driver did not check certain \nvalues during an ioctl. If the dvb-ttpci module was loaded, a local \nattacker could exploit this to crash the system, leading to a denial of \nservice, or possibly gain root privileges. (CVE-2011-0521)\n\nJens Kuehnel discovered that the InfiniBand driver contained a race \ncondition. On systems using InfiniBand, a local attacker could send \nspecially crafted requests to crash the system, leading to a denial of \nservice. (CVE-2011-0695)\n\nDan Rosenberg discovered that XFS did not correctly initialize memory. A \nlocal attacker could make crafted ioctl calls to leak portions of kernel \nstack memory, leading to a loss of privacy. (CVE-2011-0711)\n\nRafael Dominguez Vega discovered that the caiaq Native Instruments USB \ndriver did not correctly validate string lengths. A local attacker with \nphysical access could plug in a specially crafted USB device to crash the \nsystem or potentially gain root privileges. (CVE-2011-0712)\n\nKees Cook reported that /proc/pid/stat did not correctly filter certain \nmemory locations. A local attacker could determine the memory layout of \nprocesses in an attempt to increase the chances of a successful memory \ncorruption exploit. (CVE-2011-0726)\n\nTimo Warns discovered that MAC partition parsing routines did not correctly \ncalculate block counts. A local attacker with physical access could plug in \na specially crafted block device to crash the system or potentially gain \nroot privileges. (CVE-2011-1010)\n\nTimo Warns discovered that LDM partition parsing routines did not correctly \ncalculate block counts. A local attacker with physical access could plug in \na specially crafted block device to crash the system, leading to a denial \nof service. (CVE-2011-1012)\n\nMatthiew Herrb discovered that the drm modeset interface did not correctly \nhandle a signed comparison. A local attacker could exploit this to crash \nthe system or possibly gain root privileges. (CVE-2011-1013)\n\nMarek Ol\u0161\u00e1k discovered that the Radeon GPU drivers did not correctly \nvalidate certain registers. On systems with specific hardware, a local \nattacker could exploit this to write to arbitrary video memory. \n(CVE-2011-1016)\n\nVasiliy Kulikov discovered that the CAP_SYS_MODULE capability was not \nneeded to load kernel modules. A local attacker with the CAP_NET_ADMIN \ncapability could load existing kernel modules, possibly increasing the \nattack surface available on the system. (CVE-2011-1019)\n\nVasiliy Kulikov discovered that the Bluetooth stack did not correctly clear \nmemory. A local attacker could exploit this to read kernel stack memory, \nleading to a loss of privacy. (CVE-2011-1078)\n\nVasiliy Kulikov discovered that the Bluetooth stack did not correctly check \nthat device name strings were NULL terminated. A local attacker could \nexploit this to crash the system, leading to a denial of service, or leak \ncontents of kernel stack memory, leading to a loss of privacy. \n(CVE-2011-1079)\n\nVasiliy Kulikov discovered that bridge network filtering did not check that \nname fields were NULL terminated. A local attacker could exploit this to \nleak contents of kernel stack memory, leading to a loss of privacy. \n(CVE-2011-1080)\n\nNelson Elhage discovered that the epoll subsystem did not correctly handle \ncertain structures. A local attacker could create malicious requests that \nwould hang the system, leading to a denial of service. (CVE-2011-1082)\n\nJohan Hovold discovered that the DCCP network stack did not correctly \nhandle certain packet combinations. A remote attacker could send specially \ncrafted network traffic that would crash the system, leading to a denial of \nservice. (CVE-2011-1093)\n\nPeter Huewe discovered that the TPM device did not correctly initialize \nmemory. A local attacker could exploit this to read kernel heap memory \ncontents, leading to a loss of privacy. (CVE-2011-1160)\n\nVasiliy Kulikov discovered that the netfilter code did not check certain \nstrings copied from userspace. A local attacker with netfilter access could \nexploit this to read kernel memory or crash the system, leading to a denial \nof service. (CVE-2011-1170, CVE-2011-1171, CVE-2011-1172, CVE-2011-2534)\n\nVasiliy Kulikov discovered that the Acorn Universal Networking driver did \nnot correctly initialize memory. A remote attacker could send specially \ncrafted traffic to read kernel stack memory, leading to a loss of privacy. \n(CVE-2011-1173)\n\nDan Rosenberg discovered that the IRDA subsystem did not correctly check \ncertain field sizes. If a system was using IRDA, a remote attacker could \nsend specially crafted traffic to crash the system or gain root privileges. \n(CVE-2011-1180)\n\nJulien Tinnes discovered that the kernel did not correctly validate the \nsignal structure from tkill(). A local attacker could exploit this to send \nsignals to arbitrary threads, possibly bypassing expected restrictions. \n(CVE-2011-1182)\n\nDan Rosenberg reported errors in the OSS (Open Sound System) MIDI \ninterface. A local attacker on non-x86 systems might be able to cause a \ndenial of service. (CVE-2011-1476)\n\nDan Rosenberg reported errors in the kernel's OSS (Open Sound System) \ndriver for Yamaha FM synthesizer chips. A local user can exploit this to \ncause memory corruption, causing a denial of service or privilege \nescalation. (CVE-2011-1477)\n\nRyan Sweat discovered that the GRO code did not correctly validate memory. \nIn some configurations on systems using VLANs, a remote attacker could send \nspecially crafted traffic to crash the system, leading to a denial of \nservice. (CVE-2011-1478)\n\nIt was discovered that the Stream Control Transmission Protocol (SCTP) \nimplementation incorrectly calculated lengths. If the net.sctp.addip_enable \nvariable was turned on, a remote attacker could send specially crafted \ntraffic to crash the system. (CVE-2011-1573)\n\nA flaw was found in the b43 driver in the Linux kernel. An attacker could \nuse this flaw to cause a denial of service if the system has an active \nwireless interface using the b43 driver. (CVE-2011-3359)\n\nMaynard Johnson discovered that on POWER7, certain speculative events may \nraise a performance monitor exception. A local attacker could exploit this \nto crash the system, leading to a denial of service. (CVE-2011-4611)\n\nDan Rosenberg discovered flaws in the linux Rose (X.25 PLP) layer used by \namateur radio. A local user or a remote user on an X.25 network could \nexploit these flaws to execute arbitrary code as root. (CVE-2011-4913)", "edition": 6, "modified": "2011-06-01T00:00:00", "published": "2011-06-01T00:00:00", "id": "USN-1141-1", "href": "https://ubuntu.com/security/notices/USN-1141-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.9, "vector": "AV:A/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-09T00:35:20", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1017", "CVE-2011-1476", "CVE-2011-2498", "CVE-2011-1746", "CVE-2011-1160", "CVE-2011-1078", "CVE-2011-1494", "CVE-2011-1776", "CVE-2011-1771", "CVE-2011-1598", "CVE-2011-1173", "CVE-2011-1759", "CVE-2011-0463", "CVE-2011-2022", "CVE-2011-1180", "CVE-2011-3359", "CVE-2011-1079", "CVE-2011-1770", "CVE-2011-1495", "CVE-2011-3363", "CVE-2011-4913", "CVE-2010-4250", "CVE-2011-1093", "CVE-2011-1593", "CVE-2011-1170", "CVE-2011-2479", "CVE-2011-1172", "CVE-2011-1748", "CVE-2011-1171", "CVE-2011-1477", "CVE-2011-1479", "CVE-2011-2534", "CVE-2011-1927", "CVE-2011-1745", "CVE-2011-1080", "CVE-2011-2496"], "description": "Aristide Fattori and Roberto Paleari reported a flaw in the Linux kernel's \nhandling of IPv4 icmp packets. A remote user could exploit this to cause a \ndenial of service. (CVE-2011-1927)\n\nGoldwyn Rodrigues discovered that the OCFS2 filesystem did not correctly \nclear memory when writing certain file holes. A local attacker could \nexploit this to read uninitialized data from the disk, leading to a loss of \nprivacy. (CVE-2011-0463)\n\nTimo Warns discovered that the LDM disk partition handling code did not \ncorrectly handle certain values. By inserting a specially crafted disk \ndevice, a local attacker could exploit this to gain root privileges. \n(CVE-2011-1017)\n\nVasiliy Kulikov discovered that the Bluetooth stack did not correctly clear \nmemory. A local attacker could exploit this to read kernel stack memory, \nleading to a loss of privacy. (CVE-2011-1078)\n\nVasiliy Kulikov discovered that the Bluetooth stack did not correctly check \nthat device name strings were NULL terminated. A local attacker could \nexploit this to crash the system, leading to a denial of service, or leak \ncontents of kernel stack memory, leading to a loss of privacy. \n(CVE-2011-1079)\n\nVasiliy Kulikov discovered that bridge network filtering did not check that \nname fields were NULL terminated. A local attacker could exploit this to \nleak contents of kernel stack memory, leading to a loss of privacy. \n(CVE-2011-1080)\n\nJohan Hovold discovered that the DCCP network stack did not correctly \nhandle certain packet combinations. A remote attacker could send specially \ncrafted network traffic that would crash the system, leading to a denial of \nservice. (CVE-2011-1093)\n\nPeter Huewe discovered that the TPM device did not correctly initialize \nmemory. A local attacker could exploit this to read kernel heap memory \ncontents, leading to a loss of privacy. (CVE-2011-1160)\n\nVasiliy Kulikov discovered that the netfilter code did not check certain \nstrings copied from userspace. A local attacker with netfilter access could \nexploit this to read kernel memory or crash the system, leading to a denial \nof service. (CVE-2011-1170, CVE-2011-1171, CVE-2011-1172, CVE-2011-2534)\n\nVasiliy Kulikov discovered that the Acorn Universal Networking driver did \nnot correctly initialize memory. A remote attacker could send specially \ncrafted traffic to read kernel stack memory, leading to a loss of privacy. \n(CVE-2011-1173)\n\nDan Rosenberg discovered that the IRDA subsystem did not correctly check \ncertain field sizes. If a system was using IRDA, a remote attacker could \nsend specially crafted traffic to crash the system or gain root privileges. \n(CVE-2011-1180)\n\nDan Rosenberg reported errors in the OSS (Open Sound System) MIDI \ninterface. A local attacker on non-x86 systems might be able to cause a \ndenial of service. (CVE-2011-1476)\n\nDan Rosenberg reported errors in the kernel's OSS (Open Sound System) \ndriver for Yamaha FM synthesizer chips. A local user can exploit this to \ncause memory corruption, causing a denial of service or privilege \nescalation. (CVE-2011-1477)\n\nIt was discovered that the security fix for CVE-2010-4250 introduced a \nregression. A remote attacker could exploit this to crash the system, \nleading to a denial of service. (CVE-2011-1479)\n\nDan Rosenberg discovered that MPT devices did not correctly validate \ncertain values in ioctl calls. If these drivers were loaded, a local \nattacker could exploit this to read arbitrary kernel memory, leading to a \nloss of privacy. (CVE-2011-1494, CVE-2011-1495)\n\nTavis Ormandy discovered that the pidmap function did not correctly handle \nlarge requests. A local attacker could exploit this to crash the system, \nleading to a denial of service. (CVE-2011-1593)\n\nOliver Hartkopp and Dave Jones discovered that the CAN network driver did \nnot correctly validate certain socket structures. If this driver was \nloaded, a local attacker could crash the system, leading to a denial of \nservice. (CVE-2011-1598, CVE-2011-1748)\n\nVasiliy Kulikov discovered that the AGP driver did not check certain ioctl \nvalues. A local attacker with access to the video subsystem could exploit \nthis to crash the system, leading to a denial of service, or possibly gain \nroot privileges. (CVE-2011-1745, CVE-2011-2022)\n\nVasiliy Kulikov discovered that the AGP driver did not check the size of \ncertain memory allocations. A local attacker with access to the video \nsubsystem could exploit this to run the system out of memory, leading to a \ndenial of service. (CVE-2011-1746)\n\nDan Rosenberg reported an error in the old ABI compatibility layer of ARM \nkernels. A local attacker could exploit this flaw to cause a denial of \nservice or gain root privileges. (CVE-2011-1759)\n\nDan Rosenberg discovered that the DCCP stack did not correctly handle \ncertain packet structures. A remote attacker could exploit this to crash \nthe system, leading to a denial of service. (CVE-2011-1770)\n\nBen Greear discovered that CIFS did not correctly handle direct I/O. A \nlocal attacker with access to a CIFS partition could exploit this to crash \nthe system, leading to a denial of service. (CVE-2011-1771)\n\nTimo Warns discovered that the EFI GUID partition table was not correctly \nparsed. A physically local attacker that could insert mountable devices \ncould exploit this to crash the system or possibly gain root privileges. \n(CVE-2011-1776)\n\nIt was discovered that an mmap() call with the MAP_PRIVATE flag on \n\"/dev/zero\" was incorrectly handled. A local attacker could exploit this to \ncrash the system, leading to a denial of service. (CVE-2011-2479)\n\nRobert Swiecki discovered that mapping extensions were incorrectly handled. \nA local attacker could exploit this to crash the system, leading to a \ndenial of service. (CVE-2011-2496)\n\nThe linux kernel did not properly account for PTE pages when deciding which \ntask to kill in out of memory conditions. A local, unprivileged could \nexploit this flaw to cause a denial of service. (CVE-2011-2498)\n\nA flaw was found in the b43 driver in the Linux kernel. An attacker could \nuse this flaw to cause a denial of service if the system has an active \nwireless interface using the b43 driver. (CVE-2011-3359)\n\nYogesh Sharma discovered that CIFS did not correctly handle UNCs that had \nno prefixpaths. A local attacker with access to a CIFS partition could \nexploit this to crash the system, leading to a denial of service. \n(CVE-2011-3363)\n\nDan Rosenberg discovered flaws in the linux Rose (X.25 PLP) layer used by \namateur radio. A local user or a remote user on an X.25 network could \nexploit these flaws to execute arbitrary code as root. (CVE-2011-4913)", "edition": 5, "modified": "2011-07-13T00:00:00", "published": "2011-07-13T00:00:00", "id": "USN-1167-1", "href": "https://ubuntu.com/security/notices/USN-1167-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-07-08T23:40:30", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1017", "CVE-2011-0521", "CVE-2010-4529", "CVE-2011-1476", "CVE-2011-0695", "CVE-2011-1160", "CVE-2011-1078", "CVE-2011-1494", "CVE-2011-1478", "CVE-2011-1012", "CVE-2011-1173", "CVE-2010-4656", "CVE-2011-0463", "CVE-2011-4611", "CVE-2011-0711", "CVE-2011-2022", "CVE-2011-1180", "CVE-2011-3359", "CVE-2011-1079", "CVE-2011-0712", "CVE-2011-1019", "CVE-2011-1495", "CVE-2011-1169", "CVE-2011-4913", "CVE-2011-1013", "CVE-2011-1093", "CVE-2011-1010", "CVE-2011-1016", "CVE-2011-1593", "CVE-2011-1170", "CVE-2011-1172", "CVE-2011-1748", "CVE-2011-1171", "CVE-2011-1082", "CVE-2011-1477", "CVE-2011-2534", "CVE-2011-0726", "CVE-2011-1745", "CVE-2011-1182", "CVE-2010-4565", "CVE-2011-1080"], "description": "Dan Rosenberg discovered that IRDA did not correctly check the size of \nbuffers. On non-x86 systems, a local attacker could exploit this to read \nkernel heap memory, leading to a loss of privacy. (CVE-2010-4529)\n\nDan Rosenburg discovered that the CAN subsystem leaked kernel addresses \ninto the /proc filesystem. A local attacker could use this to increase the \nchances of a successful memory corruption exploit. (CVE-2010-4565)\n\nKees Cook discovered that the IOWarrior USB device driver did not correctly \ncheck certain size fields. A local attacker with physical access could plug \nin a specially crafted USB device to crash the system or potentially gain \nroot privileges. (CVE-2010-4656)\n\nGoldwyn Rodrigues discovered that the OCFS2 filesystem did not correctly \nclear memory when writing certain file holes. A local attacker could \nexploit this to read uninitialized data from the disk, leading to a loss of \nprivacy. (CVE-2011-0463)\n\nDan Carpenter discovered that the TTPCI DVB driver did not check certain \nvalues during an ioctl. If the dvb-ttpci module was loaded, a local \nattacker could exploit this to crash the system, leading to a denial of \nservice, or possibly gain root privileges. (CVE-2011-0521)\n\nJens Kuehnel discovered that the InfiniBand driver contained a race \ncondition. On systems using InfiniBand, a local attacker could send \nspecially crafted requests to crash the system, leading to a denial of \nservice. (CVE-2011-0695)\n\nDan Rosenberg discovered that XFS did not correctly initialize memory. A \nlocal attacker could make crafted ioctl calls to leak portions of kernel \nstack memory, leading to a loss of privacy. (CVE-2011-0711)\n\nRafael Dominguez Vega discovered that the caiaq Native Instruments USB \ndriver did not correctly validate string lengths. A local attacker with \nphysical access could plug in a specially crafted USB device to crash the \nsystem or potentially gain root privileges. (CVE-2011-0712)\n\nKees Cook reported that /proc/pid/stat did not correctly filter certain \nmemory locations. A local attacker could determine the memory layout of \nprocesses in an attempt to increase the chances of a successful memory \ncorruption exploit. (CVE-2011-0726)\n\nTimo Warns discovered that MAC partition parsing routines did not correctly \ncalculate block counts. A local attacker with physical access could plug in \na specially crafted block device to crash the system or potentially gain \nroot privileges. (CVE-2011-1010)\n\nTimo Warns discovered that LDM partition parsing routines did not correctly \ncalculate block counts. A local attacker with physical access could plug in \na specially crafted block device to crash the system, leading to a denial \nof service. (CVE-2011-1012)\n\nMatthiew Herrb discovered that the drm modeset interface did not correctly \nhandle a signed comparison. A local attacker could exploit this to crash \nthe system or possibly gain root privileges. (CVE-2011-1013)\n\nMarek Ol\u0161\u00e1k discovered that the Radeon GPU drivers did not correctly \nvalidate certain registers. On systems with specific hardware, a local \nattacker could exploit this to write to arbitrary video memory. \n(CVE-2011-1016)\n\nTimo Warns discovered that the LDM disk partition handling code did not \ncorrectly handle certain values. By inserting a specially crafted disk \ndevice, a local attacker could exploit this to gain root privileges. \n(CVE-2011-1017)\n\nVasiliy Kulikov discovered that the CAP_SYS_MODULE capability was not \nneeded to load kernel modules. A local attacker with the CAP_NET_ADMIN \ncapability could load existing kernel modules, possibly increasing the \nattack surface available on the system. (CVE-2011-1019)\n\nVasiliy Kulikov discovered that the Bluetooth stack did not correctly clear \nmemory. A local attacker could exploit this to read kernel stack memory, \nleading to a loss of privacy. (CVE-2011-1078)\n\nVasiliy Kulikov discovered that the Bluetooth stack did not correctly check \nthat device name strings were NULL terminated. A local attacker could \nexploit this to crash the system, leading to a denial of service, or leak \ncontents of kernel stack memory, leading to a loss of privacy. \n(CVE-2011-1079)\n\nVasiliy Kulikov discovered that bridge network filtering did not check that \nname fields were NULL terminated. A local attacker could exploit this to \nleak contents of kernel stack memory, leading to a loss of privacy. \n(CVE-2011-1080)\n\nNelson Elhage discovered that the epoll subsystem did not correctly handle \ncertain structures. A local attacker could create malicious requests that \nwould hang the system, leading to a denial of service. (CVE-2011-1082)\n\nJohan Hovold discovered that the DCCP network stack did not correctly \nhandle certain packet combinations. A remote attacker could send specially \ncrafted network traffic that would crash the system, leading to a denial of \nservice. (CVE-2011-1093)\n\nPeter Huewe discovered that the TPM device did not correctly initialize \nmemory. A local attacker could exploit this to read kernel heap memory \ncontents, leading to a loss of privacy. (CVE-2011-1160)\n\nDan Rosenberg discovered that some ALSA drivers did not correctly check the \nadapter index during ioctl calls. If this driver was loaded, a local \nattacker could make a specially crafted ioctl call to gain root privileges. \n(CVE-2011-1169)\n\nVasiliy Kulikov discovered that the netfilter code did not check certain \nstrings copied from userspace. A local attacker with netfilter access could \nexploit this to read kernel memory or crash the system, leading to a denial \nof service. (CVE-2011-1170, CVE-2011-1171, CVE-2011-1172, CVE-2011-2534)\n\nVasiliy Kulikov discovered that the Acorn Universal Networking driver did \nnot correctly initialize memory. A remote attacker could send specially \ncrafted traffic to read kernel stack memory, leading to a loss of privacy. \n(CVE-2011-1173)\n\nDan Rosenberg discovered that the IRDA subsystem did not correctly check \ncertain field sizes. If a system was using IRDA, a remote attacker could \nsend specially crafted traffic to crash the system or gain root privileges. \n(CVE-2011-1180)\n\nJulien Tinnes discovered that the kernel did not correctly validate the \nsignal structure from tkill(). A local attacker could exploit this to send \nsignals to arbitrary threads, possibly bypassing expected restrictions. \n(CVE-2011-1182)\n\nDan Rosenberg reported errors in the OSS (Open Sound System) MIDI \ninterface. A local attacker on non-x86 systems might be able to cause a \ndenial of service. (CVE-2011-1476)\n\nDan Rosenberg reported errors in the kernel's OSS (Open Sound System) \ndriver for Yamaha FM synthesizer chips. A local user can exploit this to \ncause memory corruption, causing a denial of service or privilege \nescalation. (CVE-2011-1477)\n\nRyan Sweat discovered that the GRO code did not correctly validate memory. \nIn some configurations on systems using VLANs, a remote attacker could send \nspecially crafted traffic to crash the system, leading to a denial of \nservice. (CVE-2011-1478)\n\nDan Rosenberg discovered that MPT devices did not correctly validate \ncertain values in ioctl calls. If these drivers were loaded, a local \nattacker could exploit this to read arbitrary kernel memory, leading to a \nloss of privacy. (CVE-2011-1494, CVE-2011-1495)\n\nTavis Ormandy discovered that the pidmap function did not correctly handle \nlarge requests. A local attacker could exploit this to crash the system, \nleading to a denial of service. (CVE-2011-1593)\n\nVasiliy Kulikov discovered that the AGP driver did not check certain ioctl \nvalues. A local attacker with access to the video subsystem could exploit \nthis to crash the system, leading to a denial of service, or possibly gain \nroot privileges. (CVE-2011-1745, CVE-2011-2022)\n\nOliver Hartkopp and Dave Jones discovered that the CAN network driver did \nnot correctly validate certain socket structures. If this driver was \nloaded, a local attacker could crash the system, leading to a denial of \nservice. (CVE-2011-1748)\n\nA flaw was found in the b43 driver in the Linux kernel. An attacker could \nuse this flaw to cause a denial of service if the system has an active \nwireless interface using the b43 driver. (CVE-2011-3359)\n\nMaynard Johnson discovered that on POWER7, certain speculative events may \nraise a performance monitor exception. A local attacker could exploit this \nto crash the system, leading to a denial of service. (CVE-2011-4611)\n\nDan Rosenberg discovered flaws in the linux Rose (X.25 PLP) layer used by \namateur radio. A local user or a remote user on an X.25 network could \nexploit these flaws to execute arbitrary code as root. (CVE-2011-4913)", "edition": 5, "modified": "2011-06-28T00:00:00", "published": "2011-06-28T00:00:00", "id": "USN-1160-1", "href": "https://ubuntu.com/security/notices/USN-1160-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-07-30T13:34:59", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1017", "CVE-2011-2918", "CVE-2011-4621", "CVE-2011-1476", "CVE-2011-1746", "CVE-2011-1160", "CVE-2011-1078", "CVE-2011-2493", "CVE-2011-1494", "CVE-2011-1771", "CVE-2011-1598", "CVE-2011-2492", "CVE-2011-1173", "CVE-2011-2699", "CVE-2011-0463", "CVE-2011-2484", "CVE-2011-2022", "CVE-2011-1180", "CVE-2011-3359", "CVE-2011-1079", "CVE-2011-1581", "CVE-2011-1770", "CVE-2011-1495", "CVE-2011-4913", "CVE-2011-1833", "CVE-2011-4914", "CVE-2010-4250", "CVE-2011-1020", "CVE-2011-1593", "CVE-2011-1170", "CVE-2011-1172", "CVE-2011-1748", "CVE-2011-1171", "CVE-2011-1477", "CVE-2011-1493", "CVE-2011-2689", "CVE-2011-1479", "CVE-2011-2534", "CVE-2011-3637", "CVE-2011-1745", "CVE-2011-1182", "CVE-2011-1080", "CVE-2011-1577"], "description": "Goldwyn Rodrigues discovered that the OCFS2 filesystem did not correctly \nclear memory when writing certain file holes. A local attacker could \nexploit this to read uninitialized data from the disk, leading to a loss of \nprivacy. (CVE-2011-0463)\n\nTimo Warns discovered that the LDM disk partition handling code did not \ncorrectly handle certain values. By inserting a specially crafted disk \ndevice, a local attacker could exploit this to gain root privileges. \n(CVE-2011-1017)\n\nIt was discovered that the /proc filesystem did not correctly handle \npermission changes when programs executed. A local attacker could hold open \nfiles to examine details about programs running with higher privileges, \npotentially increasing the chances of exploiting additional \nvulnerabilities. (CVE-2011-1020)\n\nVasiliy Kulikov discovered that the Bluetooth stack did not correctly clear \nmemory. A local attacker could exploit this to read kernel stack memory, \nleading to a loss of privacy. (CVE-2011-1078)\n\nVasiliy Kulikov discovered that the Bluetooth stack did not correctly check \nthat device name strings were NULL terminated. A local attacker could \nexploit this to crash the system, leading to a denial of service, or leak \ncontents of kernel stack memory, leading to a loss of privacy. \n(CVE-2011-1079)\n\nVasiliy Kulikov discovered that bridge network filtering did not check that \nname fields were NULL terminated. A local attacker could exploit this to \nleak contents of kernel stack memory, leading to a loss of privacy. \n(CVE-2011-1080)\n\nPeter Huewe discovered that the TPM device did not correctly initialize \nmemory. A local attacker could exploit this to read kernel heap memory \ncontents, leading to a loss of privacy. (CVE-2011-1160)\n\nVasiliy Kulikov discovered that the netfilter code did not check certain \nstrings copied from userspace. A local attacker with netfilter access could \nexploit this to read kernel memory or crash the system, leading to a denial \nof service. (CVE-2011-1170, CVE-2011-1171, CVE-2011-1172, CVE-2011-2534)\n\nVasiliy Kulikov discovered that the Acorn Universal Networking driver did \nnot correctly initialize memory. A remote attacker could send specially \ncrafted traffic to read kernel stack memory, leading to a loss of privacy. \n(CVE-2011-1173)\n\nDan Rosenberg discovered that the IRDA subsystem did not correctly check \ncertain field sizes. If a system was using IRDA, a remote attacker could \nsend specially crafted traffic to crash the system or gain root privileges. \n(CVE-2011-1180)\n\nJulien Tinnes discovered that the kernel did not correctly validate the \nsignal structure from tkill(). A local attacker could exploit this to send \nsignals to arbitrary threads, possibly bypassing expected restrictions. \n(CVE-2011-1182)\n\nDan Rosenberg reported errors in the OSS (Open Sound System) MIDI \ninterface. A local attacker on non-x86 systems might be able to cause a \ndenial of service. (CVE-2011-1476)\n\nDan Rosenberg reported errors in the kernel's OSS (Open Sound System) \ndriver for Yamaha FM synthesizer chips. A local user can exploit this to \ncause memory corruption, causing a denial of service or privilege \nescalation. (CVE-2011-1477)\n\nIt was discovered that the security fix for CVE-2010-4250 introduced a \nregression. A remote attacker could exploit this to crash the system, \nleading to a denial of service. (CVE-2011-1479)\n\nDan Rosenberg discovered that the X.25 Rose network stack did not correctly \nhandle certain fields. If a system was running with Rose enabled, a remote \nattacker could send specially crafted traffic to gain root privileges. \n(CVE-2011-1493)\n\nDan Rosenberg discovered that MPT devices did not correctly validate \ncertain values in ioctl calls. If these drivers were loaded, a local \nattacker could exploit this to read arbitrary kernel memory, leading to a \nloss of privacy. (CVE-2011-1494, CVE-2011-1495)\n\nTimo Warns discovered that the GUID partition parsing routines did not \ncorrectly validate certain structures. A local attacker with physical \naccess could plug in a specially crafted block device to crash the system, \nleading to a denial of service. (CVE-2011-1577)\n\nPhil Oester discovered that the network bonding system did not correctly \nhandle large queues. On some systems, a remote attacker could send \nspecially crafted traffic to crash the system, leading to a denial of \nservice. (CVE-2011-1581)\n\nTavis Ormandy discovered that the pidmap function did not correctly handle \nlarge requests. A local attacker could exploit this to crash the system, \nleading to a denial of service. (CVE-2011-1593)\n\nOliver Hartkopp and Dave Jones discovered that the CAN network driver did \nnot correctly validate certain socket structures. If this driver was \nloaded, a local attacker could crash the system, leading to a denial of \nservice. (CVE-2011-1598, CVE-2011-1748)\n\nVasiliy Kulikov discovered that the AGP driver did not check certain ioctl \nvalues. A local attacker with access to the video subsystem could exploit \nthis to crash the system, leading to a denial of service, or possibly gain \nroot privileges. (CVE-2011-1745, CVE-2011-2022)\n\nVasiliy Kulikov discovered that the AGP driver did not check the size of \ncertain memory allocations. A local attacker with access to the video \nsubsystem could exploit this to run the system out of memory, leading to a \ndenial of service. (CVE-2011-1746)\n\nDan Rosenberg discovered that the DCCP stack did not correctly handle \ncertain packet structures. A remote attacker could exploit this to crash \nthe system, leading to a denial of service. (CVE-2011-1770)\n\nBen Greear discovered that CIFS did not correctly handle direct I/O. A \nlocal attacker with access to a CIFS partition could exploit this to crash \nthe system, leading to a denial of service. (CVE-2011-1771)\n\nVasiliy Kulikov and Dan Rosenberg discovered that ecryptfs did not \ncorrectly check the origin of mount points. A local attacker could exploit \nthis to trick the system into unmounting arbitrary mount points, leading to \na denial of service. (CVE-2011-1833)\n\nVasiliy Kulikov discovered that taskstats listeners were not correctly \nhandled. A local attacker could expoit this to exhaust memory and CPU \nresources, leading to a denial of service. (CVE-2011-2484)\n\nIt was discovered that Bluetooth l2cap and rfcomm did not correctly \ninitialize structures. A local attacker could exploit this to read portions \nof the kernel stack, leading to a loss of privacy. (CVE-2011-2492)\n\nSami Liedes discovered that ext4 did not correctly handle missing root \ninodes. A local attacker could trigger the mount of a specially crafted \nfilesystem to cause the system to crash, leading to a denial of service. \n(CVE-2011-2493)\n\nIt was discovered that GFS2 did not correctly check block sizes. A local \nattacker could exploit this to crash the system, leading to a denial of \nservice. (CVE-2011-2689)\n\nFernando Gont discovered that the IPv6 stack used predictable fragment \nidentification numbers. A remote attacker could exploit this to exhaust \nnetwork resources, leading to a denial of service. (CVE-2011-2699)\n\nThe performance counter subsystem did not correctly handle certain \ncounters. A local attacker could exploit this to crash the system, leading \nto a denial of service. (CVE-2011-2918)\n\nA flaw was found in the b43 driver in the Linux kernel. An attacker could \nuse this flaw to cause a denial of service if the system has an active \nwireless interface using the b43 driver. (CVE-2011-3359)\n\nA flaw was found in the Linux kernel's /proc/_/_map* interface. A local, \nunprivileged user could exploit this flaw to cause a denial of service. \n(CVE-2011-3637)\n\nIt was discovered that some import kernel threads can be blocked by a user \nlevel process. An unprivileged local user could exploit this flaw to cause \na denial of service. (CVE-2011-4621)\n\nDan Rosenberg discovered flaws in the linux Rose (X.25 PLP) layer used by \namateur radio. A local user or a remote user on an X.25 network could \nexploit these flaws to execute arbitrary code as root. (CVE-2011-4913)\n\nBen Hutchings discovered several flaws in the Linux Rose (X.25 PLP) layer. \nA local user or a remote user on an X.25 network could exploit these flaws \nto execute arbitrary code as root. (CVE-2011-4914)", "edition": 6, "modified": "2011-09-21T00:00:00", "published": "2011-09-21T00:00:00", "id": "USN-1212-1", "href": "https://ubuntu.com/security/notices/USN-1212-1", "title": "Linux kernel (OMAP4) vulnerabilities", "type": "ubuntu", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:C"}}], "suse": [{"lastseen": "2016-09-04T11:25:15", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1017", "CVE-2011-1746", "CVE-2011-1160", "CVE-2011-1078", "CVE-2011-2491", "CVE-2011-2517", "CVE-2011-1012", "CVE-2011-1598", "CVE-2011-1173", "CVE-2011-2182", "CVE-2011-1079", "CVE-2011-1020", "CVE-2011-1593", "CVE-2011-1170", "CVE-2011-1172", "CVE-2011-1748", "CVE-2011-1171", "CVE-2011-2213", "CVE-2011-1745", "CVE-2011-2183", "CVE-2011-1080", "CVE-2011-1585", "CVE-2011-1577", "CVE-2011-2496"], "description": "The SUSE Linux Enterprise 11 Service Pack 1 kernel was updated to 2.6.32.43 and fixes various bugs and security issues.\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2011-07-25T15:19:26", "published": "2011-07-25T15:19:26", "id": "SUSE-SA:2011:031", "href": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00011.html", "title": "remote denial of service, potential local in kernel", "type": "suse", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:18:43", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1017", "CVE-2011-1746", "CVE-2011-1160", "CVE-2011-1078", "CVE-2011-2491", "CVE-2011-2517", "CVE-2011-1012", "CVE-2011-1598", "CVE-2011-1173", "CVE-2011-2182", "CVE-2011-1079", "CVE-2011-1020", "CVE-2011-1593", "CVE-2011-1170", "CVE-2011-1172", "CVE-2011-1748", "CVE-2011-1171", "CVE-2011-2213", "CVE-2011-1745", "CVE-2011-2183", "CVE-2011-1080", "CVE-2011-1585", "CVE-2011-1577", "CVE-2011-2496"], "description": "The SUSE Linux Enterprise 11 Service Pack 1 kernel was\n updated to 2.6.32.43 and fixes various bugs and security\n issues.\n\n The following security issues were fixed:\n\n *\n\n CVE-2011-2496: The normal mmap paths all avoid\n creating a mapping where the pgoff inside the mapping could\n wrap around due to overflow. However, an expanding mremap()\n can take such a non-wrapping mapping and make it bigger and\n cause a wrapping condition.\n\n *\n\n CVE-2011-2491: A local unprivileged user able to\n access a NFS filesystem could use file locking to deadlock\n parts of an nfs server under some circumstance.\n\n *\n\n CVE-2011-2183: Fixed a race between ksmd and other\n memory management code, which could result in a NULL ptr\n dereference and kernel crash.\n\n *\n\n CVE-2011-2517: In both trigger_scan and sched_scan\n operations, we were checking for the SSID length before\n assigning the value correctly. Since the memory was just\n kzalloced, the check was always failing and SSID with over\n 32 characters were allowed to go through. This required\n CAP_NET_ADMIN privileges to be exploited.\n\n *\n\n CVE-2011-2213: A malicious user or buggy application\n could inject diagnosing byte code and trigger an infinite\n loop in inet_diag_bc_audit().\n\n *\n\n CVE-2011-1017,CVE-2011-1012,CVE-2011-2182: The code\n for evaluating LDM partitions (in fs/partitions/ldm.c)\n contained bugs that could crash the kernel for certain\n corrupted LDM partitions.\n\n *\n\n CVE-2011-1593: Multiple integer overflows in the\n next_pidmap function in kernel/pid.c in the Linux kernel\n allowed local users to cause a denial of service (system\n crash) via a crafted (1) getdents or (2) readdir system\n call.\n\n *\n\n CVE-2011-1020: The proc filesystem implementation in\n the Linux kernel did not restrict access to the /proc\n directory tree of a process after this process performs an\n exec of a setuid program, which allowed local users to\n obtain sensitive information or cause a denial of service\n via open, lseek, read, and write system calls.\n\n *\n\n CVE-2011-1585: When using a setuid root mount.cifs,\n local users could hijack password protected mounted CIFS\n shares of other local users.\n\n *\n\n CVE-2011-1160: Kernel information via the TPM devices\n could by used by local attackers to read kernel memory.\n\n *\n\n CVE-2011-1577: The Linux kernel automatically\n evaluated partition tables of storage devices. The code for\n evaluating EFI GUID partitions (in fs/partitions/efi.c)\n contained a bug that causes a kernel oops on certain\n corrupted GUID partition tables, which might be used by\n local attackers to crash the kernel or potentially execute\n code.\n\n *\n\n CVE-2011-1078: In a bluetooth ioctl, struct\n sco_conninfo has one padding byte in the end. Local\n variable cinfo of type sco_conninfo was copied to userspace\n with this uninizialized one byte, leading to an old stack\n contents leak.\n\n *\n\n CVE-2011-1079: In a bluetooth ioctl, struct ca is\n copied from userspace. It was not checked whether the\n "device" field was NULL terminated. This potentially leads\n to BUG() inside of alloc_netdev_mqs() and/or information\n leak by creating a device with a name made of contents of\n kernel stack.\n\n *\n\n CVE-2011-1080: In ebtables rule loading, struct tmp\n is copied from userspace. It was not checked whether the\n "name" field is NULL terminated. This may have lead to\n buffer overflow and passing contents of kernel stack as a\n module name to try_then_request_module() and, consequently,\n to modprobe commandline. It would be seen by all userspace\n processes.\n\n *\n\n CVE-2011-1173: The econet_sendmsg function in\n net/econet/af_econet.c in the Linux kernel on the x86_64\n platform allowed remote attackers to obtain potentially\n sensitive information from kernel stack memory by reading\n uninitialized data in the ah field of an Acorn Universal\n Networking (AUN) packet.\n\n *\n\n CVE-2011-1170: net/ipv4/netfilter/arp_tables.c in the\n IPv4 implementation in the Linux kernel did not place the\n expected '0' character at the end of string data in the\n values of certain structure members, which allowed local\n users to obtain potentially sensitive information from\n kernel memory by leveraging the CAP_NET_ADMIN capability to\n issue a crafted request, and then reading the argument to\n the resulting modprobe process.\n\n *\n\n CVE-2011-1171: net/ipv4/netfilter/ip_tables.c in the\n IPv4 implementation in the Linux kernel did not place the\n expected '0' character at the end of string data in the\n values of certain structure members, which allowed local\n users to obtain potentially sensitive information from\n kernel memory by leveraging the CAP_NET_ADMIN capability to\n issue a crafted request, and then reading the argument to\n the resulting modprobe process.\n\n *\n\n CVE-2011-1172: net/ipv6/netfilter/ip6_tables.c in the\n IPv6 implementation in the Linux kernel did not place the\n expected '0' character at the end of string data in the\n values of certain structure members, which allowed local\n users to obtain potentially sensitive information from\n kernel memory by leveraging the CAP_NET_ADMIN capability to\n issue a crafted request, and then reading the argument to\n the resulting modprobe process.\n\n *\n\n CVE-2011-1746: Multiple integer overflows in the (1)\n agp_allocate_memory and (2) agp_create_user_memory\n functions in drivers/char/agp/generic.c in the Linux kernel\n before allowed local users to trigger buffer overflows, and\n consequently cause a denial of service (system crash) or\n possibly have unspecified other impact, via vectors related\n to calls that specify a large number of memory pages.\n\n *\n\n CVE-2011-1745: Integer overflow in the\n agp_generic_insert_memory function in\n drivers/char/agp/generic.c in the Linux kernel allowed\n local users to gain privileges or cause a denial of service\n (system crash) via a crafted AGPIOC_BIND agp_ioctl ioctl\n call.\n\n *\n\n CVE-2011-1598: The bcm_release function in\n net/can/bcm.c in the Linux kernel did not properly validate\n a socket data structure, which allowed local users to cause\n a denial of service (NULL pointer dereference) or possibly\n have unspecified other impact via a crafted release\n operation.\n\n *\n\n CVE-2011-1748: The raw_release function in\n net/can/raw.c in the Linux kernel did not properly validate\n a socket data structure, which allows local users to cause\n a denial of service (NULL pointer dereference) or possibly\n have unspecified other impact via a crafted release\n operation.\n", "edition": 1, "modified": "2011-07-25T17:08:29", "published": "2011-07-25T17:08:29", "id": "SUSE-SU-2011:0832-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00012.html", "type": "suse", "title": "Security update for Linux kernel (important)", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "debian": [{"lastseen": "2020-11-11T13:25:33", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1476", "CVE-2011-1746", "CVE-2011-0695", "CVE-2011-1160", "CVE-2011-1078", "CVE-2011-1494", "CVE-2011-1478", "CVE-2011-1776", "CVE-2011-1767", "CVE-2011-1598", "CVE-2010-3875", "CVE-2011-1173", "CVE-2011-1759", "CVE-2011-0711", "CVE-2011-2022", "CVE-2011-1180", "CVE-2011-1079", "CVE-2011-1770", "CVE-2011-1495", "CVE-2011-1163", "CVE-2011-1016", "CVE-2011-1593", "CVE-2011-1170", "CVE-2011-1172", "CVE-2011-1748", "CVE-2011-1171", "CVE-2011-1477", "CVE-2011-1493", "CVE-2011-0726", "CVE-2011-1745", "CVE-2011-1182", "CVE-2011-1090", "CVE-2011-1080", "CVE-2011-1585"], "description": "- ----------------------------------------------------------------------\nDebian Security Advisory DSA-2240-1 security@debian.org\nhttp://www.debian.org/security/ dann frazier\nMay 24, 2011 http://www.debian.org/security/faq\n- ----------------------------------------------------------------------\n\nPackage : linux-2.6\nVulnerability : privilege escalation/denial of service/information leak\nProblem type : local/remote\nDebian-specific: no\nCVE Id(s) : CVE-2010-3875 CVE-2011-0695 CVE-2011-0711 CVE-2011-0726\n CVE-2011-1016 CVE-2011-1078 CVE-2011-1079 CVE-2011-1080\n CVE-2011-1090 CVE-2011-1160 CVE-2011-1163 CVE-2011-1170\n CVE-2011-1171 CVE-2011-1172 CVE-2011-1173 CVE-2011-1180\n CVE-2011-1182 CVE-2011-1476 CVE-2011-1477 CVE-2011-1478\n CVE-2011-1493 CVE-2011-1494 CVE-2011-1495 CVE-2011-1585\n CVE-2011-1593 CVE-2011-1598 CVE-2011-1745 CVE-2011-1746\n CVE-2011-1748 CVE-2011-1759 CVE-2011-1767 CVE-2011-1770\n CVE-2011-1776 CVE-2011-2022\nDebian Bug(s) : \n \nSeveral vulnerabilities have been discovered in the Linux kernel that may lead\nto a denial of service or privilege escalation. The Common Vulnerabilities and\nExposures project identifies the following problems:\n\nCVE-2010-3875\n\n Vasiliy Kulikov discovered an issue in the Linux implementation of the\n Amateur Radio AX.25 Level 2 protocol. Local users may obtain access to\n sensitive kernel memory.\n\nCVE-2011-0695\n\n Jens Kuehnel reported an issue in the InfiniBand stack. Remote attackers can\n exploit a race condition to cause a denial of service (kernel panic).\n\nCVE-2011-0711\n\n Dan Rosenberg reported an issue in the XFS filesystem. Local users may\n obtain access to sensitive kernel memory.\n\nCVE-2011-0726\n\n Kees Cook reported an issue in the /proc/pid/stat implementation. Local\n users could learn the text location of a process, defeating protections\n provided by address space layout randomization (ASLR).\n\nCVE-2011-1016\n\n Marek Ol\u0161\u00e1k discovered an issue in the driver for ATI/AMD Radeon video\n chips. Local users could pass arbitrary values to video memory and the\n graphics translation table, resulting in denial of service or escalated\n privileges. On default Debian installations, this is exploitable only by\n members of the 'video' group.\n\nCVE-2011-1078\n\n Vasiliy Kulikov discovered an issue in the Bluetooth subsystem. Local users\n can obtain access to sensitive kernel memory.\n\nCVE-2011-1079\n\n Vasiliy Kulikov discovered an issue in the Bluetooth subsystem. Local users\n with the CAP_NET_ADMIN capability can cause a denial of service (kernel\n Oops).\n \nCVE-2011-1080\n\n Vasiliy Kulikov discovered an issue in the Netfilter subsystem. Local users\n can obtain access to sensitive kernel memory.\n\nCVE-2011-1090\n\n Neil Horman discovered a memory leak in the setacl() call on NFSv4\n filesystems. Local users can explot this to cause a denial of service\n (Oops).\n\nCVE-2011-1160\n\n Peter Huewe reported an issue in the Linux kernel's support for TPM security\n chips. Local users with permission to open the device can gain access to\n sensitive kernel memory.\n\nCVE-2011-1163\n\n Timo Warns reported an issue in the kernel support for Alpha OSF format disk\n partitions. Users with physical access can gain access to sensitive kernel\n memory by adding a storage device with a specially crafted OSF partition.\n\nCVE-2011-1170\n\n Vasiliy Kulikov reported an issue in the Netfilter arp table\n implementation. Local users with the CAP_NET_ADMIN capability can gain\n access to sensitive kernel memory.\n\nCVE-2011-1171\n\n Vasiliy Kulikov reported an issue in the Netfilter IP table\n implementation. Local users with the CAP_NET_ADMIN capability can gain\n access to sensitive kernel memory.\n \nCVE-2011-1172\n\n Vasiliy Kulikov reported an issue in the Netfilter IP6 table\n implementation. Local users with the CAP_NET_ADMIN capability can gain\n access to sensitive kernel memory.\n \nCVE-2011-1173\n\n Vasiliy Kulikov reported an issue in the Acorn Econet protocol\n implementation. Local users can obtain access to sensitive kernel memory on\n systems that use this rare hardware.\n\nCVE-2011-1180\n\n Dan Rosenberg reported a buffer overflow in the Information Access Service\n of the IrDA protocol, used for Infrared devices. Remote attackers within IR\n device range can cause a denial of service or possibly gain elevated\n privileges.\n\nCVE-2011-1182\n\n Julien Tinnes reported an issue in the rt_sigqueueinfo interface. Local\n users can generate signals with falsified source pid and uid information.\n\nCVE-2011-1476\n\n Dan Rosenberg reported issues in the Open Sound System MIDI interface that\n allow local users to cause a denial of service. This issue does not affect\n official Debian Linux image packages as they no longer provide support for\n OSS. However, custom kernels built from Debians linux-source-2.6.32 may\n have enabled this configuration and would therefore be vulnerable.\n\nCVE-2011-1477\n\n Dan Rosenberg reported issues in the Open Sound System driver for cards that\n include a Yamaha FM synthesizer chip. Local users can cause memory\n corruption resulting in a denial of service. This issue does not affect\n official Debian Linux image packages as they no longer provide support for\n OSS. However, custom kernels built from Debians linux-source-2.6.32 may\n have enabled this configuration and would therefore be vulnerable.\n\nCVE-2011-1478\n\n Ryan Sweat reported an issue in the Generic Receive Offload (GRO) support in\n the Linux networking subsystem. If an interface has GRO enabled and is\n running in promiscuous mode, remote users can cause a denial of service\n (NULL pointer dereference) by sending packets on an unknown VLAN.\n\nCVE-2011-1493\n\n Dan Rosenburg reported two issues in the Linux implementation of the Amateur\n Radio X.25 PLP (Rose) protocol. A remote user can cause a denial of service\n by providing specially crafted facilities fields.\n\nCVE-2011-1494\n\n Dan Rosenberg reported an issue in the /dev/mpt2ctl interface provided by\n the driver for LSI MPT Fusion SAS 2.0 controllers. Local users can obtain\n elevated privileges by specially crafted ioctl calls. On default Debian\n installations this is not exploitable as this interface is only accessible\n to root.\n\nCVE-2011-1495\n\n Dan Rosenberg reported two additional issues in the /dev/mpt2ctl interface\n provided by the driver for LSI MPT Fusion SAS 2.0 controllers. Local users\n can obtain elevated privileges and ready arbitrary kernel memory by using\n specially crafted ioctl calls. On default Debian installations this is not\n exploitable as this interface is only accessible to root.\n\nCVE-2011-1585\n\n Jeff Layton reported an issue in the Common Internet File System (CIFS).\n Local users can bypass authentication requirements for shares that are\n already mounted by another user.\n\nCVE-2011-1593\n\n Robert Swiecki reported a signednes issue in the next_pidmap() function,\n which can be exploited my local users to cause a denial of service.\n\nCVE-2011-1598\n\n Dave Jones reported an issue in the Broadcast Manager Controller Area\n Network (CAN/BCM) protocol that may allow local users to cause a NULL\n pointer dereference, resulting in a denial of service.\n\nCVE-2011-1745\n\n Vasiliy Kulikov reported an issue in the Linux support for AGP devices.\n Local users can obtain elevated privileges or cause a denial of service due\n to missing bounds checking in the AGPIOC_BIND ioctl. On default Debian\n installations, this is exploitable only by users in the video group.\n\nCVE-2011-1746\n\n Vasiliy Kulikov reported an issue in the Linux support for AGP devices.\n Local users can obtain elevated privileges or cause a denial of service due\n to missing bounds checking in the agp_allocate_memory and\n agp_create_user_memory. On default Debian installations, this is exploitable\n only by users in the video group.\n\nCVE-2011-1748\n\n Oliver Kartkopp reported an issue in the Controller Area Network (CAN) raw\n socket implementation which permits ocal users to cause a NULL pointer\n dereference, resulting in a denial of service.\n \nCVE-2011-1759\n\n Dan Rosenberg reported an issue in the support for executing "old ABI"\n binaries on ARM processors. Local users can obtain elevated privileges due\n to insufficient bounds checking in the semtimedop system call.\n\nCVE-2011-1767\n\n Alexecy Dobriyan reported an issue in the GRE over IP implementation.\n Remote users can cause a denial of service by sending a packet during module\n initialization.\n\nCVE-2011-1770\n\n Dan Rosenberg reported an issue in the Datagram Congestion Control Protocol\n (DCCP). Remote users can cause a denial of service or potentially obtain\n access to sensitive kernel memory.\n\nCVE-2011-1776\n\n Timo Warns reported an issue in the Linux implementation for GUID\n partitions. Users with physical access can gain access to sensitive kernel\n memory by adding a storage device with a specially crafted corrupted invalid\n partition table.\n\nCVE-2011-2022\n\n Vasiliy Kulikov reported an issue in the Linux support for AGP devices.\n Local users can obtain elevated privileges or cause a denial of service due\n to missing bounds checking in the AGPIOC_UNBIND ioctl. On default Debian\n installations, this is exploitable only by users in the video group.\n\nThis update also includes changes queued for the next point release of\nDebian 6.0, which also fix various non-security issues. These additional\nchanges are described in the package changelog which can be viewed at:\n\n http://packages.debian.org/changelogs/pool/main/l/linux-2.6/linux-2.6_2.6.32-34/changelog\n\nFor the stable distribution (squeeze), this problem has been fixed in version\n2.6.32-34squeeze1. Updates for issues impacting the oldstable distribution\n(lenny) will be available soon.\n\nThe following matrix lists additional source packages that were rebuilt for\ncompatibility with or to take advantage of this update:\n\n Debian 6.0 (squeeze)\n user-mode-linux 2.6.32-1um-4+34squeeze1\n\nWe recommend that you upgrade your linux-2.6 and user-mode-linux packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 3, "modified": "2011-05-25T05:47:50", "published": "2011-05-25T05:47:50", "id": "DEBIAN:DSA-2240-1:38C7A", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2011/msg00111.html", "title": "[SECURITY] [DSA 2240-1] linux-2.6 security update", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-11-11T13:11:56", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1017", "CVE-2011-1768", "CVE-2011-1746", "CVE-2011-0695", "CVE-2011-1160", "CVE-2011-1078", "CVE-2011-1776", "CVE-2011-1767", "CVE-2011-1012", "CVE-2011-1598", "CVE-2010-3875", "CVE-2011-1173", "CVE-2010-2524", "CVE-2011-1759", "CVE-2011-2182", "CVE-2011-0711", "CVE-2011-0710", "CVE-2011-2022", "CVE-2011-1180", "CVE-2011-1079", "CVE-2011-1163", "CVE-2011-1093", "CVE-2011-1010", "CVE-2011-1593", "CVE-2011-1170", "CVE-2011-1172", "CVE-2011-1748", "CVE-2011-1171", "CVE-2011-1477", "CVE-2011-1493", "CVE-2011-0726", "CVE-2011-1745", "CVE-2011-1182", "CVE-2011-1090", "CVE-2011-1080", "CVE-2010-4075", "CVE-2010-4655", "CVE-2011-1577"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2264-1 security@debian.org\nhttp://www.debian.org/security/ dann frazier\nJune 18, 2011 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : linux-2.6\nVulnerability : privilege escalation/denial of service/information leak\nProblem type : local/remote\nDebian-specific: no\nCVE Id(s) : CVE-2010-2524 CVE-2010-3875 CVE-2010-4075 CVE-2010-4655 \n CVE-2011-0695 CVE-2011-0710 CVE-2011-0711 CVE-2011-0726\n CVE-2011-1010 CVE-2011-1012 CVE-2011-1017 CVE-2011-1078 \n CVE-2011-1079 CVE-2011-1080 CVE-2011-1090 CVE-2011-1093 \n CVE-2011-1160 CVE-2011-1163 CVE-2011-1170 CVE-2011-1171\n CVE-2011-1172 CVE-2011-1173 CVE-2011-1180 CVE-2011-1182\n CVE-2011-1477 CVE-2011-1493 CVE-2011-1577 CVE-2011-1593\n CVE-2011-1598 CVE-2011-1745 CVE-2011-1746 CVE-2011-1748\n CVE-2011-1759 CVE-2011-1767 CVE-2011-1768 CVE-2011-1776\n CVE-2011-2022 CVE-2011-2182\nDebian Bug : 618485\n\nSeveral vulnerabilities have been discovered in the Linux kernel that may lead\nto a privilege escalation, denial of service or information leak. The Common\nVulnerabilities and Exposures project identifies the following problems:\n\nCVE-2010-2524\n\n David Howells reported an issue in the Common Internet File System (CIFS).\n Local users could cause arbitrary CIFS shares to be mounted by introducing\n malicious redirects.\n\nCVE-2010-3875\n\n Vasiliy Kulikov discovered an issue in the Linux implementation of the\n Amateur Radio AX.25 Level 2 protocol. Local users may obtain access to\n sensitive kernel memory.\n\nCVE-2010-4075\n\n Dan Rosenberg reported an issue in the tty layer that may allow local\n users to obtain access to sensitive kernel memory.\n\nCVE-2010-4655\n\n Kees Cook discovered several issues in the ethtool interface which may\n allow local users with the CAP_NET_ADMIN capability to obtain access to\n sensitive kernel memory.\n \nCVE-2011-0695\n\n Jens Kuehnel reported an issue in the InfiniBand stack. Remote attackers can\n exploit a race condition to cause a denial of service (kernel panic).\n\nCVE-2011-0710\n\n Al Viro reported an issue in the /proc/<pid>/status interface on the\n s390 architecture. Local users could gain access to sensitive memory\n in processes they do not own via the task_show_regs entry.\n\nCVE-2011-0711\n\n Dan Rosenberg reported an issue in the XFS filesystem. Local users may\n obtain access to sensitive kernel memory.\n\nCVE-2011-0726\n\n Kees Cook reported an issue in the /proc/pid/stat implementation. Local\n users could learn the text location of a process, defeating protections\n provided by address space layout randomization (ASLR).\n\nCVE-2011-1010\n\n Timo Warns reported an issue in the Linux support for Mac partition tables.\n Local users with physical access could cause a denial of service (panic)\n by adding a storage device with a malicious map_count value.\n \nCVE-2011-1012\n\n Timo Warns reported an issue in the Linux support for Mac partition tables.\n Local users with physical access could cause a denial of service (panic)\n by adding a storage device with a malicious map_count value.\n \nCVE-2011-1017\n \n Timo Warns reported an issue in the Linux support for LDM partition tables.\n Users with physical access can gain access to sensitive kernel memory or\n gain elevated privileges by adding a storage device with a specially\n crafted LDM partition.\n\nCVE-2011-1078\n\n Vasiliy Kulikov discovered an issue in the Bluetooth subsystem. Local users\n can obtain access to sensitive kernel memory.\n\nCVE-2011-1079\n\n Vasiliy Kulikov discovered an issue in the Bluetooth subsystem. Local users\n with the CAP_NET_ADMIN capability can cause a denial of service (kernel\n Oops).\n \nCVE-2011-1080\n\n Vasiliy Kulikov discovered an issue in the Netfilter subsystem. Local users\n can obtain access to sensitive kernel memory.\n\nCVE-2011-1090\n\n Neil Horman discovered a memory leak in the setacl() call on NFSv4\n filesystems. Local users can exploit this to cause a denial of service\n (Oops).\n\nCVE-2011-1093\n\n Johan Hovold reported an issue in the Datagram Congestion Control Protocol\n (DCCP) implementation. Remote users could cause a denial of service by\n sending data after closing a socket.\n\nCVE-2011-1160\n\n Peter Huewe reported an issue in the Linux kernel's support for TPM security\n chips. Local users with permission to open the device can gain access to\n sensitive kernel memory.\n\nCVE-2011-1163\n\n Timo Warns reported an issue in the kernel support for Alpha OSF format disk\n partitions. Users with physical access can gain access to sensitive kernel\n memory by adding a storage device with a specially crafted OSF partition.\n\nCVE-2011-1170\n\n Vasiliy Kulikov reported an issue in the Netfilter arp table\n implementation. Local users with the CAP_NET_ADMIN capability can gain\n access to sensitive kernel memory.\n\nCVE-2011-1171\n\n Vasiliy Kulikov reported an issue in the Netfilter IP table\n implementation. Local users with the CAP_NET_ADMIN capability can gain\n access to sensitive kernel memory.\n \nCVE-2011-1172\n\n Vasiliy Kulikov reported an issue in the Netfilter IP6 table\n implementation. Local users with the CAP_NET_ADMIN capability can gain\n access to sensitive kernel memory.\n \nCVE-2011-1173\n\n Vasiliy Kulikov reported an issue in the Acorn Econet protocol\n implementation. Local users can obtain access to sensitive kernel memory on\n systems that use this rare hardware.\n\nCVE-2011-1180\n\n Dan Rosenberg reported a buffer overflow in the Information Access Service\n of the IrDA protocol, used for Infrared devices. Remote attackers within IR\n device range can cause a denial of service or possibly gain elevated\n privileges.\n\nCVE-2011-1182\n\n Julien Tinnes reported an issue in the rt_sigqueueinfo interface. Local\n users can generate signals with falsified source pid and uid information.\n\nCVE-2011-1477\n\n Dan Rosenberg reported issues in the Open Sound System driver for cards that\n include a Yamaha FM synthesizer chip. Local users can cause memory\n corruption resulting in a denial of service. This issue does not affect\n official Debian Linux image packages as they no longer provide support for\n OSS. However, custom kernels built from Debians linux-source-2.6.32 may\n have enabled this configuration and would therefore be vulnerable.\n\nCVE-2011-1493\n\n Dan Rosenburg reported two issues in the Linux implementation of the\n Amateur Radio X.25 PLP (Rose) protocol. A remote user can cause a denial of\n service by providing specially crafted facilities fields.\n\nCVE-2011-1577\n\n Timo Warns reported an issue in the Linux support for GPT partition tables.\n Local users with physical access could cause a denial of service (Oops)\n by adding a storage device with a malicious partition table header.\n\nCVE-2011-1593\n\n Robert Swiecki reported a signednes issue in the next_pidmap() function,\n which can be exploited my local users to cause a denial of service.\n\nCVE-2011-1598\n\n Dave Jones reported an issue in the Broadcast Manager Controller Area\n Network (CAN/BCM) protocol that may allow local users to cause a NULL\n pointer dereference, resulting in a denial of service.\n\nCVE-2011-1745\n\n Vasiliy Kulikov reported an issue in the Linux support for AGP devices.\n Local users can obtain elevated privileges or cause a denial of service due\n to missing bounds checking in the AGPIOC_BIND ioctl. On default Debian\n installations, this is exploitable only by users in the video group.\n\nCVE-2011-1746\n\n Vasiliy Kulikov reported an issue in the Linux support for AGP devices.\n Local users can obtain elevated privileges or cause a denial of service\n due to missing bounds checking in the agp_allocate_memory and\n agp_create_user_memory. On default Debian installations, this is\n exploitable only by users in the video group.\n\nCVE-2011-1748\n\n Oliver Kartkopp reported an issue in the Controller Area Network (CAN) raw\n socket implementation which permits ocal users to cause a NULL pointer\n dereference, resulting in a denial of service.\n \nCVE-2011-1759\n\n Dan Rosenberg reported an issue in the support for executing "old ABI"\n binaries on ARM processors. Local users can obtain elevated privileges due\n to insufficient bounds checking in the semtimedop system call.\n\nCVE-2011-1767\n\n Alexecy Dobriyan reported an issue in the GRE over IP implementation.\n Remote users can cause a denial of service by sending a packet during\n module initialization.\n\nCVE-2011-1768\n\n Alexecy Dobriyan reported an issue in the IP tunnels implementation.\n Remote users can cause a denial of service by sending a packet during\n module initialization.\n\nCVE-2011-1776\n\n Timo Warns reported an issue in the Linux implementation for GUID\n partitions. Users with physical access can gain access to sensitive kernel\n memory by adding a storage device with a specially crafted corrupted\n invalid partition table.\n\nCVE-2011-2022\n\n Vasiliy Kulikov reported an issue in the Linux support for AGP devices.\n Local users can obtain elevated privileges or cause a denial of service due\n to missing bounds checking in the AGPIOC_UNBIND ioctl. On default Debian\n installations, this is exploitable only by users in the video group.\n\nCVE-2011-2182\n\n Ben Hutchings reported an issue with the fix for CVE-2011-1017 (see above)\n that made it insufficient to resolve the issue.\n\nFor the oldstable distribution (lenny), this problem has been fixed in\nversion 2.6.26-26lenny3. Updates for arm and hppa are not yet available,\nbut will be released as soon as possible.\n\nThe following matrix lists additional source packages that were rebuilt for\ncompatibility with or to take advantage of this update:\n\n Debian 5.0 (lenny)\n user-mode-linux 2.6.26-1um-2+26lenny3\n\nWe recommend that you upgrade your linux-2.6 and user-mode-linux packages.\nThese updates will not become active until after your system is rebooted.\n\nNote: Debian carefully tracks all known security issues across every\nlinux kernel package in all releases under active security support.\nHowever, given the high frequency at which low-severity security\nissues are discovered in the kernel and the resource requirements of\ndoing an update, updates for lower priority issues will normally not\nbe released for all kernels at the same time. Rather, they will be\nreleased in a staggered or "leap-frog" fashion.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 3, "modified": "2011-06-19T01:11:59", "published": "2011-06-19T01:11:59", "id": "DEBIAN:DSA-2264-1:87A7B", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2011/msg00134.html", "title": "[SECURITY] [DSA 2264-1] linux-2.6 security update", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}]}