{"nessus": [{"lastseen": "2022-07-24T15:22:26", "description": "Updated kvm packages that fix three security issues and multiple bugs are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nKVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built for the standard Red Hat Enterprise Linux kernel.\n\nIt was found that QEMU-KVM on the host did not validate all pointers provided from a guest system's QXL graphics card driver. A privileged guest user could use this flaw to cause the host to dereference an invalid pointer, causing the guest to crash (denial of service) or, possibly, resulting in the privileged guest user escalating their privileges on the host. (CVE-2010-0431)\n\nA flaw was found in QEMU-KVM, allowing the guest some control over the index used to access the callback array during sub-page MMIO initialization. A privileged guest user could use this flaw to crash the guest (denial of service) or, possibly, escalate their privileges on the host. (CVE-2010-2784)\n\nA NULL pointer dereference flaw was found when the host system had a processor with the Intel VT-x extension enabled. A privileged guest user could use this flaw to trick the host into emulating a certain instruction, which could crash the host (denial of service).\n(CVE-2010-0435)\n\nThis update also fixes the following bugs :\n\n* running a 'qemu-img' check on a faulty virtual machine image ended with a segmentation fault. With this update, the segmentation fault no longer occurs when running the 'qemu-img' check. (BZ#610342)\n\n* when attempting to transfer a file between two guests that were joined in the same virtual LAN (VLAN), the receiving guest unexpectedly quit. With this update, the transfer completes successfully. (BZ#610343)\n\n* installation of a system was occasionally failing in KVM. This was caused by KVM using wrong permissions for large guest pages. With this update, the installation completes successfully. (BZ#616796)\n\n* previously, the migration process would fail for a virtual machine because the virtual machine could not map all the memory. This was caused by a conflict that was initiated when a virtual machine was initially run and then migrated right away. With this update, the conflict no longer occurs and the migration process no longer fails.\n(BZ#618205)\n\n* using a thinly provisioned VirtIO disk on iSCSI storage and performing a 'qemu-img' check during an 'e_no_space' event returned cluster errors. With this update, the errors no longer appear.\n(BZ#618206)\n\nAll KVM users should upgrade to these updated packages, which contain backported patches to resolve these issues. Note: The procedure in the Solution section must be performed before this update will take effect.", "cvss3": {"score": null, "vector": null}, "published": "2010-08-29T00:00:00", "type": "nessus", "title": "CentOS 5 : kvm (CESA-2010:0627)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-0431", "CVE-2010-0435", "CVE-2010-2784"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:centos:centos:kmod-kvm", "p-cpe:/a:centos:centos:kvm", "p-cpe:/a:centos:centos:kvm-qemu-img", "p-cpe:/a:centos:centos:kvm-tools", "cpe:/o:centos:centos:5"], "id": "CENTOS_RHSA-2010-0627.NASL", "href": "https://www.tenable.com/plugins/nessus/48910", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2010:0627 and \n# CentOS Errata and Security Advisory 2010:0627 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(48910);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2010-0431\", \"CVE-2010-0435\", \"CVE-2010-2784\");\n script_xref(name:\"RHSA\", value:\"2010:0627\");\n\n script_name(english:\"CentOS 5 : kvm (CESA-2010:0627)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kvm packages that fix three security issues and multiple bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nKVM (Kernel-based Virtual Machine) is a full virtualization solution\nfor Linux on AMD64 and Intel 64 systems. KVM is a Linux kernel module\nbuilt for the standard Red Hat Enterprise Linux kernel.\n\nIt was found that QEMU-KVM on the host did not validate all pointers\nprovided from a guest system's QXL graphics card driver. A privileged\nguest user could use this flaw to cause the host to dereference an\ninvalid pointer, causing the guest to crash (denial of service) or,\npossibly, resulting in the privileged guest user escalating their\nprivileges on the host. (CVE-2010-0431)\n\nA flaw was found in QEMU-KVM, allowing the guest some control over the\nindex used to access the callback array during sub-page MMIO\ninitialization. A privileged guest user could use this flaw to crash\nthe guest (denial of service) or, possibly, escalate their privileges\non the host. (CVE-2010-2784)\n\nA NULL pointer dereference flaw was found when the host system had a\nprocessor with the Intel VT-x extension enabled. A privileged guest\nuser could use this flaw to trick the host into emulating a certain\ninstruction, which could crash the host (denial of service).\n(CVE-2010-0435)\n\nThis update also fixes the following bugs :\n\n* running a 'qemu-img' check on a faulty virtual machine image ended\nwith a segmentation fault. With this update, the segmentation fault no\nlonger occurs when running the 'qemu-img' check. (BZ#610342)\n\n* when attempting to transfer a file between two guests that were\njoined in the same virtual LAN (VLAN), the receiving guest\nunexpectedly quit. With this update, the transfer completes\nsuccessfully. (BZ#610343)\n\n* installation of a system was occasionally failing in KVM. This was\ncaused by KVM using wrong permissions for large guest pages. With this\nupdate, the installation completes successfully. (BZ#616796)\n\n* previously, the migration process would fail for a virtual machine\nbecause the virtual machine could not map all the memory. This was\ncaused by a conflict that was initiated when a virtual machine was\ninitially run and then migrated right away. With this update, the\nconflict no longer occurs and the migration process no longer fails.\n(BZ#618205)\n\n* using a thinly provisioned VirtIO disk on iSCSI storage and\nperforming a 'qemu-img' check during an 'e_no_space' event returned\ncluster errors. With this update, the errors no longer appear.\n(BZ#618206)\n\nAll KVM users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Note: The procedure in the\nSolution section must be performed before this update will take\neffect.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2010-August/016954.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?05fbda20\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected kvm packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:S/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kmod-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kvm-qemu-img\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kvm-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/08/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/08/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/08/29\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 5.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-5\", cpu:\"x86_64\", reference:\"kmod-kvm-83-164.el5_5.21\")) flag++;\nif (rpm_check(release:\"CentOS-5\", cpu:\"x86_64\", reference:\"kvm-83-164.el5_5.21\")) flag++;\nif (rpm_check(release:\"CentOS-5\", cpu:\"x86_64\", reference:\"kvm-qemu-img-83-164.el5_5.21\")) flag++;\nif (rpm_check(release:\"CentOS-5\", cpu:\"x86_64\", reference:\"kvm-tools-83-164.el5_5.21\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kmod-kvm / kvm / kvm-qemu-img / kvm-tools\");\n}\n", "cvss": {"score": 6.6, "vector": "AV:L/AC:M/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2022-07-24T14:22:32", "description": "From Red Hat Security Advisory 2010:0627 :\n\nUpdated kvm packages that fix three security issues and multiple bugs are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nKVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built for the standard Red Hat Enterprise Linux kernel.\n\nIt was found that QEMU-KVM on the host did not validate all pointers provided from a guest system's QXL graphics card driver. A privileged guest user could use this flaw to cause the host to dereference an invalid pointer, causing the guest to crash (denial of service) or, possibly, resulting in the privileged guest user escalating their privileges on the host. (CVE-2010-0431)\n\nA flaw was found in QEMU-KVM, allowing the guest some control over the index used to access the callback array during sub-page MMIO initialization. A privileged guest user could use this flaw to crash the guest (denial of service) or, possibly, escalate their privileges on the host. (CVE-2010-2784)\n\nA NULL pointer dereference flaw was found when the host system had a processor with the Intel VT-x extension enabled. A privileged guest user could use this flaw to trick the host into emulating a certain instruction, which could crash the host (denial of service).\n(CVE-2010-0435)\n\nThis update also fixes the following bugs :\n\n* running a 'qemu-img' check on a faulty virtual machine image ended with a segmentation fault. With this update, the segmentation fault no longer occurs when running the 'qemu-img' check. (BZ#610342)\n\n* when attempting to transfer a file between two guests that were joined in the same virtual LAN (VLAN), the receiving guest unexpectedly quit. With this update, the transfer completes successfully. (BZ#610343)\n\n* installation of a system was occasionally failing in KVM. This was caused by KVM using wrong permissions for large guest pages. With this update, the installation completes successfully. (BZ#616796)\n\n* previously, the migration process would fail for a virtual machine because the virtual machine could not map all the memory. This was caused by a conflict that was initiated when a virtual machine was initially run and then migrated right away. With this update, the conflict no longer occurs and the migration process no longer fails.\n(BZ#618205)\n\n* using a thinly provisioned VirtIO disk on iSCSI storage and performing a 'qemu-img' check during an 'e_no_space' event returned cluster errors. With this update, the errors no longer appear.\n(BZ#618206)\n\nAll KVM users should upgrade to these updated packages, which contain backported patches to resolve these issues. Note: The procedure in the Solution section must be performed before this update will take effect.", "cvss3": {"score": null, "vector": null}, "published": "2013-07-12T00:00:00", "type": "nessus", "title": "Oracle Linux 5 : kvm (ELSA-2010-0627)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-0431", "CVE-2010-0435", "CVE-2010-2784"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:kmod-kvm", "p-cpe:/a:oracle:linux:kvm", "p-cpe:/a:oracle:linux:kvm-qemu-img", "p-cpe:/a:oracle:linux:kvm-tools", "cpe:/o:oracle:linux:5"], "id": "ORACLELINUX_ELSA-2010-0627.NASL", "href": "https://www.tenable.com/plugins/nessus/68085", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2010:0627 and \n# Oracle Linux Security Advisory ELSA-2010-0627 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(68085);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-0431\", \"CVE-2010-0435\", \"CVE-2010-2784\");\n script_xref(name:\"RHSA\", value:\"2010:0627\");\n\n script_name(english:\"Oracle Linux 5 : kvm (ELSA-2010-0627)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2010:0627 :\n\nUpdated kvm packages that fix three security issues and multiple bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nKVM (Kernel-based Virtual Machine) is a full virtualization solution\nfor Linux on AMD64 and Intel 64 systems. KVM is a Linux kernel module\nbuilt for the standard Red Hat Enterprise Linux kernel.\n\nIt was found that QEMU-KVM on the host did not validate all pointers\nprovided from a guest system's QXL graphics card driver. A privileged\nguest user could use this flaw to cause the host to dereference an\ninvalid pointer, causing the guest to crash (denial of service) or,\npossibly, resulting in the privileged guest user escalating their\nprivileges on the host. (CVE-2010-0431)\n\nA flaw was found in QEMU-KVM, allowing the guest some control over the\nindex used to access the callback array during sub-page MMIO\ninitialization. A privileged guest user could use this flaw to crash\nthe guest (denial of service) or, possibly, escalate their privileges\non the host. (CVE-2010-2784)\n\nA NULL pointer dereference flaw was found when the host system had a\nprocessor with the Intel VT-x extension enabled. A privileged guest\nuser could use this flaw to trick the host into emulating a certain\ninstruction, which could crash the host (denial of service).\n(CVE-2010-0435)\n\nThis update also fixes the following bugs :\n\n* running a 'qemu-img' check on a faulty virtual machine image ended\nwith a segmentation fault. With this update, the segmentation fault no\nlonger occurs when running the 'qemu-img' check. (BZ#610342)\n\n* when attempting to transfer a file between two guests that were\njoined in the same virtual LAN (VLAN), the receiving guest\nunexpectedly quit. With this update, the transfer completes\nsuccessfully. (BZ#610343)\n\n* installation of a system was occasionally failing in KVM. This was\ncaused by KVM using wrong permissions for large guest pages. With this\nupdate, the installation completes successfully. (BZ#616796)\n\n* previously, the migration process would fail for a virtual machine\nbecause the virtual machine could not map all the memory. This was\ncaused by a conflict that was initiated when a virtual machine was\ninitially run and then migrated right away. With this update, the\nconflict no longer occurs and the migration process no longer fails.\n(BZ#618205)\n\n* using a thinly provisioned VirtIO disk on iSCSI storage and\nperforming a 'qemu-img' check during an 'e_no_space' event returned\ncluster errors. With this update, the errors no longer appear.\n(BZ#618206)\n\nAll KVM users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Note: The procedure in the\nSolution section must be performed before this update will take\neffect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2010-August/001607.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected kvm packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:S/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kmod-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kvm-qemu-img\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kvm-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/08/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/08/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 5\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL5\", cpu:\"x86_64\", reference:\"kmod-kvm-83-164.0.1.el5_5.21\")) flag++;\nif (rpm_check(release:\"EL5\", cpu:\"x86_64\", reference:\"kvm-83-164.0.1.el5_5.21\")) flag++;\nif (rpm_check(release:\"EL5\", cpu:\"x86_64\", reference:\"kvm-qemu-img-83-164.0.1.el5_5.21\")) flag++;\nif (rpm_check(release:\"EL5\", cpu:\"x86_64\", reference:\"kvm-tools-83-164.0.1.el5_5.21\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kmod-kvm / kvm / kvm-qemu-img / kvm-tools\");\n}\n", "cvss": {"score": 6.6, "vector": "AV:L/AC:M/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2022-07-24T14:06:47", "description": "It was found that QEMU-KVM on the host did not validate all pointers provided from a guest system's QXL graphics card driver. A privileged guest user could use this flaw to cause the host to dereference an invalid pointer, causing the guest to crash (denial of service) or, possibly, resulting in the privileged guest user escalating their privileges on the host. (CVE-2010-0431)\n\nA flaw was found in QEMU-KVM, allowing the guest some control over the index used to access the callback array during sub-page MMIO initialization. A privileged guest user could use this flaw to crash the guest (denial of service) or, possibly, escalate their privileges on the host. (CVE-2010-2784)\n\nA NULL pointer dereference flaw was found when the host system had a processor with the Intel VT-x extension enabled. A privileged guest user could use this flaw to trick the host into emulating a certain instruction, which could crash the host (denial of service).\n(CVE-2010-0435)\n\nThis update also fixes the following bugs :\n\n - running a 'qemu-img' check on a faulty virtual machine image ended with a segmentation fault. With this update, the segmentation fault no longer occurs when running the 'qemu-img' check. (BZ#610342)\n\n - when attempting to transfer a file between two guests that were joined in the same virtual LAN (VLAN), the receiving guest unexpectedly quit. With this update, the transfer completes successfully. (BZ#610343)\n\n - installation of a system was occasionally failing in KVM. This was caused by KVM using wrong permissions for large guest pages. With this update, the installation completes successfully. (BZ#616796)\n\n - previously, the migration process would fail for a virtual machine because the virtual machine could not map all the memory. This was caused by a conflict that was initiated when a virtual machine was initially run and then migrated right away. With this update, the conflict no longer occurs and the migration process no longer fails. (BZ#618205)\n\n - using a thinly provisioned VirtIO disk on iSCSI storage and performing a 'qemu-img' check during an 'e_no_space' event returned cluster errors. With this update, the errors no longer appear. (BZ#618206)\n\nNOTE: The following procedure must be performed before this update will take effect :\n\n1) Stop all KVM guest virtual machines.\n\n2) Either reboot the hypervisor machine or, as the root user, remove (using 'modprobe -r [module]') and reload (using 'modprobe [module]') all of the following modules which are currently running (determined using 'lsmod'): kvm, ksm, kvm-intel or kvm-amd.\n\n3) Restart the KVM guest virtual machines.", "cvss3": {"score": null, "vector": null}, "published": "2012-08-01T00:00:00", "type": "nessus", "title": "Scientific Linux Security Update : kvm on SL5.x x86_64", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-0431", "CVE-2010-0435", "CVE-2010-2784"], "modified": "2021-01-14T00:00:00", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20100819_KVM_ON_SL5_X.NASL", "href": "https://www.tenable.com/plugins/nessus/60837", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(60837);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-0431\", \"CVE-2010-0435\", \"CVE-2010-2784\");\n\n script_name(english:\"Scientific Linux Security Update : kvm on SL5.x x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was found that QEMU-KVM on the host did not validate all pointers\nprovided from a guest system's QXL graphics card driver. A privileged\nguest user could use this flaw to cause the host to dereference an\ninvalid pointer, causing the guest to crash (denial of service) or,\npossibly, resulting in the privileged guest user escalating their\nprivileges on the host. (CVE-2010-0431)\n\nA flaw was found in QEMU-KVM, allowing the guest some control over the\nindex used to access the callback array during sub-page MMIO\ninitialization. A privileged guest user could use this flaw to crash\nthe guest (denial of service) or, possibly, escalate their privileges\non the host. (CVE-2010-2784)\n\nA NULL pointer dereference flaw was found when the host system had a\nprocessor with the Intel VT-x extension enabled. A privileged guest\nuser could use this flaw to trick the host into emulating a certain\ninstruction, which could crash the host (denial of service).\n(CVE-2010-0435)\n\nThis update also fixes the following bugs :\n\n - running a 'qemu-img' check on a faulty virtual machine\n image ended with a segmentation fault. With this update,\n the segmentation fault no longer occurs when running the\n 'qemu-img' check. (BZ#610342)\n\n - when attempting to transfer a file between two guests\n that were joined in the same virtual LAN (VLAN), the\n receiving guest unexpectedly quit. With this update, the\n transfer completes successfully. (BZ#610343)\n\n - installation of a system was occasionally failing in\n KVM. This was caused by KVM using wrong permissions for\n large guest pages. With this update, the installation\n completes successfully. (BZ#616796)\n\n - previously, the migration process would fail for a\n virtual machine because the virtual machine could not\n map all the memory. This was caused by a conflict that\n was initiated when a virtual machine was initially run\n and then migrated right away. With this update, the\n conflict no longer occurs and the migration process no\n longer fails. (BZ#618205)\n\n - using a thinly provisioned VirtIO disk on iSCSI storage\n and performing a 'qemu-img' check during an 'e_no_space'\n event returned cluster errors. With this update, the\n errors no longer appear. (BZ#618206)\n\nNOTE: The following procedure must be performed before this update\nwill take effect :\n\n1) Stop all KVM guest virtual machines.\n\n2) Either reboot the hypervisor machine or, as the root user, remove\n(using 'modprobe -r [module]') and reload (using 'modprobe [module]')\nall of the following modules which are currently running (determined\nusing 'lsmod'): kvm, ksm, kvm-intel or kvm-amd.\n\n3) Restart the KVM guest virtual machines.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=610342\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=610343\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=616796\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=618205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=618206\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1008&L=scientific-linux-errata&T=0&P=1755\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f47cfa92\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:S/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/08/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL5\", cpu:\"x86_64\", reference:\"kmod-kvm-83-164.el5_5.21\")) flag++;\nif (rpm_check(release:\"SL5\", cpu:\"x86_64\", reference:\"kvm-83-164.el5_5.21\")) flag++;\nif (rpm_check(release:\"SL5\", cpu:\"x86_64\", reference:\"kvm-qemu-img-83-164.el5_5.21\")) flag++;\nif (rpm_check(release:\"SL5\", cpu:\"x86_64\", reference:\"kvm-tools-83-164.el5_5.21\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.6, "vector": "AV:L/AC:M/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2022-07-24T14:12:23", "description": "Updated kvm packages that fix three security issues and multiple bugs are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nKVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built for the standard Red Hat Enterprise Linux kernel.\n\nIt was found that QEMU-KVM on the host did not validate all pointers provided from a guest system's QXL graphics card driver. A privileged guest user could use this flaw to cause the host to dereference an invalid pointer, causing the guest to crash (denial of service) or, possibly, resulting in the privileged guest user escalating their privileges on the host. (CVE-2010-0431)\n\nA flaw was found in QEMU-KVM, allowing the guest some control over the index used to access the callback array during sub-page MMIO initialization. A privileged guest user could use this flaw to crash the guest (denial of service) or, possibly, escalate their privileges on the host. (CVE-2010-2784)\n\nA NULL pointer dereference flaw was found when the host system had a processor with the Intel VT-x extension enabled. A privileged guest user could use this flaw to trick the host into emulating a certain instruction, which could crash the host (denial of service).\n(CVE-2010-0435)\n\nThis update also fixes the following bugs :\n\n* running a 'qemu-img' check on a faulty virtual machine image ended with a segmentation fault. With this update, the segmentation fault no longer occurs when running the 'qemu-img' check. (BZ#610342)\n\n* when attempting to transfer a file between two guests that were joined in the same virtual LAN (VLAN), the receiving guest unexpectedly quit. With this update, the transfer completes successfully. (BZ#610343)\n\n* installation of a system was occasionally failing in KVM. This was caused by KVM using wrong permissions for large guest pages. With this update, the installation completes successfully. (BZ#616796)\n\n* previously, the migration process would fail for a virtual machine because the virtual machine could not map all the memory. This was caused by a conflict that was initiated when a virtual machine was initially run and then migrated right away. With this update, the conflict no longer occurs and the migration process no longer fails.\n(BZ#618205)\n\n* using a thinly provisioned VirtIO disk on iSCSI storage and performing a 'qemu-img' check during an 'e_no_space' event returned cluster errors. With this update, the errors no longer appear.\n(BZ#618206)\n\nAll KVM users should upgrade to these updated packages, which contain backported patches to resolve these issues. Note: The procedure in the Solution section must be performed before this update will take effect.", "cvss3": {"score": null, "vector": null}, "published": "2013-01-24T00:00:00", "type": "nessus", "title": "RHEL 5 : kvm (RHSA-2010:0627)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-0431", "CVE-2010-0435", "CVE-2010-2784"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:kmod-kvm", "p-cpe:/a:redhat:enterprise_linux:kvm", "p-cpe:/a:redhat:enterprise_linux:kvm-qemu-img", "p-cpe:/a:redhat:enterprise_linux:kvm-tools", "cpe:/o:redhat:enterprise_linux:5"], "id": "REDHAT-RHSA-2010-0627.NASL", "href": "https://www.tenable.com/plugins/nessus/63946", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2010:0627. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(63946);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-0431\", \"CVE-2010-0435\", \"CVE-2010-2784\");\n script_xref(name:\"RHSA\", value:\"2010:0627\");\n\n script_name(english:\"RHEL 5 : kvm (RHSA-2010:0627)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kvm packages that fix three security issues and multiple bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nKVM (Kernel-based Virtual Machine) is a full virtualization solution\nfor Linux on AMD64 and Intel 64 systems. KVM is a Linux kernel module\nbuilt for the standard Red Hat Enterprise Linux kernel.\n\nIt was found that QEMU-KVM on the host did not validate all pointers\nprovided from a guest system's QXL graphics card driver. A privileged\nguest user could use this flaw to cause the host to dereference an\ninvalid pointer, causing the guest to crash (denial of service) or,\npossibly, resulting in the privileged guest user escalating their\nprivileges on the host. (CVE-2010-0431)\n\nA flaw was found in QEMU-KVM, allowing the guest some control over the\nindex used to access the callback array during sub-page MMIO\ninitialization. A privileged guest user could use this flaw to crash\nthe guest (denial of service) or, possibly, escalate their privileges\non the host. (CVE-2010-2784)\n\nA NULL pointer dereference flaw was found when the host system had a\nprocessor with the Intel VT-x extension enabled. A privileged guest\nuser could use this flaw to trick the host into emulating a certain\ninstruction, which could crash the host (denial of service).\n(CVE-2010-0435)\n\nThis update also fixes the following bugs :\n\n* running a 'qemu-img' check on a faulty virtual machine image ended\nwith a segmentation fault. With this update, the segmentation fault no\nlonger occurs when running the 'qemu-img' check. (BZ#610342)\n\n* when attempting to transfer a file between two guests that were\njoined in the same virtual LAN (VLAN), the receiving guest\nunexpectedly quit. With this update, the transfer completes\nsuccessfully. (BZ#610343)\n\n* installation of a system was occasionally failing in KVM. This was\ncaused by KVM using wrong permissions for large guest pages. With this\nupdate, the installation completes successfully. (BZ#616796)\n\n* previously, the migration process would fail for a virtual machine\nbecause the virtual machine could not map all the memory. This was\ncaused by a conflict that was initiated when a virtual machine was\ninitially run and then migrated right away. With this update, the\nconflict no longer occurs and the migration process no longer fails.\n(BZ#618205)\n\n* using a thinly provisioned VirtIO disk on iSCSI storage and\nperforming a 'qemu-img' check during an 'e_no_space' event returned\ncluster errors. With this update, the errors no longer appear.\n(BZ#618206)\n\nAll KVM users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Note: The procedure in the\nSolution section must be performed before this update will take\neffect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-0431\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-0435\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-2784\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2010:0627\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:S/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kmod-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kvm-qemu-img\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kvm-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/08/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/08/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/01/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 5.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2010:0627\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kmod-kvm-83-164.el5_5.21\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kvm-83-164.el5_5.21\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kvm-qemu-img-83-164.el5_5.21\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kvm-tools-83-164.el5_5.21\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kmod-kvm / kvm / kvm-qemu-img / kvm-tools\");\n }\n}\n", "cvss": {"score": 6.6, "vector": "AV:L/AC:M/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2022-04-16T14:11:44", "description": "Updated rhev-hypervisor packages that fix multiple security issues and two bugs are now available.\n\nThe Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nThe rhev-hypervisor package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes everything necessary to run and manage virtual machines: A subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for the Intel 64 and AMD64 architectures with virtualization extensions.\n\nIt was found that the libspice component of QEMU-KVM on the host did not validate all pointers provided from a guest system's QXL graphics card driver. A privileged guest user could use this flaw to cause the host to dereference an invalid pointer, causing the guest to crash (denial of service) or, possibly, resulting in the privileged guest user escalating their privileges on the host. (CVE-2010-0428)\n\nIt was found that the libspice component of QEMU-KVM on the host could be forced to perform certain memory management operations on memory addresses controlled by a guest. A privileged guest user could use this flaw to crash the guest (denial of service) or, possibly, escalate their privileges on the host. (CVE-2010-0429)\n\nIt was found that QEMU-KVM on the host did not validate all pointers provided from a guest system's QXL graphics card driver. A privileged guest user could use this flaw to cause the host to dereference an invalid pointer, causing the guest to crash (denial of service) or, possibly, resulting in the privileged guest user escalating their privileges on the host. (CVE-2010-0431)\n\nA flaw was found in QEMU-KVM, allowing the guest some control over the index used to access the callback array during sub-page MMIO initialization. A privileged guest user could use this flaw to crash the guest (denial of service) or, possibly, escalate their privileges on the host. (CVE-2010-2784)\n\nA NULL pointer dereference flaw was found when Red Hat Enterprise Virtualization Hypervisor was run on a system that has a processor with the Intel VT-x extension enabled. A privileged guest user could use this flaw to trick the host into emulating a certain instruction, which could crash the host (denial of service). (CVE-2010-0435)\n\nA flaw was found in the way VDSM accepted SSL connections. An attacker could trigger this flaw by creating a crafted SSL connection to VDSM, preventing VDSM from accepting SSL connections from other users.\n(CVE-2010-2811)\n\nThese updated packages provide updated components that include fixes for security issues; however, these issues have no security impact for Red Hat Enterprise Virtualization Hypervisor. These fixes are for avahi issues CVE-2009-0758 and CVE-2010-2244; freetype issues CVE-2010-1797, CVE-2010-2498, CVE-2010-2499, CVE-2010-2500, CVE-2010-2519, CVE-2010-2527, and CVE-2010-2541; kernel issues CVE-2010-1084, CVE-2010-2066, CVE-2010-2070, CVE-2010-2226, CVE-2010-2248, CVE-2010-2521, and CVE-2010-2524; and openldap issues CVE-2010-0211 and CVE-2010-0212.\n\nThese updated rhev-hypervisor packages also fix two bugs.\nDocumentation for these bug fixes will be available shortly from http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization_fo r_Servers /2.2/html/Technical_Notes/index.html\n\nAs Red Hat Enterprise Virtualization Hypervisor is based on KVM, the bug fixes from the KVM update RHSA-2010:0627 have been included in this update. Also included are the bug fixes from the VDSM update RHSA-2010:0628.\n\nKVM: https://rhn.redhat.com/errata/RHSA-2010-0627.html VDSM:\nhttps://rhn.redhat.com/errata/RHSA-2010-0628.html\n\nUsers of Red Hat Enterprise Virtualization Hypervisor are advised to upgrade to these updated rhev-hypervisor packages, which resolve these issues.", "cvss3": {"score": null, "vector": null}, "published": "2014-11-17T00:00:00", "type": "nessus", "title": "RHEL 5 : rhev-hypervisor (RHSA-2010:0622)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-0758", "CVE-2010-0211", "CVE-2010-0212", "CVE-2010-0428", "CVE-2010-0429", "CVE-2010-0431", "CVE-2010-0435", "CVE-2010-1084", "CVE-2010-1797", "CVE-2010-2066", "CVE-2010-2070", "CVE-2010-2226", "CVE-2010-2244", "CVE-2010-2248", "CVE-2010-2498", "CVE-2010-2499", "CVE-2010-2500", "CVE-2010-2519", "CVE-2010-2521", "CVE-2010-2524", "CVE-2010-2527", "CVE-2010-2541", "CVE-2010-2784", "CVE-2010-2811"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:rhev-hypervisor", "p-cpe:/a:redhat:enterprise_linux:rhev-hypervisor-pxe", "cpe:/o:redhat:enterprise_linux:5"], "id": "REDHAT-RHSA-2010-0622.NASL", "href": "https://www.tenable.com/plugins/nessus/79276", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2010:0622. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(79276);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-0428\", \"CVE-2010-0429\", \"CVE-2010-0431\", \"CVE-2010-0435\", \"CVE-2010-2784\", \"CVE-2010-2811\");\n script_bugtraq_id(42580);\n script_xref(name:\"RHSA\", value:\"2010:0622\");\n\n script_name(english:\"RHEL 5 : rhev-hypervisor (RHSA-2010:0622)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated rhev-hypervisor packages that fix multiple security issues and\ntwo bugs are now available.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe rhev-hypervisor package provides a Red Hat Enterprise\nVirtualization Hypervisor ISO disk image. The Red Hat Enterprise\nVirtualization Hypervisor is a dedicated Kernel-based Virtual Machine\n(KVM) hypervisor. It includes everything necessary to run and manage\nvirtual machines: A subset of the Red Hat Enterprise Linux operating\nenvironment and the Red Hat Enterprise Virtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available\nfor the Intel 64 and AMD64 architectures with virtualization\nextensions.\n\nIt was found that the libspice component of QEMU-KVM on the host did\nnot validate all pointers provided from a guest system's QXL graphics\ncard driver. A privileged guest user could use this flaw to cause the\nhost to dereference an invalid pointer, causing the guest to crash\n(denial of service) or, possibly, resulting in the privileged guest\nuser escalating their privileges on the host. (CVE-2010-0428)\n\nIt was found that the libspice component of QEMU-KVM on the host could\nbe forced to perform certain memory management operations on memory\naddresses controlled by a guest. A privileged guest user could use\nthis flaw to crash the guest (denial of service) or, possibly,\nescalate their privileges on the host. (CVE-2010-0429)\n\nIt was found that QEMU-KVM on the host did not validate all pointers\nprovided from a guest system's QXL graphics card driver. A privileged\nguest user could use this flaw to cause the host to dereference an\ninvalid pointer, causing the guest to crash (denial of service) or,\npossibly, resulting in the privileged guest user escalating their\nprivileges on the host. (CVE-2010-0431)\n\nA flaw was found in QEMU-KVM, allowing the guest some control over the\nindex used to access the callback array during sub-page MMIO\ninitialization. A privileged guest user could use this flaw to crash\nthe guest (denial of service) or, possibly, escalate their privileges\non the host. (CVE-2010-2784)\n\nA NULL pointer dereference flaw was found when Red Hat Enterprise\nVirtualization Hypervisor was run on a system that has a processor\nwith the Intel VT-x extension enabled. A privileged guest user could\nuse this flaw to trick the host into emulating a certain instruction,\nwhich could crash the host (denial of service). (CVE-2010-0435)\n\nA flaw was found in the way VDSM accepted SSL connections. An attacker\ncould trigger this flaw by creating a crafted SSL connection to VDSM,\npreventing VDSM from accepting SSL connections from other users.\n(CVE-2010-2811)\n\nThese updated packages provide updated components that include fixes\nfor security issues; however, these issues have no security impact for\nRed Hat Enterprise Virtualization Hypervisor. These fixes are for\navahi issues CVE-2009-0758 and CVE-2010-2244; freetype issues\nCVE-2010-1797, CVE-2010-2498, CVE-2010-2499, CVE-2010-2500,\nCVE-2010-2519, CVE-2010-2527, and CVE-2010-2541; kernel issues\nCVE-2010-1084, CVE-2010-2066, CVE-2010-2070, CVE-2010-2226,\nCVE-2010-2248, CVE-2010-2521, and CVE-2010-2524; and openldap issues\nCVE-2010-0211 and CVE-2010-0212.\n\nThese updated rhev-hypervisor packages also fix two bugs.\nDocumentation for these bug fixes will be available shortly from\nhttp://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization_fo\nr_Servers /2.2/html/Technical_Notes/index.html\n\nAs Red Hat Enterprise Virtualization Hypervisor is based on KVM, the\nbug fixes from the KVM update RHSA-2010:0627 have been included in\nthis update. Also included are the bug fixes from the VDSM update\nRHSA-2010:0628.\n\nKVM: https://rhn.redhat.com/errata/RHSA-2010-0627.html VDSM:\nhttps://rhn.redhat.com/errata/RHSA-2010-0628.html\n\nUsers of Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to these updated rhev-hypervisor packages, which resolve these\nissues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-0428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-0429\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-0431\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-0435\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-2784\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-2811\"\n );\n # http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization_for_Servers\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?cb2e5a4a\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2010:0622\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected rhev-hypervisor and / or rhev-hypervisor-pxe\npackages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhev-hypervisor\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhev-hypervisor-pxe\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/08/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/08/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/11/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 5.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2010:0622\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL5\", reference:\"rhev-hypervisor-5.5-2.2.6.1.el5_5rhev2_2\")) flag++;\n if (rpm_check(release:\"RHEL5\", reference:\"rhev-hypervisor-pxe-5.5-2.2.6.1.el5_5rhev2_2\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"rhev-hypervisor / rhev-hypervisor-pxe\");\n }\n}\n", "cvss": {"score": 6.6, "vector": "AV:L/AC:M/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2022-06-16T16:48:49", "description": "Gleb Napatov discovered that KVM did not correctly check certain privileged operations. A local attacker with access to a guest kernel could exploit this to crash the host system, leading to a denial of service. (CVE-2010-0435)\n\nDan Rosenberg discovered that the Linux kernel TIPC implementation contained multiple integer signedness errors. A local attacker could exploit this to gain root privileges. (CVE-2010-3859)\n\nDan Rosenberg discovered that the Linux kernel X.25 implementation incorrectly parsed facilities. A remote attacker could exploit this to crash the kernel, leading to a denial of service. (CVE-2010-3873)\n\nDan Rosenberg discovered that the CAN protocol on 64bit systems did not correctly calculate the size of certain buffers. A local attacker could exploit this to crash the system or possibly execute arbitrary code as the root user. (CVE-2010-3874)\n\nVasiliy Kulikov discovered that kvm did not correctly clear memory. A local attacker could exploit this to read portions of the kernel stack, leading to a loss of privacy. (CVE-2010-3881)\n\nDan Rosenberg discovered that IPC structures were not correctly initialized on 64bit systems. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.\n(CVE-2010-4073)\n\nDan Rosenberg discovered that the ivtv V4L driver did not correctly initialize certian structures. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.\n(CVE-2010-4079)\n\nDan Rosenberg discovered that the semctl syscall did not correctly clear kernel memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2010-4083)\n\nDan Rosenberg discovered that the socket filters did not correctly initialize structure memory. A local attacker could create malicious filters to read portions of kernel stack memory, leading to a loss of privacy. (CVE-2010-4158)\n\nDan Rosenberg discovered that the Linux kernel L2TP implementation contained multiple integer signedness errors. A local attacker could exploit this to to crash the kernel, or possibly gain root privileges.\n(CVE-2010-4160)\n\nDan Rosenberg discovered that certain iovec operations did not calculate page counts correctly. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2010-4162)\n\nDan Rosenberg discovered multiple flaws in the X.25 facilities parsing. If a system was using X.25, a remote attacker could exploit this to crash the system, leading to a denial of service.\n(CVE-2010-4164)\n\nSteve Chen discovered that setsockopt did not correctly check MSS values. A local attacker could make a specially crafted socket call to crash the system, leading to a denial of service. (CVE-2010-4165)\n\nDave Jones discovered that the mprotect system call did not correctly handle merged VMAs. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2010-4169)\n\nDan Rosenberg discovered that the RDS protocol did not correctly check ioctl arguments. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2010-4175)\n\nBrad Spengler discovered that the kernel did not correctly account for userspace memory allocations during exec() calls. A local attacker could exploit this to consume all system memory, leading to a denial of service. (CVE-2010-4243)\n\nVegard Nossum discovered that memory garbage collection was not handled correctly for active sockets. A local attacker could exploit this to allocate all available kernel memory, leading to a denial of service. (CVE-2010-4249)\n\nIt was discovered that named pipes did not correctly handle certain fcntl calls. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2010-4256)\n\nNelson Elhage discovered that the kernel did not correctly handle process cleanup after triggering a recoverable kernel bug. If a local attacker were able to trigger certain kinds of kernel bugs, they could create a specially crafted process to gain root privileges.\n(CVE-2010-4258).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2011-02-02T00:00:00", "type": "nessus", "title": "Ubuntu 10.04 LTS / 10.10 : linux, linux-ec2 vulnerabilities (USN-1054-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-0435", "CVE-2010-3859", "CVE-2010-3873", "CVE-2010-3874", "CVE-2010-3881", "CVE-2010-4073", "CVE-2010-4079", "CVE-2010-4083", "CVE-2010-4158", "CVE-2010-4160", "CVE-2010-4162", "CVE-2010-4164", "CVE-2010-4165", "CVE-2010-4169", "CVE-2010-4175", "CVE-2010-4243", "CVE-2010-4249", "CVE-2010-4256", "CVE-2010-4258"], "modified": "2019-09-19T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-doc", "p-cpe:/a:canonical:ubuntu_linux:linux-ec2-doc", "p-cpe:/a:canonical:ubuntu_linux:linux-ec2-source-2.6.32", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-386", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-ec2", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-generic-pae", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-preempt", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-server", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-virtual", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-386", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-ec2", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-generic-pae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-lpia", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-preempt", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-server", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-versatile", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-virtual", "p-cpe:/a:canonical:ubuntu_linux:linux-libc-dev", "p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.32", "p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.35", "p-cpe:/a:canonical:ubuntu_linux:linux-tools-2.6", "p-cpe:/a:canonical:ubuntu_linux:linux-tools-common", "cpe:/o:canonical:ubuntu_linux:10.04:-:lts", "cpe:/o:canonical:ubuntu_linux:10.10"], "id": "UBUNTU_USN-1054-1.NASL", "href": "https://www.tenable.com/plugins/nessus/51847", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1054-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(51847);\n script_version(\"1.11\");\n script_cvs_date(\"Date: 2019/09/19 12:54:26\");\n\n script_cve_id(\"CVE-2010-0435\", \"CVE-2010-3859\", \"CVE-2010-3873\", \"CVE-2010-3874\", \"CVE-2010-3881\", \"CVE-2010-4073\", \"CVE-2010-4079\", \"CVE-2010-4083\", \"CVE-2010-4158\", \"CVE-2010-4160\", \"CVE-2010-4162\", \"CVE-2010-4164\", \"CVE-2010-4165\", \"CVE-2010-4169\", \"CVE-2010-4175\", \"CVE-2010-4243\", \"CVE-2010-4249\", \"CVE-2010-4256\", \"CVE-2010-4258\");\n script_xref(name:\"USN\", value:\"1054-1\");\n\n script_name(english:\"Ubuntu 10.04 LTS / 10.10 : linux, linux-ec2 vulnerabilities (USN-1054-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Gleb Napatov discovered that KVM did not correctly check certain\nprivileged operations. A local attacker with access to a guest kernel\ncould exploit this to crash the host system, leading to a denial of\nservice. (CVE-2010-0435)\n\nDan Rosenberg discovered that the Linux kernel TIPC implementation\ncontained multiple integer signedness errors. A local attacker could\nexploit this to gain root privileges. (CVE-2010-3859)\n\nDan Rosenberg discovered that the Linux kernel X.25 implementation\nincorrectly parsed facilities. A remote attacker could exploit this to\ncrash the kernel, leading to a denial of service. (CVE-2010-3873)\n\nDan Rosenberg discovered that the CAN protocol on 64bit systems did\nnot correctly calculate the size of certain buffers. A local attacker\ncould exploit this to crash the system or possibly execute arbitrary\ncode as the root user. (CVE-2010-3874)\n\nVasiliy Kulikov discovered that kvm did not correctly clear memory. A\nlocal attacker could exploit this to read portions of the kernel\nstack, leading to a loss of privacy. (CVE-2010-3881)\n\nDan Rosenberg discovered that IPC structures were not correctly\ninitialized on 64bit systems. A local attacker could exploit this to\nread kernel stack memory, leading to a loss of privacy.\n(CVE-2010-4073)\n\nDan Rosenberg discovered that the ivtv V4L driver did not correctly\ninitialize certian structures. A local attacker could exploit this to\nread kernel stack memory, leading to a loss of privacy.\n(CVE-2010-4079)\n\nDan Rosenberg discovered that the semctl syscall did not correctly\nclear kernel memory. A local attacker could exploit this to read\nkernel stack memory, leading to a loss of privacy. (CVE-2010-4083)\n\nDan Rosenberg discovered that the socket filters did not correctly\ninitialize structure memory. A local attacker could create malicious\nfilters to read portions of kernel stack memory, leading to a loss of\nprivacy. (CVE-2010-4158)\n\nDan Rosenberg discovered that the Linux kernel L2TP implementation\ncontained multiple integer signedness errors. A local attacker could\nexploit this to to crash the kernel, or possibly gain root privileges.\n(CVE-2010-4160)\n\nDan Rosenberg discovered that certain iovec operations did not\ncalculate page counts correctly. A local attacker could exploit this\nto crash the system, leading to a denial of service. (CVE-2010-4162)\n\nDan Rosenberg discovered multiple flaws in the X.25 facilities\nparsing. If a system was using X.25, a remote attacker could exploit\nthis to crash the system, leading to a denial of service.\n(CVE-2010-4164)\n\nSteve Chen discovered that setsockopt did not correctly check MSS\nvalues. A local attacker could make a specially crafted socket call to\ncrash the system, leading to a denial of service. (CVE-2010-4165)\n\nDave Jones discovered that the mprotect system call did not correctly\nhandle merged VMAs. A local attacker could exploit this to crash the\nsystem, leading to a denial of service. (CVE-2010-4169)\n\nDan Rosenberg discovered that the RDS protocol did not correctly check\nioctl arguments. A local attacker could exploit this to crash the\nsystem, leading to a denial of service. (CVE-2010-4175)\n\nBrad Spengler discovered that the kernel did not correctly account for\nuserspace memory allocations during exec() calls. A local attacker\ncould exploit this to consume all system memory, leading to a denial\nof service. (CVE-2010-4243)\n\nVegard Nossum discovered that memory garbage collection was not\nhandled correctly for active sockets. A local attacker could exploit\nthis to allocate all available kernel memory, leading to a denial of\nservice. (CVE-2010-4249)\n\nIt was discovered that named pipes did not correctly handle certain\nfcntl calls. A local attacker could exploit this to crash the system,\nleading to a denial of service. (CVE-2010-4256)\n\nNelson Elhage discovered that the kernel did not correctly handle\nprocess cleanup after triggering a recoverable kernel bug. If a local\nattacker were able to trigger certain kinds of kernel bugs, they could\ncreate a specially crafted process to gain root privileges.\n(CVE-2010-4258).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/1054-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-ec2-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-ec2-source-2.6.32\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-ec2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-generic-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-ec2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-generic-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-lpia\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-versatile\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-libc-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.32\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.35\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-tools-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-tools-common\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/08/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/02/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/02/02\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2011-2019 Canonical, Inc. / NASL script (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(10\\.04|10\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 10.04 / 10.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2010-0435\", \"CVE-2010-3859\", \"CVE-2010-3873\", \"CVE-2010-3874\", \"CVE-2010-3881\", \"CVE-2010-4073\", \"CVE-2010-4079\", \"CVE-2010-4083\", \"CVE-2010-4158\", \"CVE-2010-4160\", \"CVE-2010-4162\", \"CVE-2010-4164\", \"CVE-2010-4165\", \"CVE-2010-4169\", \"CVE-2010-4175\", \"CVE-2010-4243\", \"CVE-2010-4249\", \"CVE-2010-4256\", \"CVE-2010-4258\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-1054-1\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-doc\", pkgver:\"2.6.32-28.55\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-ec2-doc\", pkgver:\"2.6.32-312.24\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-ec2-source-2.6.32\", pkgver:\"2.6.32-312.24\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-headers-2.6.32-28\", pkgver:\"2.6.32-28.55\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-headers-2.6.32-28-386\", pkgver:\"2.6.32-28.55\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-headers-2.6.32-28-generic\", pkgver:\"2.6.32-28.55\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-headers-2.6.32-28-generic-pae\", pkgver:\"2.6.32-28.55\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-headers-2.6.32-28-preempt\", pkgver:\"2.6.32-28.55\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-headers-2.6.32-28-server\", pkgver:\"2.6.32-28.55\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-headers-2.6.32-312\", pkgver:\"2.6.32-312.24\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-headers-2.6.32-312-ec2\", pkgver:\"2.6.32-312.24\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-image-2.6.32-28-386\", pkgver:\"2.6.32-28.55\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-image-2.6.32-28-generic\", pkgver:\"2.6.32-28.55\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-image-2.6.32-28-generic-pae\", pkgver:\"2.6.32-28.55\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-image-2.6.32-28-lpia\", pkgver:\"2.6.32-28.55\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-image-2.6.32-28-preempt\", pkgver:\"2.6.32-28.55\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-image-2.6.32-28-server\", pkgver:\"2.6.32-28.55\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-image-2.6.32-28-versatile\", pkgver:\"2.6.32-28.55\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-image-2.6.32-28-virtual\", pkgver:\"2.6.32-28.55\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-image-2.6.32-312-ec2\", pkgver:\"2.6.32-312.24\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-libc-dev\", pkgver:\"2.6.32-28.55\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-source-2.6.32\", pkgver:\"2.6.32-28.55\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-tools-2.6.32-28\", pkgver:\"2.6.32-28.55\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-tools-common\", pkgver:\"2.6.32-28.55\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"linux-doc\", pkgver:\"2.6.35-25.44\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"linux-headers-2.6.35-25\", pkgver:\"2.6.35-25.44\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"linux-headers-2.6.35-25-generic\", pkgver:\"2.6.35-25.44\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"linux-headers-2.6.35-25-generic-pae\", pkgver:\"2.6.35-25.44\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"linux-headers-2.6.35-25-server\", pkgver:\"2.6.35-25.44\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"linux-headers-2.6.35-25-virtual\", pkgver:\"2.6.35-25.44\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"linux-image-2.6.35-25-generic\", pkgver:\"2.6.35-25.44\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"linux-image-2.6.35-25-generic-pae\", pkgver:\"2.6.35-25.44\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"linux-image-2.6.35-25-server\", pkgver:\"2.6.35-25.44\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"linux-image-2.6.35-25-versatile\", pkgver:\"2.6.35-25.44\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"linux-image-2.6.35-25-virtual\", pkgver:\"2.6.35-25.44\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"linux-libc-dev\", pkgver:\"2.6.35-1025.44\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"linux-source-2.6.35\", pkgver:\"2.6.35-25.44\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"linux-tools-2.6.35-25\", pkgver:\"2.6.35-25.44\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"linux-tools-common\", pkgver:\"2.6.35-25.44\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-doc / linux-ec2-doc / linux-ec2-source-2.6.32 / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2022-06-16T16:47:56", "description": "Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leak. The Common Vulnerabilities and Exposures project identifies the following problems :\n\n - CVE-2010-0435 Gleb Napatov reported an issue in the KVM subsystem that allows virtual machines to cause a denial of service of the host machine by executing mov to/from DR instructions.\n\n - CVE-2010-3699 Keir Fraser provided a fix for an issue in the Xen subsystem. A guest can cause a denial of service on the host by retaining a leaked reference to a device. This can result in a zombie domain, xenwatch process hangs, and xm command failures.\n\n - CVE-2010-4158 Dan Rosenberg discovered an issue in the socket filters subsystem, allowing local unprivileged users to obtain the contents of sensitive kernel memory.\n\n - CVE-2010-4162 Dan Rosenberg discovered an overflow issue in the block I/O subsystem that allows local users to map large numbers of pages, resulting in a denial of service due to invocation of the out of memory killer.\n\n - CVE-2010-4163 Dan Rosenberg discovered an issue in the block I/O subsystem. Due to improper validation of iov segments, local users can trigger a kernel panic resulting in a denial of service.\n\n - CVE-2010-4242 Alan Cox reported an issue in the Bluetooth subsystem.\n Local users with sufficient permission to access HCI UART devices can cause a denial of service (NULL pointer dereference) due to a missing check for an existing tty write operation.\n\n - CVE-2010-4243 Brad Spengler reported a denial-of-service issue in the kernel memory accounting system. By passing large argv/envp values to exec, local users can cause the out of memory killer to kill processes owned by other users.\n\n - CVE-2010-4248 Oleg Nesterov reported an issue in the POSIX CPU timers subsystem. Local users can cause a denial of service (Oops) due to incorrect assumptions about thread group leader behavior.\n\n - CVE-2010-4249 Vegard Nossum reported an issue with the UNIX socket garbage collector. Local users can consume all of LOWMEM and decrease system performance by overloading the system with inflight sockets.\n\n - CVE-2010-4258 Nelson Elhage reported an issue in Linux oops handling.\n Local users may be able to obtain elevated privileges if they are able to trigger an oops with a process' fs set to KERNEL_DS.\n\n - CVE-2010-4342 Nelson Elhage reported an issue in the Econet protocol.\n Remote attackers can cause a denial of service by sending an Acorn Universal Networking packet over UDP.\n\n - CVE-2010-4346 Tavis Ormandy discovered an issue in the install_special_mapping routine which allows local users to bypass the mmap_min_addr security restriction.\n Combined with an otherwise low severity local denial of service vulnerability (NULL pointer dereference), a local user could obtain elevated privileges.\n\n - CVE-2010-4526 Eugene Teo reported a race condition in the Linux SCTP implementation. Remote users can cause a denial of service (kernel memory corruption) by transmitting an ICMP unreachable message to a locked socket.\n\n - CVE-2010-4527 Dan Rosenberg reported two issues in the OSS soundcard driver. Local users with access to the device (members of group 'audio' on default Debian installations) may access to sensitive kernel memory or cause a buffer overflow, potentially leading to an escalation of privileges.\n\n - CVE-2010-4529 Dan Rosenberg reported an issue in the Linux kernel IrDA socket implementation on non-x86 architectures. Local users may be able to gain access to sensitive kernel memory via a specially crafted IRLMP_ENUMDEVICES getsockopt call.\n\n - CVE-2010-4565 Dan Rosenberg reported an issue in the Linux CAN protocol implementation. Local users can obtain the address of a kernel heap object which might help facilitate system exploitation.\n\n - CVE-2010-4649 Dan Carpenter reported an issue in the uverb handling of the InfiniBand subsystem. A potential buffer overflow may allow local users to cause a denial of service (memory corruption) by passing in a large cmd.ne value.\n\n - CVE-2010-4656 Kees Cook reported an issue in the driver for I/O-Warrior USB devices. Local users with access to these devices may be able to overrun kernel buffers, resulting in a denial of service or privilege escalation.\n\n - CVE-2010-4668 Dan Rosenberg reported an issue in the block subsystem.\n A local user can cause a denial of service (kernel panic) by submitting certain 0-length I/O requests.\n\n - CVE-2011-0521 Dan Carpenter reported an issue in the DVB driver for AV7110 cards. Local users can pass a negative info->num value, corrupting kernel memory and causing a denial of service.", "cvss3": {"score": null, "vector": null}, "published": "2011-01-31T00:00:00", "type": "nessus", "title": "Debian DSA-2153-1 : linux-2.6 - privilege escalation/denial of service/information leak", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-0435", "CVE-2010-3699", "CVE-2010-4158", "CVE-2010-4162", "CVE-2010-4163", "CVE-2010-4242", "CVE-2010-4243", "CVE-2010-4248", "CVE-2010-4249", "CVE-2010-4258", "CVE-2010-4342", "CVE-2010-4346", "CVE-2010-4526", "CVE-2010-4527", "CVE-2010-4529", "CVE-2010-4565", "CVE-2010-4649", "CVE-2010-4656", "CVE-2010-4668", "CVE-2011-0521"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:linux-2.6", "cpe:/o:debian:debian_linux:5.0"], "id": "DEBIAN_DSA-2153.NASL", "href": "https://www.tenable.com/plugins/nessus/51818", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-2153. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51818);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2010-0435\", \"CVE-2010-3699\", \"CVE-2010-4158\", \"CVE-2010-4162\", \"CVE-2010-4163\", \"CVE-2010-4242\", \"CVE-2010-4243\", \"CVE-2010-4248\", \"CVE-2010-4249\", \"CVE-2010-4258\", \"CVE-2010-4342\", \"CVE-2010-4346\", \"CVE-2010-4526\", \"CVE-2010-4527\", \"CVE-2010-4529\", \"CVE-2010-4565\", \"CVE-2010-4649\", \"CVE-2010-4656\", \"CVE-2010-4668\", \"CVE-2011-0521\");\n script_bugtraq_id(42582, 44661, 44758, 44793, 45004, 45014, 45028, 45037, 45039, 45159, 45321, 45323, 45556, 45629, 45660, 45661, 45986);\n script_xref(name:\"DSA\", value:\"2153\");\n\n script_name(english:\"Debian DSA-2153-1 : linux-2.6 - privilege escalation/denial of service/information leak\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been discovered in the Linux kernel that\nmay lead to a privilege escalation, denial of service or information\nleak. The Common Vulnerabilities and Exposures project identifies the\nfollowing problems :\n\n - CVE-2010-0435\n Gleb Napatov reported an issue in the KVM subsystem that\n allows virtual machines to cause a denial of service of\n the host machine by executing mov to/from DR\n instructions.\n\n - CVE-2010-3699\n Keir Fraser provided a fix for an issue in the Xen\n subsystem. A guest can cause a denial of service on the\n host by retaining a leaked reference to a device. This\n can result in a zombie domain, xenwatch process hangs,\n and xm command failures.\n\n - CVE-2010-4158\n Dan Rosenberg discovered an issue in the socket filters\n subsystem, allowing local unprivileged users to obtain\n the contents of sensitive kernel memory.\n\n - CVE-2010-4162\n Dan Rosenberg discovered an overflow issue in the block\n I/O subsystem that allows local users to map large\n numbers of pages, resulting in a denial of service due\n to invocation of the out of memory killer.\n\n - CVE-2010-4163\n Dan Rosenberg discovered an issue in the block I/O\n subsystem. Due to improper validation of iov segments,\n local users can trigger a kernel panic resulting in a\n denial of service.\n\n - CVE-2010-4242\n Alan Cox reported an issue in the Bluetooth subsystem.\n Local users with sufficient permission to access HCI\n UART devices can cause a denial of service (NULL pointer\n dereference) due to a missing check for an existing tty\n write operation.\n\n - CVE-2010-4243\n Brad Spengler reported a denial-of-service issue in the\n kernel memory accounting system. By passing large\n argv/envp values to exec, local users can cause the out\n of memory killer to kill processes owned by other users.\n\n - CVE-2010-4248\n Oleg Nesterov reported an issue in the POSIX CPU timers\n subsystem. Local users can cause a denial of service\n (Oops) due to incorrect assumptions about thread group\n leader behavior.\n\n - CVE-2010-4249\n Vegard Nossum reported an issue with the UNIX socket\n garbage collector. Local users can consume all of LOWMEM\n and decrease system performance by overloading the\n system with inflight sockets.\n\n - CVE-2010-4258\n Nelson Elhage reported an issue in Linux oops handling.\n Local users may be able to obtain elevated privileges if\n they are able to trigger an oops with a process' fs set\n to KERNEL_DS.\n\n - CVE-2010-4342\n Nelson Elhage reported an issue in the Econet protocol.\n Remote attackers can cause a denial of service by\n sending an Acorn Universal Networking packet over UDP.\n\n - CVE-2010-4346\n Tavis Ormandy discovered an issue in the\n install_special_mapping routine which allows local users\n to bypass the mmap_min_addr security restriction.\n Combined with an otherwise low severity local denial of\n service vulnerability (NULL pointer dereference), a\n local user could obtain elevated privileges.\n\n - CVE-2010-4526\n Eugene Teo reported a race condition in the Linux SCTP\n implementation. Remote users can cause a denial of\n service (kernel memory corruption) by transmitting an\n ICMP unreachable message to a locked socket.\n\n - CVE-2010-4527\n Dan Rosenberg reported two issues in the OSS soundcard\n driver. Local users with access to the device (members\n of group 'audio' on default Debian installations) may\n access to sensitive kernel memory or cause a buffer\n overflow, potentially leading to an escalation of\n privileges.\n\n - CVE-2010-4529\n Dan Rosenberg reported an issue in the Linux kernel IrDA\n socket implementation on non-x86 architectures. Local\n users may be able to gain access to sensitive kernel\n memory via a specially crafted IRLMP_ENUMDEVICES\n getsockopt call.\n\n - CVE-2010-4565\n Dan Rosenberg reported an issue in the Linux CAN\n protocol implementation. Local users can obtain the\n address of a kernel heap object which might help\n facilitate system exploitation.\n\n - CVE-2010-4649\n Dan Carpenter reported an issue in the uverb handling of\n the InfiniBand subsystem. A potential buffer overflow\n may allow local users to cause a denial of service\n (memory corruption) by passing in a large cmd.ne value.\n\n - CVE-2010-4656\n Kees Cook reported an issue in the driver for\n I/O-Warrior USB devices. Local users with access to\n these devices may be able to overrun kernel buffers,\n resulting in a denial of service or privilege\n escalation.\n\n - CVE-2010-4668\n Dan Rosenberg reported an issue in the block subsystem.\n A local user can cause a denial of service (kernel\n panic) by submitting certain 0-length I/O requests.\n\n - CVE-2011-0521\n Dan Carpenter reported an issue in the DVB driver for\n AV7110 cards. Local users can pass a negative info->num\n value, corrupting kernel memory and causing a denial of\n service.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-0435\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-3699\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-4158\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-4162\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-4163\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-4242\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-4243\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-4248\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-4249\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-4258\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-4342\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-4346\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-4526\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-4527\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-4529\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-4565\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-4649\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-4656\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-4668\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2011-0521\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2011/dsa-2153\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the linux-2.6 and user-mode-linux packages.\n\nFor the stable distribution (lenny), this problem has been fixed in\nversion 2.6.26-26lenny2.\n\nThe following matrix lists additional source packages that were\nrebuilt for compatibility with or to take advantage of this update :\n\n Debian 5.0 (lenny) \n user-mode-linux 2.6.26-1um-2+26lenny2 \nNote that these updates will not become active until after your system\nis rebooted.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:ND\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:5.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/08/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/01/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/01/31\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"5.0\", prefix:\"linux-base\", reference:\"2.6.26-26lenny2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-08-19T13:01:34", "description": "Gleb Napatov discovered that KVM did not correctly check certain privileged operations. A local attacker with access to a guest kernel could exploit this to crash the host system, leading to a denial of service. (CVE-2010-0435)\n\nDave Chinner discovered that the XFS filesystem did not correctly order inode lookups when exported by NFS. A remote attacker could exploit this to read or write disk blocks that had changed file assignment or had become unlinked, leading to a loss of privacy.\n(CVE-2010-2943)\n\nDan Rosenberg discovered that several network ioctls did not clear kernel memory correctly. A local user could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2010-3296, CVE-2010-3297)\n\nDan Jacobson discovered that ThinkPad video output was not correctly access controlled. A local attacker could exploit this to hang the system, leading to a denial of service. (CVE-2010-3448)\n\nIt was discovered that KVM did not correctly initialize certain CPU registers. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2010-3698)\n\nIt was discovered that Xen did not correctly clean up threads. A local attacker in a guest system could exploit this to exhaust host system resources, leading to a denial of serivce. (CVE-2010-3699)\n\nBrad Spengler discovered that stack memory for new a process was not correctly calculated. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2010-3858)\n\nDan Rosenberg discovered that the Linux kernel TIPC implementation contained multiple integer signedness errors. A local attacker could exploit this to gain root privileges. (CVE-2010-3859)\n\nDan Rosenberg discovered that the Linux kernel X.25 implementation incorrectly parsed facilities. A remote attacker could exploit this to crash the kernel, leading to a denial of service. (CVE-2010-3873)\n\nVasiliy Kulikov discovered that the Linux kernel X.25 implementation did not correctly clear kernel memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.\n(CVE-2010-3875)\n\nVasiliy Kulikov discovered that the Linux kernel sockets implementation did not properly initialize certain structures. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2010-3876)\n\nVasiliy Kulikov discovered that the TIPC interface did not correctly initialize certain structures. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.\n(CVE-2010-3877)\n\nNelson Elhage discovered that the Linux kernel IPv4 implementation did not properly audit certain bytecodes in netlink messages. A local attacker could exploit this to cause the kernel to hang, leading to a denial of service. (CVE-2010-3880)\n\nKees Cook and Vasiliy Kulikov discovered that the shm interface did not clear kernel memory correctly. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.\n(CVE-2010-4072)\n\nDan Rosenberg discovered that the USB subsystem did not correctly initialize certian structures. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.\n(CVE-2010-4074)\n\nDan Rosenberg discovered that the SiS video driver did not correctly clear kernel memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2010-4078)\n\nDan Rosenberg discovered that the ivtv V4L driver did not correctly initialize certian structures. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.\n(CVE-2010-4079)\n\nDan Rosenberg discovered that the RME Hammerfall DSP audio interface driver did not correctly clear kernel memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2010-4080, CVE-2010-4081)\n\nDan Rosenberg discovered that the semctl syscall did not correctly clear kernel memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2010-4083)\n\nJames Bottomley discovered that the ICP vortex storage array controller driver did not validate certain sizes. A local attacker on a 64bit system could exploit this to crash the kernel, leading to a denial of service. (CVE-2010-4157)\n\nDan Rosenberg discovered that the Linux kernel L2TP implementation contained multiple integer signedness errors. A local attacker could exploit this to to crash the kernel, or possibly gain root privileges.\n(CVE-2010-4160)\n\nIt was discovered that multithreaded exec did not handle CPU timers correctly. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2010-4248).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2011-03-01T00:00:00", "type": "nessus", "title": "Ubuntu 8.04 LTS : linux vulnerabilities (USN-1072-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-0435", "CVE-2010-2943", "CVE-2010-3296", "CVE-2010-3297", "CVE-2010-3448", "CVE-2010-3698", "CVE-2010-3699", "CVE-2010-3858", "CVE-2010-3859", "CVE-2010-3873", "CVE-2010-3875", "CVE-2010-3876", "CVE-2010-3877", "CVE-2010-3880", "CVE-2010-4072", "CVE-2010-4074", "CVE-2010-4078", "CVE-2010-4079", "CVE-2010-4080", "CVE-2010-4081", "CVE-2010-4083", "CVE-2010-4157", "CVE-2010-4160", "CVE-2010-4248"], "modified": "2019-09-19T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.24", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-386", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-openvz", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-rt", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-server", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-virtual", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-xen", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-386", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-lpia", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-lpiacompat", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-openvz", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-rt", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-server", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-virtual", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-xen", "p-cpe:/a:canonical:ubuntu_linux:linux-image-debug-2.6-386", "p-cpe:/a:canonical:ubuntu_linux:linux-image-debug-2.6-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-debug-2.6-server", "p-cpe:/a:canonical:ubuntu_linux:linux-image-debug-2.6-virtual", "p-cpe:/a:canonical:ubuntu_linux:linux-kernel-devel", "p-cpe:/a:canonical:ubuntu_linux:linux-libc-dev", "p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.24", "cpe:/o:canonical:ubuntu_linux:8.04:-:lts"], "id": "UBUNTU_USN-1072-1.NASL", "href": "https://www.tenable.com/plugins/nessus/52475", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1072-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(52475);\n script_version(\"1.12\");\n script_cvs_date(\"Date: 2019/09/19 12:54:26\");\n\n script_cve_id(\"CVE-2010-0435\", \"CVE-2010-2943\", \"CVE-2010-3296\", \"CVE-2010-3297\", \"CVE-2010-3448\", \"CVE-2010-3698\", \"CVE-2010-3699\", \"CVE-2010-3858\", \"CVE-2010-3859\", \"CVE-2010-3873\", \"CVE-2010-3875\", \"CVE-2010-3876\", \"CVE-2010-3877\", \"CVE-2010-3880\", \"CVE-2010-4072\", \"CVE-2010-4074\", \"CVE-2010-4078\", \"CVE-2010-4079\", \"CVE-2010-4080\", \"CVE-2010-4081\", \"CVE-2010-4083\", \"CVE-2010-4157\", \"CVE-2010-4160\", \"CVE-2010-4248\");\n script_bugtraq_id(38607, 42527, 42582, 43221, 43229, 43809, 43810, 44301, 44354, 44500, 44630, 44642, 44648, 44665, 44762, 45028, 45039, 45054, 45058, 45062, 45063, 45074);\n script_xref(name:\"USN\", value:\"1072-1\");\n\n script_name(english:\"Ubuntu 8.04 LTS : linux vulnerabilities (USN-1072-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Gleb Napatov discovered that KVM did not correctly check certain\nprivileged operations. A local attacker with access to a guest kernel\ncould exploit this to crash the host system, leading to a denial of\nservice. (CVE-2010-0435)\n\nDave Chinner discovered that the XFS filesystem did not correctly\norder inode lookups when exported by NFS. A remote attacker could\nexploit this to read or write disk blocks that had changed file\nassignment or had become unlinked, leading to a loss of privacy.\n(CVE-2010-2943)\n\nDan Rosenberg discovered that several network ioctls did not clear\nkernel memory correctly. A local user could exploit this to read\nkernel stack memory, leading to a loss of privacy. (CVE-2010-3296,\nCVE-2010-3297)\n\nDan Jacobson discovered that ThinkPad video output was not correctly\naccess controlled. A local attacker could exploit this to hang the\nsystem, leading to a denial of service. (CVE-2010-3448)\n\nIt was discovered that KVM did not correctly initialize certain CPU\nregisters. A local attacker could exploit this to crash the system,\nleading to a denial of service. (CVE-2010-3698)\n\nIt was discovered that Xen did not correctly clean up threads. A local\nattacker in a guest system could exploit this to exhaust host system\nresources, leading to a denial of serivce. (CVE-2010-3699)\n\nBrad Spengler discovered that stack memory for new a process was not\ncorrectly calculated. A local attacker could exploit this to crash the\nsystem, leading to a denial of service. (CVE-2010-3858)\n\nDan Rosenberg discovered that the Linux kernel TIPC implementation\ncontained multiple integer signedness errors. A local attacker could\nexploit this to gain root privileges. (CVE-2010-3859)\n\nDan Rosenberg discovered that the Linux kernel X.25 implementation\nincorrectly parsed facilities. A remote attacker could exploit this to\ncrash the kernel, leading to a denial of service. (CVE-2010-3873)\n\nVasiliy Kulikov discovered that the Linux kernel X.25 implementation\ndid not correctly clear kernel memory. A local attacker could exploit\nthis to read kernel stack memory, leading to a loss of privacy.\n(CVE-2010-3875)\n\nVasiliy Kulikov discovered that the Linux kernel sockets\nimplementation did not properly initialize certain structures. A local\nattacker could exploit this to read kernel stack memory, leading to a\nloss of privacy. (CVE-2010-3876)\n\nVasiliy Kulikov discovered that the TIPC interface did not correctly\ninitialize certain structures. A local attacker could exploit this to\nread kernel stack memory, leading to a loss of privacy.\n(CVE-2010-3877)\n\nNelson Elhage discovered that the Linux kernel IPv4 implementation did\nnot properly audit certain bytecodes in netlink messages. A local\nattacker could exploit this to cause the kernel to hang, leading to a\ndenial of service. (CVE-2010-3880)\n\nKees Cook and Vasiliy Kulikov discovered that the shm interface did\nnot clear kernel memory correctly. A local attacker could exploit this\nto read kernel stack memory, leading to a loss of privacy.\n(CVE-2010-4072)\n\nDan Rosenberg discovered that the USB subsystem did not correctly\ninitialize certian structures. A local attacker could exploit this to\nread kernel stack memory, leading to a loss of privacy.\n(CVE-2010-4074)\n\nDan Rosenberg discovered that the SiS video driver did not correctly\nclear kernel memory. A local attacker could exploit this to read\nkernel stack memory, leading to a loss of privacy. (CVE-2010-4078)\n\nDan Rosenberg discovered that the ivtv V4L driver did not correctly\ninitialize certian structures. A local attacker could exploit this to\nread kernel stack memory, leading to a loss of privacy.\n(CVE-2010-4079)\n\nDan Rosenberg discovered that the RME Hammerfall DSP audio interface\ndriver did not correctly clear kernel memory. A local attacker could\nexploit this to read kernel stack memory, leading to a loss of\nprivacy. (CVE-2010-4080, CVE-2010-4081)\n\nDan Rosenberg discovered that the semctl syscall did not correctly\nclear kernel memory. A local attacker could exploit this to read\nkernel stack memory, leading to a loss of privacy. (CVE-2010-4083)\n\nJames Bottomley discovered that the ICP vortex storage array\ncontroller driver did not validate certain sizes. A local attacker on\na 64bit system could exploit this to crash the kernel, leading to a\ndenial of service. (CVE-2010-4157)\n\nDan Rosenberg discovered that the Linux kernel L2TP implementation\ncontained multiple integer signedness errors. A local attacker could\nexploit this to to crash the kernel, or possibly gain root privileges.\n(CVE-2010-4160)\n\nIt was discovered that multithreaded exec did not handle CPU timers\ncorrectly. A local attacker could exploit this to crash the system,\nleading to a denial of service. (CVE-2010-4248).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/1072-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:ND\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.24\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-openvz\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-lpia\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-lpiacompat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-openvz\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-debug-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-debug-2.6-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-debug-2.6-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-debug-2.6-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-libc-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.24\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:8.04:-:lts\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/08/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/02/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/03/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2011-2019 Canonical, Inc. / NASL script (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(8\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 8.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2010-0435\", \"CVE-2010-2943\", \"CVE-2010-3296\", \"CVE-2010-3297\", \"CVE-2010-3448\", \"CVE-2010-3698\", \"CVE-2010-3699\", \"CVE-2010-3858\", \"CVE-2010-3859\", \"CVE-2010-3873\", \"CVE-2010-3875\", \"CVE-2010-3876\", \"CVE-2010-3877\", \"CVE-2010-3880\", \"CVE-2010-4072\", \"CVE-2010-4074\", \"CVE-2010-4078\", \"CVE-2010-4079\", \"CVE-2010-4080\", \"CVE-2010-4081\", \"CVE-2010-4083\", \"CVE-2010-4157\", \"CVE-2010-4160\", \"CVE-2010-4248\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-1072-1\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-doc-2.6.24\", pkgver:\"2.6.24-28.86\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-headers-2.6.24-28\", pkgver:\"2.6.24-28.86\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-headers-2.6.24-28-386\", pkgver:\"2.6.24-28.86\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-headers-2.6.24-28-generic\", pkgver:\"2.6.24-28.86\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-headers-2.6.24-28-openvz\", pkgver:\"2.6.24-28.86\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-headers-2.6.24-28-rt\", pkgver:\"2.6.24-28.86\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-headers-2.6.24-28-server\", pkgver:\"2.6.24-28.86\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-headers-2.6.24-28-virtual\", pkgver:\"2.6.24-28.86\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-headers-2.6.24-28-xen\", pkgver:\"2.6.24-28.86\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-2.6.24-28-386\", pkgver:\"2.6.24-28.86\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-2.6.24-28-generic\", pkgver:\"2.6.24-28.86\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-2.6.24-28-lpia\", pkgver:\"2.6.24-28.86\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-2.6.24-28-lpiacompat\", pkgver:\"2.6.24-28.86\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-2.6.24-28-openvz\", pkgver:\"2.6.24-28.86\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-2.6.24-28-rt\", pkgver:\"2.6.24-28.86\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-2.6.24-28-server\", pkgver:\"2.6.24-28.86\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-2.6.24-28-virtual\", pkgver:\"2.6.24-28.86\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-2.6.24-28-xen\", pkgver:\"2.6.24-28.86\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-debug-2.6.24-28-386\", pkgver:\"2.6.24-28.86\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-debug-2.6.24-28-generic\", pkgver:\"2.6.24-28.86\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-debug-2.6.24-28-server\", pkgver:\"2.6.24-28.86\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-debug-2.6.24-28-virtual\", pkgver:\"2.6.24-28.86\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-kernel-devel\", pkgver:\"2.6.24-28.86\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-libc-dev\", pkgver:\"2.6.24-28.86\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-source-2.6.24\", pkgver:\"2.6.24-28.86\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-doc-2.6.24 / linux-headers-2.6 / linux-headers-2.6-386 / etc\");\n}\n", "cvss": {"score": 7.9, "vector": "AV:N/AC:M/Au:S/C:C/I:C/A:N"}}, {"lastseen": "2022-05-31T14:11:06", "description": "Gleb Napatov discovered that KVM did not correctly check certain privileged operations. A local attacker with access to a guest kernel could exploit this to crash the host system, leading to a denial of service. (CVE-2010-0435)\n\nDan Jacobson discovered that ThinkPad video output was not correctly access controlled. A local attacker could exploit this to hang the system, leading to a denial of service. (CVE-2010-3448)\n\nIt was discovered that KVM did not correctly initialize certain CPU registers. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2010-3698)\n\nDan Rosenberg discovered that the Linux kernel TIPC implementation contained multiple integer signedness errors. A local attacker could exploit this to gain root privileges. (CVE-2010-3859)\n\nThomas Pollet discovered that the RDS network protocol did not check certain iovec buffers. A local attacker could exploit this to crash the system or possibly execute arbitrary code as the root user.\n(CVE-2010-3865)\n\nDan Rosenberg discovered that the Linux kernel X.25 implementation incorrectly parsed facilities. A remote attacker could exploit this to crash the kernel, leading to a denial of service. (CVE-2010-3873)\n\nDan Rosenberg discovered that the CAN protocol on 64bit systems did not correctly calculate the size of certain buffers. A local attacker could exploit this to crash the system or possibly execute arbitrary code as the root user. (CVE-2010-3874)\n\nVasiliy Kulikov discovered that the Linux kernel X.25 implementation did not correctly clear kernel memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.\n(CVE-2010-3875)\n\nVasiliy Kulikov discovered that the Linux kernel sockets implementation did not properly initialize certain structures. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2010-3876)\n\nVasiliy Kulikov discovered that the TIPC interface did not correctly initialize certain structures. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.\n(CVE-2010-3877)\n\nNelson Elhage discovered that the Linux kernel IPv4 implementation did not properly audit certain bytecodes in netlink messages. A local attacker could exploit this to cause the kernel to hang, leading to a denial of service. (CVE-2010-3880)\n\nDan Rosenberg discovered that IPC structures were not correctly initialized on 64bit systems. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.\n(CVE-2010-4073)\n\nDan Rosenberg discovered that the USB subsystem did not correctly initialize certian structures. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.\n(CVE-2010-4074)\n\nDan Rosenberg discovered that the SiS video driver did not correctly clear kernel memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2010-4078)\n\nDan Rosenberg discovered that the ivtv V4L driver did not correctly initialize certian structures. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.\n(CVE-2010-4079)\n\nDan Rosenberg discovered that the RME Hammerfall DSP audio interface driver did not correctly clear kernel memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2010-4080, CVE-2010-4081)\n\nDan Rosenberg discovered that the VIA video driver did not correctly clear kernel memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2010-4082)\n\nDan Rosenberg discovered that the semctl syscall did not correctly clear kernel memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2010-4083)\n\nJames Bottomley discovered that the ICP vortex storage array controller driver did not validate certain sizes. A local attacker on a 64bit system could exploit this to crash the kernel, leading to a denial of service. (CVE-2010-4157)\n\nDan Rosenberg discovered that the Linux kernel L2TP implementation contained multiple integer signedness errors. A local attacker could exploit this to to crash the kernel, or possibly gain root privileges.\n(CVE-2010-4160)\n\nSteve Chen discovered that setsockopt did not correctly check MSS values. A local attacker could make a specially crafted socket call to crash the system, leading to a denial of service. (CVE-2010-4165)\n\nDave Jones discovered that the mprotect system call did not correctly handle merged VMAs. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2010-4169)\n\nIt was discovered that multithreaded exec did not handle CPU timers correctly. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2010-4248)\n\nVegard Nossum discovered that memory garbage collection was not handled correctly for active sockets. A local attacker could exploit this to allocate all available kernel memory, leading to a denial of service. (CVE-2010-4249).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2011-03-01T00:00:00", "type": "nessus", "title": "Ubuntu 9.10 : linux, linux-ec2 vulnerabilities (USN-1073-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-0435", "CVE-2010-3448", "CVE-2010-3698", "CVE-2010-3859", "CVE-2010-3865", "CVE-2010-3873", "CVE-2010-3874", "CVE-2010-3875", "CVE-2010-3876", "CVE-2010-3877", "CVE-2010-3880", "CVE-2010-4073", "CVE-2010-4074", "CVE-2010-4078", "CVE-2010-4079", "CVE-2010-4080", "CVE-2010-4081", "CVE-2010-4082", "CVE-2010-4083", "CVE-2010-4157", "CVE-2010-4160", "CVE-2010-4165", "CVE-2010-4169", "CVE-2010-4248", "CVE-2010-4249"], "modified": "2019-10-16T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-doc", "p-cpe:/a:canonical:ubuntu_linux:linux-ec2-doc", "p-cpe:/a:canonical:ubuntu_linux:linux-ec2-source-2.6.31", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-386", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-ec2", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-generic-pae", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-server", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-386", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-ec2", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-generic-pae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-lpia", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-server", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-virtual", "p-cpe:/a:canonical:ubuntu_linux:linux-libc-dev", "p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.31", "cpe:/o:canonical:ubuntu_linux:9.10"], "id": "UBUNTU_USN-1073-1.NASL", "href": "https://www.tenable.com/plugins/nessus/52476", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1073-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(52476);\n script_version(\"1.15\");\n script_cvs_date(\"Date: 2019/10/16 10:34:22\");\n\n script_cve_id(\"CVE-2010-0435\", \"CVE-2010-3448\", \"CVE-2010-3698\", \"CVE-2010-3859\", \"CVE-2010-3865\", \"CVE-2010-3873\", \"CVE-2010-3874\", \"CVE-2010-3875\", \"CVE-2010-3876\", \"CVE-2010-3877\", \"CVE-2010-3880\", \"CVE-2010-4073\", \"CVE-2010-4074\", \"CVE-2010-4078\", \"CVE-2010-4079\", \"CVE-2010-4080\", \"CVE-2010-4081\", \"CVE-2010-4082\", \"CVE-2010-4083\", \"CVE-2010-4157\", \"CVE-2010-4160\", \"CVE-2010-4165\", \"CVE-2010-4169\", \"CVE-2010-4248\", \"CVE-2010-4249\");\n script_bugtraq_id(38607, 42582, 43809, 43810, 43817, 44354, 44500, 44549, 44630, 44642, 44648, 44661, 44665, 44762, 44830, 44861, 45028, 45037, 45058, 45062, 45063, 45074);\n script_xref(name:\"USN\", value:\"1073-1\");\n\n script_name(english:\"Ubuntu 9.10 : linux, linux-ec2 vulnerabilities (USN-1073-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Gleb Napatov discovered that KVM did not correctly check certain\nprivileged operations. A local attacker with access to a guest kernel\ncould exploit this to crash the host system, leading to a denial of\nservice. (CVE-2010-0435)\n\nDan Jacobson discovered that ThinkPad video output was not correctly\naccess controlled. A local attacker could exploit this to hang the\nsystem, leading to a denial of service. (CVE-2010-3448)\n\nIt was discovered that KVM did not correctly initialize certain CPU\nregisters. A local attacker could exploit this to crash the system,\nleading to a denial of service. (CVE-2010-3698)\n\nDan Rosenberg discovered that the Linux kernel TIPC implementation\ncontained multiple integer signedness errors. A local attacker could\nexploit this to gain root privileges. (CVE-2010-3859)\n\nThomas Pollet discovered that the RDS network protocol did not check\ncertain iovec buffers. A local attacker could exploit this to crash\nthe system or possibly execute arbitrary code as the root user.\n(CVE-2010-3865)\n\nDan Rosenberg discovered that the Linux kernel X.25 implementation\nincorrectly parsed facilities. A remote attacker could exploit this to\ncrash the kernel, leading to a denial of service. (CVE-2010-3873)\n\nDan Rosenberg discovered that the CAN protocol on 64bit systems did\nnot correctly calculate the size of certain buffers. A local attacker\ncould exploit this to crash the system or possibly execute arbitrary\ncode as the root user. (CVE-2010-3874)\n\nVasiliy Kulikov discovered that the Linux kernel X.25 implementation\ndid not correctly clear kernel memory. A local attacker could exploit\nthis to read kernel stack memory, leading to a loss of privacy.\n(CVE-2010-3875)\n\nVasiliy Kulikov discovered that the Linux kernel sockets\nimplementation did not properly initialize certain structures. A local\nattacker could exploit this to read kernel stack memory, leading to a\nloss of privacy. (CVE-2010-3876)\n\nVasiliy Kulikov discovered that the TIPC interface did not correctly\ninitialize certain structures. A local attacker could exploit this to\nread kernel stack memory, leading to a loss of privacy.\n(CVE-2010-3877)\n\nNelson Elhage discovered that the Linux kernel IPv4 implementation did\nnot properly audit certain bytecodes in netlink messages. A local\nattacker could exploit this to cause the kernel to hang, leading to a\ndenial of service. (CVE-2010-3880)\n\nDan Rosenberg discovered that IPC structures were not correctly\ninitialized on 64bit systems. A local attacker could exploit this to\nread kernel stack memory, leading to a loss of privacy.\n(CVE-2010-4073)\n\nDan Rosenberg discovered that the USB subsystem did not correctly\ninitialize certian structures. A local attacker could exploit this to\nread kernel stack memory, leading to a loss of privacy.\n(CVE-2010-4074)\n\nDan Rosenberg discovered that the SiS video driver did not correctly\nclear kernel memory. A local attacker could exploit this to read\nkernel stack memory, leading to a loss of privacy. (CVE-2010-4078)\n\nDan Rosenberg discovered that the ivtv V4L driver did not correctly\ninitialize certian structures. A local attacker could exploit this to\nread kernel stack memory, leading to a loss of privacy.\n(CVE-2010-4079)\n\nDan Rosenberg discovered that the RME Hammerfall DSP audio interface\ndriver did not correctly clear kernel memory. A local attacker could\nexploit this to read kernel stack memory, leading to a loss of\nprivacy. (CVE-2010-4080, CVE-2010-4081)\n\nDan Rosenberg discovered that the VIA video driver did not correctly\nclear kernel memory. A local attacker could exploit this to read\nkernel stack memory, leading to a loss of privacy. (CVE-2010-4082)\n\nDan Rosenberg discovered that the semctl syscall did not correctly\nclear kernel memory. A local attacker could exploit this to read\nkernel stack memory, leading to a loss of privacy. (CVE-2010-4083)\n\nJames Bottomley discovered that the ICP vortex storage array\ncontroller driver did not validate certain sizes. A local attacker on\na 64bit system could exploit this to crash the kernel, leading to a\ndenial of service. (CVE-2010-4157)\n\nDan Rosenberg discovered that the Linux kernel L2TP implementation\ncontained multiple integer signedness errors. A local attacker could\nexploit this to to crash the kernel, or possibly gain root privileges.\n(CVE-2010-4160)\n\nSteve Chen discovered that setsockopt did not correctly check MSS\nvalues. A local attacker could make a specially crafted socket call to\ncrash the system, leading to a denial of service. (CVE-2010-4165)\n\nDave Jones discovered that the mprotect system call did not correctly\nhandle merged VMAs. A local attacker could exploit this to crash the\nsystem, leading to a denial of service. (CVE-2010-4169)\n\nIt was discovered that multithreaded exec did not handle CPU timers\ncorrectly. A local attacker could exploit this to crash the system,\nleading to a denial of service. (CVE-2010-4248)\n\nVegard Nossum discovered that memory garbage collection was not\nhandled correctly for active sockets. A local attacker could exploit\nthis to allocate all available kernel memory, leading to a denial of\nservice. (CVE-2010-4249).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/1073-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-ec2-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-ec2-source-2.6.31\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-ec2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-generic-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-ec2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-generic-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-lpia\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-libc-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.31\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:9.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/08/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/02/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/03/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2011-2019 Canonical, Inc. / NASL script (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(9\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 9.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2010-0435\", \"CVE-2010-3448\", \"CVE-2010-3698\", \"CVE-2010-3859\", \"CVE-2010-3865\", \"CVE-2010-3873\", \"CVE-2010-3874\", \"CVE-2010-3875\", \"CVE-2010-3876\", \"CVE-2010-3877\", \"CVE-2010-3880\", \"CVE-2010-4073\", \"CVE-2010-4074\", \"CVE-2010-4078\", \"CVE-2010-4079\", \"CVE-2010-4080\", \"CVE-2010-4081\", \"CVE-2010-4082\", \"CVE-2010-4083\", \"CVE-2010-4157\", \"CVE-2010-4160\", \"CVE-2010-4165\", \"CVE-2010-4169\", \"CVE-2010-4248\", \"CVE-2010-4249\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-1073-1\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-doc\", pkgver:\"2.6.31-22.73\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-ec2-doc\", pkgver:\"2.6.31-307.27\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-ec2-source-2.6.31\", pkgver:\"2.6.31-307.27\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-headers-2.6.31-22\", pkgver:\"2.6.31-22.73\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-headers-2.6.31-22-386\", pkgver:\"2.6.31-22.73\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-headers-2.6.31-22-generic\", pkgver:\"2.6.31-22.73\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-headers-2.6.31-22-generic-pae\", pkgver:\"2.6.31-22.73\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-headers-2.6.31-22-server\", pkgver:\"2.6.31-22.73\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-headers-2.6.31-307\", pkgver:\"2.6.31-307.27\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-headers-2.6.31-307-ec2\", pkgver:\"2.6.31-307.27\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-image-2.6.31-22-386\", pkgver:\"2.6.31-22.73\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-image-2.6.31-22-generic\", pkgver:\"2.6.31-22.73\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-image-2.6.31-22-generic-pae\", pkgver:\"2.6.31-22.73\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-image-2.6.31-22-lpia\", pkgver:\"2.6.31-22.73\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-image-2.6.31-22-server\", pkgver:\"2.6.31-22.73\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-image-2.6.31-22-virtual\", pkgver:\"2.6.31-22.73\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-image-2.6.31-307-ec2\", pkgver:\"2.6.31-307.27\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-libc-dev\", pkgver:\"2.6.31-22.73\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"linux-source-2.6.31\", pkgver:\"2.6.31-22.73\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-doc / linux-ec2-doc / linux-ec2-source-2.6.31 / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2022-07-07T18:46:22", "description": "The openSUSE 11.3 kernel was updated to fix various bugs and security issues.\n\nFollowing security issues have been fixed: CVE-2010-4347: A local user could inject ACPI code into the kernel via the world-writable 'custom_debug' file, allowing local privilege escalation.\n\nCVE-2010-4258: A local attacker could use a Oops (kernel crash) caused by other flaws to write a 0 byte to a attacker controlled address in the kernel. This could lead to privilege escalation together with other issues.\n\nCVE-2010-4157: A 32bit vs 64bit integer mismatch in gdth_ioctl_alloc could lead to memory corruption in the GDTH driver.\n\nCVE-2010-4165: The do_tcp_setsockopt function in net/ipv4/tcp.c in the Linux kernel did not properly restrict TCP_MAXSEG (aka MSS) values, which allows local users to cause a denial of service (OOPS) via a setsockopt call that specifies a small value, leading to a divide-by-zero error or incorrect use of a signed integer.\n\nCVE-2010-4164: A remote (or local) attacker communicating over X.25 could cause a kernel panic by attempting to negotiate malformed facilities.\n\nCVE-2010-4175: A local attacker could cause memory overruns in the RDS protocol stack, potentially crashing the kernel. So far it is considered not to be exploitable.\n\nCVE-2010-4169: Use-after-free vulnerability in mm/mprotect.c in the Linux kernel allwed local users to cause a denial of service via vectors involving an mprotect system call.\n\nCVE-2010-3874: A minor heap overflow in the CAN network module was fixed. Due to nature of the memory allocator it is likely not exploitable.\n\nCVE-2010-4158: A memory information leak in berkely packet filter rules allowed local attackers to read uninitialized memory of the kernel stack.\n\nCVE-2010-4162: A local denial of service in the blockdevice layer was fixed.\n\nCVE-2010-4163: By submitting certain I/O requests with 0 length, a local user could have caused a kernel panic.\n\nCVE-2010-0435: The Hypervisor in KVM 83, when the Intel VT-x extension is enabled, allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via vectors related to instruction emulation.\n\nCVE-2010-3861: The ethtool_get_rxnfc function in net/core/ethtool.c in the Linux kernel did not initialize a certain block of heap memory, which allowed local users to obtain potentially sensitive information via an ETHTOOL_GRXCLSRLALL ethtool command with a large info.rule_cnt value.\n\nCVE-2010-3442: Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel allowed local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.\n\nCVE-2010-3437: A range checking overflow in pktcdvd ioctl was fixed.\n\nCVE-2010-4078: The sisfb_ioctl function in drivers/video/sis/sis_main.c in the Linux kernel did not properly initialize a certain structure member, which allowed local users to obtain potentially sensitive information from kernel stack memory via an FBIOGET_VBLANK ioctl call.\n\nCVE-2010-4080: The snd_hdsp_hwdep_ioctl function in sound/pci/rme9652/hdsp.c in the Linux kernel did not initialize a certain structure, which allowed local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSP_IOCTL_GET_CONFIG_INFO ioctl call.\n\nCVE-2010-4081: The snd_hdspm_hwdep_ioctl function in sound/pci/rme9652/hdspm.c in the Linux kernel did not initialize a certain structure, which allowed local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSPM_IOCTL_GET_CONFIG_INFO ioctl call.\n\nCVE-2010-4082: The viafb_ioctl_get_viafb_info function in drivers/video/via/ioctl.c in the Linux kernel did not properly initialize a certain structure member, which allowed local users to obtain potentially sensitive information from kernel stack memory via a VIAFB_GET_INFO ioctl call.\n\nCVE-2010-4073: The ipc subsystem in the Linux kernel did not initialize certain structures, which allowed local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c.\n\nCVE-2010-4072: The copy_shmid_to_user function in ipc/shm.c in the Linux kernel did not initialize a certain structure, which allowed local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the 'old shm interface.'\n\nCVE-2010-4083: The copy_semid_to_user function in ipc/sem.c in the Linux kernel did not initialize a certain structure, which allowed local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl system call.\n\nCVE-2010-3432: The sctp_packet_config function in net/sctp/output.c in the Linux kernel performed extraneous initializations of packet data structures, which allowed remote attackers to cause a denial of service (panic) via a certain sequence of SCTP traffic.\n\nCVE-2010-3067: Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.\n\nCVE-2010-3865: A iovec integer overflow in RDS sockets was fixed which could lead to local attackers gaining kernel privileges.", "cvss3": {"score": null, "vector": null}, "published": "2014-06-13T00:00:00", "type": "nessus", "title": "openSUSE Security Update : kernel (openSUSE-SU-2011:0004-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-0435", "CVE-2010-3067", "CVE-2010-3432", "CVE-2010-3437", "CVE-2010-3442", "CVE-2010-3861", "CVE-2010-3865", "CVE-2010-3874", "CVE-2010-4072", "CVE-2010-4073", "CVE-2010-4078", "CVE-2010-4080", "CVE-2010-4081", "CVE-2010-4082", "CVE-2010-4083", "CVE-2010-4157", "CVE-2010-4158", "CVE-2010-4162", "CVE-2010-4163", "CVE-2010-4164", "CVE-2010-4165", "CVE-2010-4169", "CVE-2010-4175", "CVE-2010-4258", "CVE-2010-4347"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-debug-base", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:kernel-default-base", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-desktop", "p-cpe:/a:novell:opensuse:kernel-desktop-base", "p-cpe:/a:novell:opensuse:kernel-desktop-devel", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:kernel-ec2", "p-cpe:/a:novell:opensuse:kernel-ec2-base", "p-cpe:/a:novell:opensuse:kernel-ec2-devel", "p-cpe:/a:novell:opensuse:kernel-ec2-extra", "p-cpe:/a:novell:opensuse:kernel-pae", "p-cpe:/a:novell:opensuse:kernel-pae-base", "p-cpe:/a:novell:opensuse:kernel-pae-devel", "p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:kernel-syms", "p-cpe:/a:novell:opensuse:kernel-trace", "p-cpe:/a:novell:opensuse:kernel-trace-base", "p-cpe:/a:novell:opensuse:kernel-trace-devel", "p-cpe:/a:novell:opensuse:kernel-vanilla", "p-cpe:/a:novell:opensuse:kernel-vanilla-base", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel", "p-cpe:/a:novell:opensuse:kernel-vmi", "p-cpe:/a:novell:opensuse:kernel-vmi-base", "p-cpe:/a:novell:opensuse:kernel-vmi-devel", "p-cpe:/a:novell:opensuse:kernel-xen", "p-cpe:/a:novell:opensuse:kernel-xen-base", "p-cpe:/a:novell:opensuse:kernel-xen-devel", "p-cpe:/a:novell:opensuse:preload-kmp-default", "p-cpe:/a:novell:opensuse:preload-kmp-desktop", "cpe:/o:novell:opensuse:11.3"], "id": "SUSE_11_3_KERNEL-101215.NASL", "href": "https://www.tenable.com/plugins/nessus/75553", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update kernel-3709.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(75553);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-0435\", \"CVE-2010-3067\", \"CVE-2010-3432\", \"CVE-2010-3437\", \"CVE-2010-3442\", \"CVE-2010-3861\", \"CVE-2010-3865\", \"CVE-2010-3874\", \"CVE-2010-4072\", \"CVE-2010-4073\", \"CVE-2010-4078\", \"CVE-2010-4080\", \"CVE-2010-4081\", \"CVE-2010-4082\", \"CVE-2010-4083\", \"CVE-2010-4157\", \"CVE-2010-4158\", \"CVE-2010-4162\", \"CVE-2010-4163\", \"CVE-2010-4164\", \"CVE-2010-4165\", \"CVE-2010-4169\", \"CVE-2010-4175\", \"CVE-2010-4258\", \"CVE-2010-4347\");\n\n script_name(english:\"openSUSE Security Update : kernel (openSUSE-SU-2011:0004-1)\");\n script_summary(english:\"Check for the kernel-3709 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The openSUSE 11.3 kernel was updated to fix various bugs and security\nissues.\n\nFollowing security issues have been fixed: CVE-2010-4347: A local user\ncould inject ACPI code into the kernel via the world-writable\n'custom_debug' file, allowing local privilege escalation.\n\nCVE-2010-4258: A local attacker could use a Oops (kernel crash) caused\nby other flaws to write a 0 byte to a attacker controlled address in\nthe kernel. This could lead to privilege escalation together with\nother issues.\n\nCVE-2010-4157: A 32bit vs 64bit integer mismatch in gdth_ioctl_alloc\ncould lead to memory corruption in the GDTH driver.\n\nCVE-2010-4165: The do_tcp_setsockopt function in net/ipv4/tcp.c in the\nLinux kernel did not properly restrict TCP_MAXSEG (aka MSS) values,\nwhich allows local users to cause a denial of service (OOPS) via a\nsetsockopt call that specifies a small value, leading to a\ndivide-by-zero error or incorrect use of a signed integer.\n\nCVE-2010-4164: A remote (or local) attacker communicating over X.25\ncould cause a kernel panic by attempting to negotiate malformed\nfacilities.\n\nCVE-2010-4175: A local attacker could cause memory overruns in the RDS\nprotocol stack, potentially crashing the kernel. So far it is\nconsidered not to be exploitable.\n\nCVE-2010-4169: Use-after-free vulnerability in mm/mprotect.c in the\nLinux kernel allwed local users to cause a denial of service via\nvectors involving an mprotect system call.\n\nCVE-2010-3874: A minor heap overflow in the CAN network module was\nfixed. Due to nature of the memory allocator it is likely not\nexploitable.\n\nCVE-2010-4158: A memory information leak in berkely packet filter\nrules allowed local attackers to read uninitialized memory of the\nkernel stack.\n\nCVE-2010-4162: A local denial of service in the blockdevice layer was\nfixed.\n\nCVE-2010-4163: By submitting certain I/O requests with 0 length, a\nlocal user could have caused a kernel panic.\n\nCVE-2010-0435: The Hypervisor in KVM 83, when the Intel VT-x extension\nis enabled, allows guest OS users to cause a denial of service (NULL\npointer dereference and host OS crash) via vectors related to\ninstruction emulation.\n\nCVE-2010-3861: The ethtool_get_rxnfc function in net/core/ethtool.c in\nthe Linux kernel did not initialize a certain block of heap memory,\nwhich allowed local users to obtain potentially sensitive information\nvia an ETHTOOL_GRXCLSRLALL ethtool command with a large info.rule_cnt\nvalue.\n\nCVE-2010-3442: Multiple integer overflows in the snd_ctl_new function\nin sound/core/control.c in the Linux kernel allowed local users to\ncause a denial of service (heap memory corruption) or possibly have\nunspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or\n(2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.\n\nCVE-2010-3437: A range checking overflow in pktcdvd ioctl was fixed.\n\nCVE-2010-4078: The sisfb_ioctl function in\ndrivers/video/sis/sis_main.c in the Linux kernel did not properly\ninitialize a certain structure member, which allowed local users to\nobtain potentially sensitive information from kernel stack memory via\nan FBIOGET_VBLANK ioctl call.\n\nCVE-2010-4080: The snd_hdsp_hwdep_ioctl function in\nsound/pci/rme9652/hdsp.c in the Linux kernel did not initialize a\ncertain structure, which allowed local users to obtain potentially\nsensitive information from kernel stack memory via an\nSNDRV_HDSP_IOCTL_GET_CONFIG_INFO ioctl call.\n\nCVE-2010-4081: The snd_hdspm_hwdep_ioctl function in\nsound/pci/rme9652/hdspm.c in the Linux kernel did not initialize a\ncertain structure, which allowed local users to obtain potentially\nsensitive information from kernel stack memory via an\nSNDRV_HDSPM_IOCTL_GET_CONFIG_INFO ioctl call.\n\nCVE-2010-4082: The viafb_ioctl_get_viafb_info function in\ndrivers/video/via/ioctl.c in the Linux kernel did not properly\ninitialize a certain structure member, which allowed local users to\nobtain potentially sensitive information from kernel stack memory via\na VIAFB_GET_INFO ioctl call.\n\nCVE-2010-4073: The ipc subsystem in the Linux kernel did not\ninitialize certain structures, which allowed local users to obtain\npotentially sensitive information from kernel stack memory via vectors\nrelated to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3)\ncompat_sys_shmctl functions in ipc/compat.c; and the (4)\ncompat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in\nipc/compat_mq.c.\n\nCVE-2010-4072: The copy_shmid_to_user function in ipc/shm.c in the\nLinux kernel did not initialize a certain structure, which allowed\nlocal users to obtain potentially sensitive information from kernel\nstack memory via vectors related to the shmctl system call and the\n'old shm interface.'\n\nCVE-2010-4083: The copy_semid_to_user function in ipc/sem.c in the\nLinux kernel did not initialize a certain structure, which allowed\nlocal users to obtain potentially sensitive information from kernel\nstack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4)\nSEM_STAT command in a semctl system call.\n\nCVE-2010-3432: The sctp_packet_config function in net/sctp/output.c in\nthe Linux kernel performed extraneous initializations of packet data\nstructures, which allowed remote attackers to cause a denial of\nservice (panic) via a certain sequence of SCTP traffic.\n\nCVE-2010-3067: Integer overflow in the do_io_submit function in\nfs/aio.c in the Linux kernel allowed local users to cause a denial of\nservice or possibly have unspecified other impact via crafted use of\nthe io_submit system call.\n\nCVE-2010-3865: A iovec integer overflow in RDS sockets was fixed which\ncould lead to local attackers gaining kernel privileges.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=547887\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=584028\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=628591\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=629901\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=629908\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=641811\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=641983\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=642043\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=642302\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=642311\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=642312\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=642313\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=642484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=642486\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=645659\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=649187\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=650128\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=651218\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=651626\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=652563\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=652939\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=652940\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=652945\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=653258\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=653260\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=653930\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=654581\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=655215\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=655839\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=657350\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=659076\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2011-01/msg00002.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-desktop-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-desktop-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-ec2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-ec2-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-ec2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-ec2-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-pae-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-pae-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-trace\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-trace-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-trace-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vmi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vmi-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vmi-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-xen-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:preload-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:preload-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/12/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-debug-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-debug-base-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-debug-devel-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-default-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-default-base-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-default-devel-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-desktop-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-desktop-base-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-desktop-devel-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-devel-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-ec2-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-ec2-base-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-ec2-devel-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-ec2-extra-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-pae-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-pae-base-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-pae-devel-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-source-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-source-vanilla-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-syms-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-trace-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-trace-base-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-trace-devel-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-vanilla-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-vanilla-base-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-vanilla-devel-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-vmi-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-vmi-base-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-vmi-devel-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-xen-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-xen-base-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kernel-xen-devel-2.6.34.7-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"preload-kmp-default-1.1_k2.6.34.7_0.7-19.1.11\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"preload-kmp-desktop-1.1_k2.6.34.7_0.7-19.1.11\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2022-06-16T14:07:53", "description": "Dan Rosenberg discovered that the RDS network protocol did not correctly check certain parameters. A local attacker could exploit this gain root privileges. (CVE-2010-3904)\n\nNelson Elhage discovered several problems with the Acorn Econet protocol driver. A local user could cause a denial of service via a NULL pointer dereference, escalate privileges by overflowing the kernel stack, and assign Econet addresses to arbitrary interfaces.\n(CVE-2010-3848, CVE-2010-3849, CVE-2010-3850)\n\nBen Hawkes discovered that the Linux kernel did not correctly filter registers on 64bit kernels when performing 32bit system calls. On a 64bit system, a local attacker could manipulate 32bit system calls to gain root privileges. (CVE-2010-3301)\n\nAl Viro discovered a race condition in the TTY driver. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2009-4895)\n\nGleb Napatov discovered that KVM did not correctly check certain privileged operations. A local attacker with access to a guest kernel could exploit this to crash the host system, leading to a denial of service. (CVE-2010-0435)\n\nDan Rosenberg discovered that the MOVE_EXT ext4 ioctl did not correctly check file permissions. A local attacker could overwrite append-only files, leading to potential data loss. (CVE-2010-2066)\n\nDan Rosenberg discovered that the swapexit xfs ioctl did not correctly check file permissions. A local attacker could exploit this to read from write-only files, leading to a loss of privacy. (CVE-2010-2226)\n\nSuresh Jayaraman discovered that CIFS did not correctly validate certain response packats. A remote attacker could send specially crafted traffic that would crash the system, leading to a denial of service. (CVE-2010-2248)\n\nBen Hutchings discovered that the ethtool interface did not correctly check certain sizes. A local attacker could perform malicious ioctl calls that could crash the system, leading to a denial of service.\n(CVE-2010-2478, CVE-2010-3084)\n\nJames Chapman discovered that L2TP did not correctly evaluate checksum capabilities. If an attacker could make malicious routing changes, they could crash the system, leading to a denial of service.\n(CVE-2010-2495)\n\nNeil Brown discovered that NFSv4 did not correctly check certain write requests. A remote attacker could send specially crafted traffic that could crash the system or possibly gain root privileges.\n(CVE-2010-2521)\n\nDavid Howells discovered that DNS resolution in CIFS could be spoofed.\nA local attacker could exploit this to control DNS replies, leading to a loss of privacy and possible privilege escalation. (CVE-2010-2524)\n\nDan Rosenberg discovered that the btrfs filesystem did not correctly validate permissions when using the clone function. A local attacker could overwrite the contents of file handles that were opened for append-only, or potentially read arbitrary contents, leading to a loss of privacy. (CVE-2010-2537, CVE-2010-2538)\n\nBob Peterson discovered that GFS2 rename operations did not correctly validate certain sizes. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2010-2798)\n\nEric Dumazet discovered that many network functions could leak kernel stack contents. A local attacker could exploit this to read portions of kernel memory, leading to a loss of privacy. (CVE-2010-2942, CVE-2010-3477)\n\nDave Chinner discovered that the XFS filesystem did not correctly order inode lookups when exported by NFS. A remote attacker could exploit this to read or write disk blocks that had changed file assignment or had become unlinked, leading to a loss of privacy.\n(CVE-2010-2943)\n\nSergey Vlasov discovered that JFS did not correctly handle certain extended attributes. A local attacker could bypass namespace access rules, leading to a loss of privacy. (CVE-2010-2946)\n\nTavis Ormandy discovered that the IRDA subsystem did not correctly shut down. A local attacker could exploit this to cause the system to crash or possibly gain root privileges. (CVE-2010-2954)\n\nBrad Spengler discovered that the wireless extensions did not correctly validate certain request sizes. A local attacker could exploit this to read portions of kernel memory, leading to a loss of privacy. (CVE-2010-2955)\n\nTavis Ormandy discovered that the session keyring did not correctly check for its parent. On systems without a default session keyring, a local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2010-2960)\n\nKees Cook discovered that the Intel i915 graphics driver did not correctly validate memory regions. A local attacker with access to the video card could read and write arbitrary kernel memory to gain root privileges. (CVE-2010-2962)\n\nKees Cook discovered that the V4L1 32bit compat interface did not correctly validate certain parameters. A local attacker on a 64bit system with access to a video device could exploit this to gain root privileges. (CVE-2010-2963)\n\nToshiyuki Okajima discovered that ext4 did not correctly check certain parameters. A local attacker could exploit this to crash the system or overwrite the last block of large files. (CVE-2010-3015)\n\nTavis Ormandy discovered that the AIO subsystem did not correctly validate certain parameters. A local attacker could exploit this to crash the system or possibly gain root privileges. (CVE-2010-3067)\n\nDan Rosenberg discovered that certain XFS ioctls leaked kernel stack contents. A local attacker could exploit this to read portions of kernel memory, leading to a loss of privacy. (CVE-2010-3078)\n\nRobert Swiecki discovered that ftrace did not correctly handle mutexes. A local attacker could exploit this to crash the kernel, leading to a denial of service. (CVE-2010-3079)\n\nTavis Ormandy discovered that the OSS sequencer device did not correctly shut down. A local attacker could exploit this to crash the system or possibly gain root privileges. (CVE-2010-3080)\n\nDan Rosenberg discovered that several network ioctls did not clear kernel memory correctly. A local user could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2010-3296, CVE-2010-3297, CVE-2010-3298)\n\nDan Rosenberg discovered that the ROSE driver did not correctly check parameters. A local attacker with access to a ROSE network device could exploit this to crash the system or possibly gain root privileges. (CVE-2010-3310)\n\nThomas Dreibholz discovered that SCTP did not correctly handle appending packet chunks. A remote attacker could send specially crafted traffic to crash the system, leading to a denial of service.\n(CVE-2010-3432)\n\nDan Rosenberg discovered that the CD driver did not correctly check parameters. A local attacker could exploit this to read arbitrary kernel memory, leading to a loss of privacy. (CVE-2010-3437)\n\nDan Rosenberg discovered that the Sound subsystem did not correctly validate parameters. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2010-3442)\n\nDan Rosenberg discovered that SCTP did not correctly handle HMAC calculations. A remote attacker could send specially crafted traffic that would crash the system, leading to a denial of service.\n(CVE-2010-3705)\n\nBrad Spengler discovered that stack memory for new a process was not correctly calculated. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2010-3858)\n\nDan Rosenberg discovered that the Linux kernel TIPC implementation contained multiple integer signedness errors. A local attacker could exploit this to gain root privileges. (CVE-2010-3859)\n\nKees Cook discovered that the ethtool interface did not correctly clear kernel memory. A local attacker could read kernel heap memory, leading to a loss of privacy. (CVE-2010-3861)\n\nDan Rosenberg discovered that the CAN protocol on 64bit systems did not correctly calculate the size of certain buffers. A local attacker could exploit this to crash the system or possibly execute arbitrary code as the root user. (CVE-2010-3874)\n\nKees Cook and Vasiliy Kulikov discovered that the shm interface did not clear kernel memory correctly. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.\n(CVE-2010-4072)\n\nDan Rosenberg discovered that IPC structures were not correctly initialized on 64bit systems. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.\n(CVE-2010-4073)\n\nDan Rosenberg discovered that the RME Hammerfall DSP audio interface driver did not correctly clear kernel memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2010-4080, CVE-2010-4081)\n\nDan Rosenberg discovered that the VIA video driver did not correctly clear kernel memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2010-4082)\n\nJames Bottomley discovered that the ICP vortex storage array controller driver did not validate certain sizes. A local attacker on a 64bit system could exploit this to crash the kernel, leading to a denial of service. (CVE-2010-4157)\n\nDan Rosenberg discovered that the socket filters did not correctly initialize structure memory. A local attacker could create malicious filters to read portions of kernel stack memory, leading to a loss of privacy. (CVE-2010-4158)\n\nDan Rosenberg discovered that the Linux kernel L2TP implementation contained multiple integer signedness errors. A local attacker could exploit this to to crash the kernel, or possibly gain root privileges.\n(CVE-2010-4160)\n\nDan Rosenberg discovered that certain iovec operations did not calculate page counts correctly. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2010-4162)\n\nDan Rosenberg discovered multiple flaws in the X.25 facilities parsing. If a system was using X.25, a remote attacker could exploit this to crash the system, leading to a denial of service.\n(CVE-2010-4164)\n\nSteve Chen discovered that setsockopt did not correctly check MSS values. A local attacker could make a specially crafted socket call to crash the system, leading to a denial of service. (CVE-2010-4165)\n\nDave Jones discovered that the mprotect system call did not correctly handle merged VMAs. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2010-4169)\n\nDan Rosenberg discovered that the RDS protocol did not correctly check ioctl arguments. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2010-4175)\n\nAlan Cox discovered that the HCI UART driver did not correctly check if a write operation was available. If the mmap_min-addr sysctl was changed from the Ubuntu default to a value of 0, a local attacker could exploit this flaw to gain root privileges. (CVE-2010-4242)\n\nBrad Spengler discovered that the kernel did not correctly account for userspace memory allocations during exec() calls. A local attacker could exploit this to consume all system memory, leading to a denial of service. (CVE-2010-4243)\n\nVegard Nossum discovered that memory garbage collection was not handled correctly for active sockets. A local attacker could exploit this to allocate all available kernel memory, leading to a denial of service. (CVE-2010-4249)\n\nIt was discovered that named pipes did not correctly handle certain fcntl calls. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2010-4256)\n\nNelson Elhage discovered that the kernel did not correctly handle process cleanup after triggering a recoverable kernel bug. If a local attacker were able to trigger certain kinds of kernel bugs, they could create a specially crafted process to gain root privileges.\n(CVE-2010-4258)\n\nKees Cook discovered that some ethtool functions did not correctly clear heap memory. A local attacker with CAP_NET_ADMIN privileges could exploit this to read portions of kernel heap memory, leading to a loss of privacy. (CVE-2010-4655)\n\nFrank Arnold discovered that the IGMP protocol did not correctly parse certain packets. A remote attacker could send specially crafted traffic to crash the system, leading to a denial of service.\n(CVE-2011-0709).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2013-03-09T00:00:00", "type": "nessus", "title": "Ubuntu 10.04 LTS : linux-lts-backport-maverick vulnerabilities (USN-1083-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-4895", "CVE-2010-0435", "CVE-2010-2066", "CVE-2010-2226", "CVE-2010-2248", "CVE-2010-2478", "CVE-2010-2495", "CVE-2010-2521", "CVE-2010-2524", "CVE-2010-2537", "CVE-2010-2538", "CVE-2010-2798", "CVE-2010-2942", "CVE-2010-2943", "CVE-2010-2946", "CVE-2010-2954", "CVE-2010-2955", "CVE-2010-2960", "CVE-2010-2962", "CVE-2010-2963", "CVE-2010-3015", "CVE-2010-3067", "CVE-2010-3078", "CVE-2010-3079", "CVE-2010-3080", "CVE-2010-3084", "CVE-2010-3296", "CVE-2010-3297", "CVE-2010-3298", "CVE-2010-3301", "CVE-2010-3310", "CVE-2010-3432", "CVE-2010-3437", "CVE-2010-3442", "CVE-2010-3477", "CVE-2010-3705", "CVE-2010-3848", "CVE-2010-3849", "CVE-2010-3850", "CVE-2010-3858", "CVE-2010-3859", "CVE-2010-3861", "CVE-2010-3874", "CVE-2010-3904", "CVE-2010-4072", "CVE-2010-4073", "CVE-2010-4080", "CVE-2010-4081", "CVE-2010-4082", "CVE-2010-4157", "CVE-2010-4158", "CVE-2010-4160", "CVE-2010-4162", "CVE-2010-4164", "CVE-2010-4165", "CVE-2010-4169", "CVE-2010-4175", "CVE-2010-4242", "CVE-2010-4243", "CVE-2010-4249", "CVE-2010-4256", "CVE-2010-4258", "CVE-2010-4655", "CVE-2011-0709"], "modified": "2019-12-23T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-generic-pae", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-server", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-virtual", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-generic-pae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-server", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-virtual", "cpe:/o:canonical:ubuntu_linux:10.04:-:lts"], "id": "UBUNTU_USN-1083-1.NASL", "href": "https://www.tenable.com/plugins/nessus/65101", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1083-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(65101);\n script_version(\"1.14\");\n script_cvs_date(\"Date: 2019/12/23\");\n\n script_cve_id(\"CVE-2009-4895\", \"CVE-2010-0435\", \"CVE-2010-2066\", \"CVE-2010-2226\", \"CVE-2010-2248\", \"CVE-2010-2478\", \"CVE-2010-2495\", \"CVE-2010-2521\", \"CVE-2010-2524\", \"CVE-2010-2537\", \"CVE-2010-2538\", \"CVE-2010-2798\", \"CVE-2010-2942\", \"CVE-2010-2943\", \"CVE-2010-2946\", \"CVE-2010-2954\", \"CVE-2010-2955\", \"CVE-2010-2960\", \"CVE-2010-2962\", \"CVE-2010-2963\", \"CVE-2010-3015\", \"CVE-2010-3067\", \"CVE-2010-3078\", \"CVE-2010-3079\", \"CVE-2010-3080\", \"CVE-2010-3084\", \"CVE-2010-3296\", \"CVE-2010-3297\", \"CVE-2010-3298\", \"CVE-2010-3301\", \"CVE-2010-3310\", \"CVE-2010-3432\", \"CVE-2010-3437\", \"CVE-2010-3442\", \"CVE-2010-3477\", \"CVE-2010-3705\", \"CVE-2010-3848\", \"CVE-2010-3849\", \"CVE-2010-3850\", \"CVE-2010-3858\", \"CVE-2010-3859\", \"CVE-2010-3861\", \"CVE-2010-3874\", \"CVE-2010-3904\", \"CVE-2010-4072\", \"CVE-2010-4073\", \"CVE-2010-4080\", \"CVE-2010-4081\", \"CVE-2010-4082\", \"CVE-2010-4157\", \"CVE-2010-4158\", \"CVE-2010-4160\", \"CVE-2010-4162\", \"CVE-2010-4164\", \"CVE-2010-4165\", \"CVE-2010-4169\", \"CVE-2010-4175\", \"CVE-2010-4242\", \"CVE-2010-4243\", \"CVE-2010-4249\", \"CVE-2010-4256\", \"CVE-2010-4258\", \"CVE-2010-4655\", \"CVE-2011-0709\");\n script_bugtraq_id(40920, 41077, 41223, 41466, 41847, 41854, 41904, 42124, 42242, 42249, 42477, 42527, 42529, 42582, 42589, 42885, 42900, 42932, 43022, 43062, 43098, 43221, 43226, 43229, 43353, 43355, 43368, 43480, 43551, 43684, 43701, 43787, 44067, 44219, 44242, 44301, 44427, 44830, 44861, 45037, 45054, 45072);\n script_xref(name:\"USN\", value:\"1083-1\");\n\n script_name(english:\"Ubuntu 10.04 LTS : linux-lts-backport-maverick vulnerabilities (USN-1083-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Dan Rosenberg discovered that the RDS network protocol did not\ncorrectly check certain parameters. A local attacker could exploit\nthis gain root privileges. (CVE-2010-3904)\n\nNelson Elhage discovered several problems with the Acorn Econet\nprotocol driver. A local user could cause a denial of service via a\nNULL pointer dereference, escalate privileges by overflowing the\nkernel stack, and assign Econet addresses to arbitrary interfaces.\n(CVE-2010-3848, CVE-2010-3849, CVE-2010-3850)\n\nBen Hawkes discovered that the Linux kernel did not correctly filter\nregisters on 64bit kernels when performing 32bit system calls. On a\n64bit system, a local attacker could manipulate 32bit system calls to\ngain root privileges. (CVE-2010-3301)\n\nAl Viro discovered a race condition in the TTY driver. A local\nattacker could exploit this to crash the system, leading to a denial\nof service. (CVE-2009-4895)\n\nGleb Napatov discovered that KVM did not correctly check certain\nprivileged operations. A local attacker with access to a guest kernel\ncould exploit this to crash the host system, leading to a denial of\nservice. (CVE-2010-0435)\n\nDan Rosenberg discovered that the MOVE_EXT ext4 ioctl did not\ncorrectly check file permissions. A local attacker could overwrite\nappend-only files, leading to potential data loss. (CVE-2010-2066)\n\nDan Rosenberg discovered that the swapexit xfs ioctl did not correctly\ncheck file permissions. A local attacker could exploit this to read\nfrom write-only files, leading to a loss of privacy. (CVE-2010-2226)\n\nSuresh Jayaraman discovered that CIFS did not correctly validate\ncertain response packats. A remote attacker could send specially\ncrafted traffic that would crash the system, leading to a denial of\nservice. (CVE-2010-2248)\n\nBen Hutchings discovered that the ethtool interface did not correctly\ncheck certain sizes. A local attacker could perform malicious ioctl\ncalls that could crash the system, leading to a denial of service.\n(CVE-2010-2478, CVE-2010-3084)\n\nJames Chapman discovered that L2TP did not correctly evaluate checksum\ncapabilities. If an attacker could make malicious routing changes,\nthey could crash the system, leading to a denial of service.\n(CVE-2010-2495)\n\nNeil Brown discovered that NFSv4 did not correctly check certain write\nrequests. A remote attacker could send specially crafted traffic that\ncould crash the system or possibly gain root privileges.\n(CVE-2010-2521)\n\nDavid Howells discovered that DNS resolution in CIFS could be spoofed.\nA local attacker could exploit this to control DNS replies, leading to\na loss of privacy and possible privilege escalation. (CVE-2010-2524)\n\nDan Rosenberg discovered that the btrfs filesystem did not correctly\nvalidate permissions when using the clone function. A local attacker\ncould overwrite the contents of file handles that were opened for\nappend-only, or potentially read arbitrary contents, leading to a loss\nof privacy. (CVE-2010-2537, CVE-2010-2538)\n\nBob Peterson discovered that GFS2 rename operations did not correctly\nvalidate certain sizes. A local attacker could exploit this to crash\nthe system, leading to a denial of service. (CVE-2010-2798)\n\nEric Dumazet discovered that many network functions could leak kernel\nstack contents. A local attacker could exploit this to read portions\nof kernel memory, leading to a loss of privacy. (CVE-2010-2942,\nCVE-2010-3477)\n\nDave Chinner discovered that the XFS filesystem did not correctly\norder inode lookups when exported by NFS. A remote attacker could\nexploit this to read or write disk blocks that had changed file\nassignment or had become unlinked, leading to a loss of privacy.\n(CVE-2010-2943)\n\nSergey Vlasov discovered that JFS did not correctly handle certain\nextended attributes. A local attacker could bypass namespace access\nrules, leading to a loss of privacy. (CVE-2010-2946)\n\nTavis Ormandy discovered that the IRDA subsystem did not correctly\nshut down. A local attacker could exploit this to cause the system to\ncrash or possibly gain root privileges. (CVE-2010-2954)\n\nBrad Spengler discovered that the wireless extensions did not\ncorrectly validate certain request sizes. A local attacker could\nexploit this to read portions of kernel memory, leading to a loss of\nprivacy. (CVE-2010-2955)\n\nTavis Ormandy discovered that the session keyring did not correctly\ncheck for its parent. On systems without a default session keyring, a\nlocal attacker could exploit this to crash the system, leading to a\ndenial of service. (CVE-2010-2960)\n\nKees Cook discovered that the Intel i915 graphics driver did not\ncorrectly validate memory regions. A local attacker with access to the\nvideo card could read and write arbitrary kernel memory to gain root\nprivileges. (CVE-2010-2962)\n\nKees Cook discovered that the V4L1 32bit compat interface did not\ncorrectly validate certain parameters. A local attacker on a 64bit\nsystem with access to a video device could exploit this to gain root\nprivileges. (CVE-2010-2963)\n\nToshiyuki Okajima discovered that ext4 did not correctly check certain\nparameters. A local attacker could exploit this to crash the system or\noverwrite the last block of large files. (CVE-2010-3015)\n\nTavis Ormandy discovered that the AIO subsystem did not correctly\nvalidate certain parameters. A local attacker could exploit this to\ncrash the system or possibly gain root privileges. (CVE-2010-3067)\n\nDan Rosenberg discovered that certain XFS ioctls leaked kernel stack\ncontents. A local attacker could exploit this to read portions of\nkernel memory, leading to a loss of privacy. (CVE-2010-3078)\n\nRobert Swiecki discovered that ftrace did not correctly handle\nmutexes. A local attacker could exploit this to crash the kernel,\nleading to a denial of service. (CVE-2010-3079)\n\nTavis Ormandy discovered that the OSS sequencer device did not\ncorrectly shut down. A local attacker could exploit this to crash the\nsystem or possibly gain root privileges. (CVE-2010-3080)\n\nDan Rosenberg discovered that several network ioctls did not clear\nkernel memory correctly. A local user could exploit this to read\nkernel stack memory, leading to a loss of privacy. (CVE-2010-3296,\nCVE-2010-3297, CVE-2010-3298)\n\nDan Rosenberg discovered that the ROSE driver did not correctly check\nparameters. A local attacker with access to a ROSE network device\ncould exploit this to crash the system or possibly gain root\nprivileges. (CVE-2010-3310)\n\nThomas Dreibholz discovered that SCTP did not correctly handle\nappending packet chunks. A remote attacker could send specially\ncrafted traffic to crash the system, leading to a denial of service.\n(CVE-2010-3432)\n\nDan Rosenberg discovered that the CD driver did not correctly check\nparameters. A local attacker could exploit this to read arbitrary\nkernel memory, leading to a loss of privacy. (CVE-2010-3437)\n\nDan Rosenberg discovered that the Sound subsystem did not correctly\nvalidate parameters. A local attacker could exploit this to crash the\nsystem, leading to a denial of service. (CVE-2010-3442)\n\nDan Rosenberg discovered that SCTP did not correctly handle HMAC\ncalculations. A remote attacker could send specially crafted traffic\nthat would crash the system, leading to a denial of service.\n(CVE-2010-3705)\n\nBrad Spengler discovered that stack memory for new a process was not\ncorrectly calculated. A local attacker could exploit this to crash the\nsystem, leading to a denial of service. (CVE-2010-3858)\n\nDan Rosenberg discovered that the Linux kernel TIPC implementation\ncontained multiple integer signedness errors. A local attacker could\nexploit this to gain root privileges. (CVE-2010-3859)\n\nKees Cook discovered that the ethtool interface did not correctly\nclear kernel memory. A local attacker could read kernel heap memory,\nleading to a loss of privacy. (CVE-2010-3861)\n\nDan Rosenberg discovered that the CAN protocol on 64bit systems did\nnot correctly calculate the size of certain buffers. A local attacker\ncould exploit this to crash the system or possibly execute arbitrary\ncode as the root user. (CVE-2010-3874)\n\nKees Cook and Vasiliy Kulikov discovered that the shm interface did\nnot clear kernel memory correctly. A local attacker could exploit this\nto read kernel stack memory, leading to a loss of privacy.\n(CVE-2010-4072)\n\nDan Rosenberg discovered that IPC structures were not correctly\ninitialized on 64bit systems. A local attacker could exploit this to\nread kernel stack memory, leading to a loss of privacy.\n(CVE-2010-4073)\n\nDan Rosenberg discovered that the RME Hammerfall DSP audio interface\ndriver did not correctly clear kernel memory. A local attacker could\nexploit this to read kernel stack memory, leading to a loss of\nprivacy. (CVE-2010-4080, CVE-2010-4081)\n\nDan Rosenberg discovered that the VIA video driver did not correctly\nclear kernel memory. A local attacker could exploit this to read\nkernel stack memory, leading to a loss of privacy. (CVE-2010-4082)\n\nJames Bottomley discovered that the ICP vortex storage array\ncontroller driver did not validate certain sizes. A local attacker on\na 64bit system could exploit this to crash the kernel, leading to a\ndenial of service. (CVE-2010-4157)\n\nDan Rosenberg discovered that the socket filters did not correctly\ninitialize structure memory. A local attacker could create malicious\nfilters to read portions of kernel stack memory, leading to a loss of\nprivacy. (CVE-2010-4158)\n\nDan Rosenberg discovered that the Linux kernel L2TP implementation\ncontained multiple integer signedness errors. A local attacker could\nexploit this to to crash the kernel, or possibly gain root privileges.\n(CVE-2010-4160)\n\nDan Rosenberg discovered that certain iovec operations did not\ncalculate page counts correctly. A local attacker could exploit this\nto crash the system, leading to a denial of service. (CVE-2010-4162)\n\nDan Rosenberg discovered multiple flaws in the X.25 facilities\nparsing. If a system was using X.25, a remote attacker could exploit\nthis to crash the system, leading to a denial of service.\n(CVE-2010-4164)\n\nSteve Chen discovered that setsockopt did not correctly check MSS\nvalues. A local attacker could make a specially crafted socket call to\ncrash the system, leading to a denial of service. (CVE-2010-4165)\n\nDave Jones discovered that the mprotect system call did not correctly\nhandle merged VMAs. A local attacker could exploit this to crash the\nsystem, leading to a denial of service. (CVE-2010-4169)\n\nDan Rosenberg discovered that the RDS protocol did not correctly check\nioctl arguments. A local attacker could exploit this to crash the\nsystem, leading to a denial of service. (CVE-2010-4175)\n\nAlan Cox discovered that the HCI UART driver did not correctly check\nif a write operation was available. If the mmap_min-addr sysctl was\nchanged from the Ubuntu default to a value of 0, a local attacker\ncould exploit this flaw to gain root privileges. (CVE-2010-4242)\n\nBrad Spengler discovered that the kernel did not correctly account for\nuserspace memory allocations during exec() calls. A local attacker\ncould exploit this to consume all system memory, leading to a denial\nof service. (CVE-2010-4243)\n\nVegard Nossum discovered that memory garbage collection was not\nhandled correctly for active sockets. A local attacker could exploit\nthis to allocate all available kernel memory, leading to a denial of\nservice. (CVE-2010-4249)\n\nIt was discovered that named pipes did not correctly handle certain\nfcntl calls. A local attacker could exploit this to crash the system,\nleading to a denial of service. (CVE-2010-4256)\n\nNelson Elhage discovered that the kernel did not correctly handle\nprocess cleanup after triggering a recoverable kernel bug. If a local\nattacker were able to trigger certain kinds of kernel bugs, they could\ncreate a specially crafted process to gain root privileges.\n(CVE-2010-4258)\n\nKees Cook discovered that some ethtool functions did not correctly\nclear heap memory. A local attacker with CAP_NET_ADMIN privileges\ncould exploit this to read portions of kernel heap memory, leading to\na loss of privacy. (CVE-2010-4655)\n\nFrank Arnold discovered that the IGMP protocol did not correctly parse\ncertain packets. A remote attacker could send specially crafted\ntraffic to crash the system, leading to a denial of service.\n(CVE-2011-0709).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/1083-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Reliable Datagram Sockets (RDS) rds_page_copy_user Privilege Escalation');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-generic-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-generic-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.04:-:lts\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/08/20\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/03/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/03/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2011-2019 Canonical, Inc. / NASL script (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(10\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 10.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2009-4895\", \"CVE-2010-0435\", \"CVE-2010-2066\", \"CVE-2010-2226\", \"CVE-2010-2248\", \"CVE-2010-2478\", \"CVE-2010-2495\", \"CVE-2010-2521\", \"CVE-2010-2524\", \"CVE-2010-2537\", \"CVE-2010-2538\", \"CVE-2010-2798\", \"CVE-2010-2942\", \"CVE-2010-2943\", \"CVE-2010-2946\", \"CVE-2010-2954\", \"CVE-2010-2955\", \"CVE-2010-2960\", \"CVE-2010-2962\", \"CVE-2010-2963\", \"CVE-2010-3015\", \"CVE-2010-3067\", \"CVE-2010-3078\", \"CVE-2010-3079\", \"CVE-2010-3080\", \"CVE-2010-3084\", \"CVE-2010-3296\", \"CVE-2010-3297\", \"CVE-2010-3298\", \"CVE-2010-3301\", \"CVE-2010-3310\", \"CVE-2010-3432\", \"CVE-2010-3437\", \"CVE-2010-3442\", \"CVE-2010-3477\", \"CVE-2010-3705\", \"CVE-2010-3848\", \"CVE-2010-3849\", \"CVE-2010-3850\", \"CVE-2010-3858\", \"CVE-2010-3859\", \"CVE-2010-3861\", \"CVE-2010-3874\", \"CVE-2010-3904\", \"CVE-2010-4072\", \"CVE-2010-4073\", \"CVE-2010-4080\", \"CVE-2010-4081\", \"CVE-2010-4082\", \"CVE-2010-4157\", \"CVE-2010-4158\", \"CVE-2010-4160\", \"CVE-2010-4162\", \"CVE-2010-4164\", \"CVE-2010-4165\", \"CVE-2010-4169\", \"CVE-2010-4175\", \"CVE-2010-4242\", \"CVE-2010-4243\", \"CVE-2010-4249\", \"CVE-2010-4256\", \"CVE-2010-4258\", \"CVE-2010-4655\", \"CVE-2011-0709\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-1083-1\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-headers-2.6.35-25\", pkgver:\"2.6.35-25.44~lucid1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-headers-2.6.35-25-generic\", pkgver:\"2.6.35-25.44~lucid1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-headers-2.6.35-25-generic-pae\", pkgver:\"2.6.35-25.44~lucid1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-headers-2.6.35-25-server\", pkgver:\"2.6.35-25.44~lucid1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-headers-2.6.35-25-virtual\", pkgver:\"2.6.35-25.44~lucid1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-image-2.6.35-25-generic\", pkgver:\"2.6.35-25.44~lucid1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-image-2.6.35-25-generic-pae\", pkgver:\"2.6.35-25.44~lucid1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-image-2.6.35-25-server\", pkgver:\"2.6.35-25.44~lucid1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"linux-image-2.6.35-25-virtual\", pkgver:\"2.6.35-25.44~lucid1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-headers-2.6 / linux-headers-2.6-generic / etc\");\n}\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "redhat": [{"lastseen": "2021-10-21T04:42:12", "description": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built for\nthe standard Red Hat Enterprise Linux kernel.\n\nIt was found that QEMU-KVM on the host did not validate all pointers\nprovided from a guest system's QXL graphics card driver. A privileged guest\nuser could use this flaw to cause the host to dereference an invalid\npointer, causing the guest to crash (denial of service) or, possibly,\nresulting in the privileged guest user escalating their privileges on the\nhost. (CVE-2010-0431)\n\nA flaw was found in QEMU-KVM, allowing the guest some control over the\nindex used to access the callback array during sub-page MMIO\ninitialization. A privileged guest user could use this flaw to crash the\nguest (denial of service) or, possibly, escalate their privileges on the\nhost. (CVE-2010-2784)\n\nA NULL pointer dereference flaw was found when the host system had a\nprocessor with the Intel VT-x extension enabled. A privileged guest user\ncould use this flaw to trick the host into emulating a certain instruction,\nwhich could crash the host (denial of service). (CVE-2010-0435)\n\nThis update also fixes the following bugs:\n\n* running a \"qemu-img\" check on a faulty virtual machine image ended with a\nsegmentation fault. With this update, the segmentation fault no longer\noccurs when running the \"qemu-img\" check. (BZ#610342)\n\n* when attempting to transfer a file between two guests that were joined in\nthe same virtual LAN (VLAN), the receiving guest unexpectedly quit. With\nthis update, the transfer completes successfully. (BZ#610343)\n\n* installation of a system was occasionally failing in KVM. This was caused\nby KVM using wrong permissions for large guest pages. With this update, the\ninstallation completes successfully. (BZ#616796)\n\n* previously, the migration process would fail for a virtual machine\nbecause the virtual machine could not map all the memory. This was caused\nby a conflict that was initiated when a virtual machine was initially run\nand then migrated right away. With this update, the conflict no longer\noccurs and the migration process no longer fails. (BZ#618205)\n\n* using a thinly provisioned VirtIO disk on iSCSI storage and performing a\n\"qemu-img\" check during an \"e_no_space\" event returned cluster errors. With\nthis update, the errors no longer appear. (BZ#618206)\n\nAll KVM users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Note: The procedure in the\nSolution section must be performed before this update will take effect.\n", "cvss3": {}, "published": "2010-08-19T00:00:00", "type": "redhat", "title": "(RHSA-2010:0627) Important: kvm security and bug fix update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 2.7, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.6, "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-0431", "CVE-2010-0435", "CVE-2010-2784"], "modified": "2017-09-08T08:20:05", "id": "RHSA-2010:0627", "href": "https://access.redhat.com/errata/RHSA-2010:0627", "cvss": {"score": 6.6, "vector": "AV:L/AC:M/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2021-10-19T20:41:05", "description": "The rhev-hypervisor package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: A subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nIt was found that the libspice component of QEMU-KVM on the host did not\nvalidate all pointers provided from a guest system's QXL graphics card\ndriver. A privileged guest user could use this flaw to cause the host to\ndereference an invalid pointer, causing the guest to crash (denial of\nservice) or, possibly, resulting in the privileged guest user escalating\ntheir privileges on the host. (CVE-2010-0428)\n\nIt was found that the libspice component of QEMU-KVM on the host could be\nforced to perform certain memory management operations on memory addresses\ncontrolled by a guest. A privileged guest user could use this flaw to crash\nthe guest (denial of service) or, possibly, escalate their privileges on\nthe host. (CVE-2010-0429)\n\nIt was found that QEMU-KVM on the host did not validate all pointers\nprovided from a guest system's QXL graphics card driver. A privileged guest\nuser could use this flaw to cause the host to dereference an invalid\npointer, causing the guest to crash (denial of service) or, possibly,\nresulting in the privileged guest user escalating their privileges on the\nhost. (CVE-2010-0431)\n\nA flaw was found in QEMU-KVM, allowing the guest some control over the\nindex used to access the callback array during sub-page MMIO\ninitialization. A privileged guest user could use this flaw to crash the\nguest (denial of service) or, possibly, escalate their privileges on the\nhost. (CVE-2010-2784)\n\nA NULL pointer dereference flaw was found when Red Hat Enterprise\nVirtualization Hypervisor was run on a system that has a processor with the\nIntel VT-x extension enabled. A privileged guest user could use this flaw\nto trick the host into emulating a certain instruction, which could crash\nthe host (denial of service). (CVE-2010-0435)\n\nA flaw was found in the way VDSM accepted SSL connections. An attacker\ncould trigger this flaw by creating a crafted SSL connection to VDSM,\npreventing VDSM from accepting SSL connections from other users.\n(CVE-2010-2811)\n\nThese updated packages provide updated components that include fixes for\nsecurity issues; however, these issues have no security impact for Red Hat\nEnterprise Virtualization Hypervisor. These fixes are for avahi issues\nCVE-2009-0758 and CVE-2010-2244; freetype issues CVE-2010-1797,\nCVE-2010-2498, CVE-2010-2499, CVE-2010-2500, CVE-2010-2519, CVE-2010-2527,\nand CVE-2010-2541; kernel issues CVE-2010-1084, CVE-2010-2066,\nCVE-2010-2070, CVE-2010-2226, CVE-2010-2248, CVE-2010-2521, and\nCVE-2010-2524; and openldap issues CVE-2010-0211 and CVE-2010-0212.\n\nThese updated rhev-hypervisor packages also fix two bugs. Documentation for\nthese bug fixes will be available shortly from\nhttp://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization_for_Servers/2.2/html/Technical_Notes/index.html\n\nAs Red Hat Enterprise Virtualization Hypervisor is based on KVM, the bug\nfixes from the KVM update RHSA-2010:0627 have been included in this update.\nAlso included are the bug fixes from the VDSM update RHSA-2010:0628.\n\nKVM: https://rhn.redhat.com/errata/RHSA-2010-0627.html\nVDSM: https://rhn.redhat.com/errata/RHSA-2010-0628.html\n\nUsers of Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to these updated rhev-hypervisor packages, which resolve these\nissues.\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2010-08-19T00:00:00", "type": "redhat", "title": "(RHSA-2010:0622) Important: rhev-hypervisor security and bug fix update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-0758", "CVE-2010-0211", "CVE-2010-0212", "CVE-2010-0428", "CVE-2010-0429", "CVE-2010-0431", "CVE-2010-0435", "CVE-2010-1084", "CVE-2010-1797", "CVE-2010-2066", "CVE-2010-2070", "CVE-2010-2226", "CVE-2010-2244", "CVE-2010-2248", "CVE-2010-2498", "CVE-2010-2499", "CVE-2010-2500", "CVE-2010-2519", "CVE-2010-2521", "CVE-2010-2524", "CVE-2010-2527", "CVE-2010-2541", "CVE-2010-2784", "CVE-2010-2811"], "modified": "2019-03-22T19:44:57", "id": "RHSA-2010:0622", "href": "https://access.redhat.com/errata/RHSA-2010:0622", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "centos": [{"lastseen": "2022-02-27T11:58:13", "description": "**CentOS Errata and Security Advisory** CESA-2010:0627\n\n\nKVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built for\nthe standard Red Hat Enterprise Linux kernel.\n\nIt was found that QEMU-KVM on the host did not validate all pointers\nprovided from a guest system's QXL graphics card driver. A privileged guest\nuser could use this flaw to cause the host to dereference an invalid\npointer, causing the guest to crash (denial of service) or, possibly,\nresulting in the privileged guest user escalating their privileges on the\nhost. (CVE-2010-0431)\n\nA flaw was found in QEMU-KVM, allowing the guest some control over the\nindex used to access the callback array during sub-page MMIO\ninitialization. A privileged guest user could use this flaw to crash the\nguest (denial of service) or, possibly, escalate their privileges on the\nhost. (CVE-2010-2784)\n\nA NULL pointer dereference flaw was found when the host system had a\nprocessor with the Intel VT-x extension enabled. A privileged guest user\ncould use this flaw to trick the host into emulating a certain instruction,\nwhich could crash the host (denial of service). (CVE-2010-0435)\n\nThis update also fixes the following bugs:\n\n* running a \"qemu-img\" check on a faulty virtual machine image ended with a\nsegmentation fault. With this update, the segmentation fault no longer\noccurs when running the \"qemu-img\" check. (BZ#610342)\n\n* when attempting to transfer a file between two guests that were joined in\nthe same virtual LAN (VLAN), the receiving guest unexpectedly quit. With\nthis update, the transfer completes successfully. (BZ#610343)\n\n* installation of a system was occasionally failing in KVM. This was caused\nby KVM using wrong permissions for large guest pages. With this update, the\ninstallation completes successfully. (BZ#616796)\n\n* previously, the migration process would fail for a virtual machine\nbecause the virtual machine could not map all the memory. This was caused\nby a conflict that was initiated when a virtual machine was initially run\nand then migrated right away. With this update, the conflict no longer\noccurs and the migration process no longer fails. (BZ#618205)\n\n* using a thinly provisioned VirtIO disk on iSCSI storage and performing a\n\"qemu-img\" check during an \"e_no_space\" event returned cluster errors. With\nthis update, the errors no longer appear. (BZ#618206)\n\nAll KVM users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Note: The procedure in the\nSolution section must be performed before this update will take effect.\n\n\n**Merged security bulletin from advisories:**\nhttps://lists.centos.org/pipermail/centos-announce/2010-August/053873.html\n\n**Affected packages:**\nkmod-kvm\nkvm\nkvm-qemu-img\nkvm-tools\n\n**Upstream details at:**\nhttps://access.redhat.com/errata/RHSA-2010:0627", "cvss3": {}, "published": "2010-08-27T15:11:15", "type": "centos", "title": "kmod, kvm security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 2.7, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.6, "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-0431", "CVE-2010-0435", "CVE-2010-2784"], "modified": "2010-08-27T15:11:15", "id": "CESA-2010:0627", "href": "https://lists.centos.org/pipermail/centos-announce/2010-August/053873.html", "cvss": {"score": 6.6, "vector": "AV:L/AC:M/Au:S/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2019-05-29T18:36:17", "description": "Oracle Linux Local Security Checks ELSA-2010-0627", "cvss3": {}, "published": "2015-10-06T00:00:00", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2010-0627", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-2784", "CVE-2010-0435", "CVE-2010-0431"], "modified": "2018-09-28T00:00:00", "id": "OPENVAS:1361412562310122328", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310122328", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2010-0627.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.122328\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:16:54 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2010-0627\");\n script_tag(name:\"insight\", value:\"ELSA-2010-0627 - kvm security and bug fix update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2010-0627\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2010-0627.html\");\n script_cve_id(\"CVE-2010-0431\", \"CVE-2010-0435\", \"CVE-2010-2784\");\n script_tag(name:\"cvss_base\", value:\"6.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:S/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"kmod-kvm\", rpm:\"kmod-kvm~83~164.0.1.el5_5.21\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kvm\", rpm:\"kvm~83~164.0.1.el5_5.21\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kvm-qemu-img\", rpm:\"kvm-qemu-img~83~164.0.1.el5_5.21\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kvm-tools\", rpm:\"kvm-tools~83~164.0.1.el5_5.21\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 6.6, "vector": "AV:L/AC:M/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:39:56", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1054-1", "cvss3": {}, "published": "2011-02-04T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux, linux-ec2 vulnerabilities USN-1054-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4165", "CVE-2010-0435", "CVE-2010-4169", "CVE-2010-4249"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310840579", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310840579", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1054_1.nasl 14132 2019-03-13 09:25:59Z cfischer $\n#\n# Ubuntu Update for linux, linux-ec2 vulnerabilities USN-1054-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-1054-1/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.840579\");\n script_version(\"$Revision: 14132 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 10:25:59 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-02-04 14:19:53 +0100 (Fri, 04 Feb 2011)\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name:\"USN\", value:\"1054-1\");\n script_cve_id(\"CVE-2010-0435\", \"CVE-2010-4165\", \"CVE-2010-4169\", \"CVE-2010-4249\");\n script_name(\"Ubuntu Update for linux, linux-ec2 vulnerabilities USN-1054-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(10\\.10|10\\.04 LTS)\");\n script_tag(name:\"summary\", value:\"Ubuntu Update for Linux kernel vulnerabilities USN-1054-1\");\n script_tag(name:\"affected\", value:\"linux, linux-ec2 vulnerabilities on Ubuntu 10.04 LTS,\n Ubuntu 10.10\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"Gleb Napatov discovered that KVM did not correctly check certain\n privileged operations. A local attacker with access to a guest kernel\n could exploit this to crash the host system, leading to a denial of\n service. (CVE-2010-0435)\n\n Steve Chen discovered that setsockopt did not correctly check MSS values.\n A local attacker could make a specially crafted socket call to crash\n the system, leading to a denial of service. (CVE-2010-4165)\n\n Dave Jones discovered that the mprotect system call did not correctly\n handle merged VMAs. A local attacker could exploit this to crash the\n system, leading to a denial of service. (CVE-2010-4169)\n\n Vegard Nossum discovered that memory garbage collection was not\n handled correctly for active sockets. A local attacker could exploit\n this to allocate all available kernel memory, leading to a denial of\n service. (CVE-2010-4249)\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU10.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.35-25-generic-pae\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.35-25-generic\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.35-25-virtual\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.35-25-generic-pae\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.35-25-generic\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.35-25-virtual\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-libc-dev\", ver:\"2.6.35-1025.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-tools-2.6.35-25\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-doc\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.35-25\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-source-2.6.35\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-tools-common\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"block-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"block-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"block-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"char-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"char-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"crypto-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"crypto-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"crypto-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fat-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fat-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fat-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fb-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fb-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fb-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"firewire-core-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"firewire-core-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"floppy-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"floppy-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"floppy-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-core-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-core-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-core-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-secondary-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-secondary-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-secondary-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"input-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"input-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"irda-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"irda-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"irda-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel-image-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel-image-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel-image-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"md-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"md-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"md-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"message-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"message-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"message-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mouse-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mouse-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mouse-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nfs-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nfs-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-shared-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-shared-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-shared-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-usb-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-usb-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"parport-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"parport-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"parport-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pata-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pata-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"plip-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"plip-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ppp-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ppp-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ppp-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"sata-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"sata-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"sata-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"scsi-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"scsi-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"scsi-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"serial-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"serial-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"squashfs-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"squashfs-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"squashfs-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"storage-core-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"storage-core-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"storage-core-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"usb-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"usb-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"virtio-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"virtio-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"virtio-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"vlan-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"vlan-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"vlan-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.32-312-ec2\", ver:\"2.6.32-312.24\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.32-312-ec2\", ver:\"2.6.32-312.24\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.32-28-386\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.32-28-generic-pae\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.32-28-generic\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.32-28-386\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.32-28-generic-pae\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.32-28-generic\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.32-28-virtual\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-libc-dev\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-tools-2.6.32-28\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-ec2-doc\", ver:\"2.6.32-312.24\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-ec2-source-2.6.32\", ver:\"2.6.32-312.24\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.32-312\", ver:\"2.6.32-312.24\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-doc\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.32-28\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-source-2.6.32\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-tools-common\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"block-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"block-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"char-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"char-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"crypto-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"crypto-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fat-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fat-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fb-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fb-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"firewire-core-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"firewire-core-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"floppy-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"floppy-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-core-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-core-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-secondary-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-secondary-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"input-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"input-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"irda-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"irda-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel-image-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel-image-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"md-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"md-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"message-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"message-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mouse-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mouse-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nfs-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nfs-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-shared-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-shared-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-usb-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-usb-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"parport-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"parport-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pata-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pata-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"plip-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"plip-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ppp-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ppp-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"sata-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"sata-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"scsi-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"scsi-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"serial-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"serial-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"squashfs-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"squashfs-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"storage-core-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"storage-core-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"usb-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"usb-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"virtio-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"virtio-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"vlan-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"vlan-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2017-12-04T11:27:26", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1054-1", "cvss3": {}, "published": "2011-02-04T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux, linux-ec2 vulnerabilities USN-1054-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4165", "CVE-2010-0435", "CVE-2010-4169", "CVE-2010-4249"], "modified": "2017-12-01T00:00:00", "id": "OPENVAS:840579", "href": "http://plugins.openvas.org/nasl.php?oid=840579", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1054_1.nasl 7964 2017-12-01 07:32:11Z santu $\n#\n# Ubuntu Update for linux, linux-ec2 vulnerabilities USN-1054-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Gleb Napatov discovered that KVM did not correctly check certain\n privileged operations. A local attacker with access to a guest kernel\n could exploit this to crash the host system, leading to a denial of\n service. (CVE-2010-0435)\n\n Steve Chen discovered that setsockopt did not correctly check MSS values.\n A local attacker could make a specially crafted socket call to crash\n the system, leading to a denial of service. (CVE-2010-4165)\n \n Dave Jones discovered that the mprotect system call did not correctly\n handle merged VMAs. A local attacker could exploit this to crash the\n system, leading to a denial of service. (CVE-2010-4169)\n \n Vegard Nossum discovered that memory garbage collection was not\n handled correctly for active sockets. A local attacker could exploit\n this to allocate all available kernel memory, leading to a denial of\n service. (CVE-2010-4249)\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1054-1\";\ntag_affected = \"linux, linux-ec2 vulnerabilities on Ubuntu 10.04 LTS ,\n Ubuntu 10.10\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1054-1/\");\n script_id(840579);\n script_version(\"$Revision: 7964 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 08:32:11 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-02-04 14:19:53 +0100 (Fri, 04 Feb 2011)\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"USN\", value: \"1054-1\");\n script_cve_id(\"CVE-2010-0435\", \"CVE-2010-4165\", \"CVE-2010-4169\", \"CVE-2010-4249\");\n script_name(\"Ubuntu Update for linux, linux-ec2 vulnerabilities USN-1054-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU10.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.35-25-generic-pae\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.35-25-generic\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.35-25-virtual\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.35-25-generic-pae\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.35-25-generic\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.35-25-virtual\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-libc-dev\", ver:\"2.6.35-1025.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-tools-2.6.35-25\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-doc\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.35-25\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-source-2.6.35\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-tools-common\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"block-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"block-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"block-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"char-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"char-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"crypto-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"crypto-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"crypto-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fat-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fat-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fat-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fb-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fb-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fb-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"firewire-core-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"firewire-core-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"floppy-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"floppy-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"floppy-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-core-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-core-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-core-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-secondary-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-secondary-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-secondary-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"input-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"input-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"irda-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"irda-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"irda-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel-image-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel-image-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel-image-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"md-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"md-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"md-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"message-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"message-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"message-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mouse-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mouse-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mouse-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nfs-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nfs-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-shared-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-shared-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-shared-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-usb-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-usb-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"parport-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"parport-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"parport-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pata-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pata-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"plip-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"plip-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ppp-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ppp-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ppp-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"sata-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"sata-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"sata-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"scsi-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"scsi-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"scsi-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"serial-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"serial-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"squashfs-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"squashfs-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"squashfs-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"storage-core-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"storage-core-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"storage-core-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"usb-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"usb-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"virtio-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"virtio-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"virtio-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"vlan-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"vlan-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"vlan-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.32-312-ec2\", ver:\"2.6.32-312.24\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.32-312-ec2\", ver:\"2.6.32-312.24\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.32-28-386\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.32-28-generic-pae\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.32-28-generic\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.32-28-386\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.32-28-generic-pae\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.32-28-generic\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.32-28-virtual\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-libc-dev\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-tools-2.6.32-28\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-ec2-doc\", ver:\"2.6.32-312.24\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-ec2-source-2.6.32\", ver:\"2.6.32-312.24\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.32-312\", ver:\"2.6.32-312.24\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-doc\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.32-28\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-source-2.6.32\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-tools-common\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"block-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"block-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"char-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"char-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"crypto-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"crypto-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fat-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fat-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fb-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fb-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"firewire-core-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"firewire-core-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"floppy-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"floppy-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-core-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-core-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-secondary-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-secondary-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"input-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"input-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"irda-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"irda-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel-image-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel-image-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"md-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"md-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"message-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"message-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mouse-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mouse-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nfs-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nfs-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-shared-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-shared-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-usb-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-usb-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"parport-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"parport-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pata-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pata-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"plip-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"plip-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ppp-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ppp-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"sata-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"sata-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"scsi-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"scsi-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"serial-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"serial-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"squashfs-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"squashfs-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"storage-core-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"storage-core-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"usb-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"usb-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"virtio-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"virtio-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"vlan-modules-2.6.32-28-generic-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"vlan-modules-2.6.32-28-generic-pae-di\", ver:\"2.6.32-28.55\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:55:23", "description": "The remote host is missing an update to linux-2.6\nannounced via advisory DSA 2153-1.", "cvss3": {}, "published": "2011-03-07T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 2153-1 (linux-2.6)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4242", "CVE-2011-0521", "CVE-2010-4163", "CVE-2010-4529", "CVE-2010-4668", "CVE-2010-4346", "CVE-2010-4527", "CVE-2010-4649", "CVE-2010-0435", "CVE-2010-4656", "CVE-2010-4158", "CVE-2010-4526", "CVE-2010-4162", "CVE-2010-4258", "CVE-2010-4248", "CVE-2010-4243", "CVE-2010-4249", "CVE-2010-4342", "CVE-2010-3699", "CVE-2010-4565"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:68992", "href": "http://plugins.openvas.org/nasl.php?oid=68992", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_2153_1.nasl 6613 2017-07-07 12:08:40Z cfischer $\n# Description: Auto-generated from advisory DSA 2153-1 (linux-2.6)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"CVE-2010-0435\nGleb Napatov reported an issue in the KVM subsystem that allows virtual\nmachines to cause a denial of service of the host machine.\n\nCVE-2010-3699\nKeir Fraser provided a fix for an issue in the Xen subsystem.\n\nCVE-2010-4158\nDan Rosenberg discovered an issue in the socket filters subsystem.\n\nCVE-2010-4162\nDan Rosenberg discovered an overflow issue in the block I/O subsystem.\n\nCVE-2010-4163\nDan Rosenberg discovered an issue in the block I/O subsystem.\n\nCVE-2010-4242\nAlan Cox reported an issue in the Bluetooth subsystem.\n\nCVE-2010-4243\nBrad Spengler reported a denial-of-service issue in the kernel memory\naccounting system.\n\nCVE-2010-4248\nOleg Nesterov reported an issue in the POSIX CPU timers subsystem.\n\nCVE-2010-4249\nVegard Nossum reported an issue with the UNIX socket garbage collector.\n\nCVE-2010-4258\nNelson Elhage reported an issue in Linux oops handling.\n\nCVE-2010-4342\nNelson Elhage reported an issue in the econet protocol.\n\nCVE-2010-4346\nTavis Ormandy discovered an issue in the install_special_mapping routine\nwhich allows local users to bypass the mmap_min_addr security restriction.\n\nCVE-2010-4526\nEugene Teo reported a race condition in the Linux SCTP implementation.\n\nCVE-2010-4527\nDan Rosenberg reported two issues in the OSS soundcard driver. Local users\nwith access to the device (members of group 'audio' on default Debian\ninstallations) may contain access to sensitive kernel memory or cause a\nbuffer overflow.\n\nCVE-2010-4529\nDan Rosenberg reported an issue in the Linux kernel IrDA socket\nimplementation on non-x86 architectures. Local users may be able to gain\naccess to sensitive kernel memory via a specially crafted IRLMP_ENUMDEVICES\ngetsockopt call.\n\nCVE-2010-4565\nDan Rosenberg reported an issue in the Linux CAN protocol implementation.\nLocal users can obtain the address of a kernel heap object which might help\nfacilitate system exploitation.\n\nCVE-2010-4649\nDan Carpenter reported an issue in the uverb handling of the InfiniBand\nsubsystem. A potential buffer overflow may allow local users to cause a\ndenial of service (memory corruption) by passing in a large cmd.ne value.\n\nCVE-2010-4656\nKees Cook reported an issue in the driver for I/O-Warrior USB devices.\nLocal users with access to these devices maybe able to overrun kernel\nbuffers, resulting in a denial of service or privilege escalation.\n\nCVE-2010-4668\nDan Rosenberg reported an issue in the block subsystem. A local user can\ncause a denial of service (kernel panic) by submitting certain 0-length I/O\nrequests.\n\nCVE-2011-0521\nDan Carpenter reported an issue in the DVB driver for AV7110 cards. Local\nusers can pass a negative info->num value, corrupting kernel memory and\ncausing a denial of service.\nFor the stable distribution (lenny), this problem has been fixed in\nversion 2.6.26-26lenny2.\";\ntag_summary = \"The remote host is missing an update to linux-2.6\nannounced via advisory DSA 2153-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202153-1\";\n\n\nif(description)\n{\n script_id(68992);\n script_version(\"$Revision: 6613 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:08:40 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-03-07 16:04:02 +0100 (Mon, 07 Mar 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_cve_id(\"CVE-2010-0435\", \"CVE-2010-3699\", \"CVE-2010-4158\", \"CVE-2010-4162\", \"CVE-2010-4163\", \"CVE-2010-4242\", \"CVE-2010-4243\", \"CVE-2010-4248\", \"CVE-2010-4249\", \"CVE-2010-4258\", \"CVE-2010-4342\", \"CVE-2010-4346\", \"CVE-2010-4526\", \"CVE-2010-4527\", \"CVE-2010-4529\", \"CVE-2010-4565\", \"CVE-2010-4649\", \"CVE-2010-4656\", \"CVE-2010-4668\", \"CVE-2011-0521\");\n script_name(\"Debian Security Advisory DSA 2153-1 (linux-2.6)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"26\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-486\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-4kc-malta\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-5kc-malta\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-686\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-686-bigmem\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-all\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-all-alpha\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-all-amd64\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-all-arm\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-all-armel\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-all-hppa\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-all-i386\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-all-ia64\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-all-mips\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-all-mipsel\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-all-powerpc\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-all-s390\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-all-sparc\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-alpha-generic\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-alpha-legacy\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-alpha-smp\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-amd64\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-common\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-common-openvz\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-common-vserver\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-common-xen\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-footbridge\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-iop32x\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-itanium\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-ixp4xx\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-mckinley\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-openvz-686\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-openvz-amd64\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-orion5x\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-parisc\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-parisc-smp\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-parisc64\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-parisc64-smp\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-powerpc\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-powerpc-smp\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-powerpc64\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-r4k-ip22\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-r5k-cobalt\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-r5k-ip32\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-s390\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-s390x\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-sb1-bcm91250a\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-sb1a-bcm91480b\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-sparc64\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-sparc64-smp\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-versatile\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-vserver-686\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-vserver-686-bigmem\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-vserver-amd64\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-vserver-itanium\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-vserver-mckinley\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-vserver-powerpc\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-vserver-powerpc64\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-vserver-s390x\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-vserver-sparc64\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-xen-686\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-xen-amd64\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2-s390-tape\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-libc-dev\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"26-2\", ver:\"2.6.26-26lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2020-08-04T16:12:49", "description": "The remote host is missing an update to linux-2.6\nannounced via advisory DSA 2153-1.", "cvss3": {}, "published": "2011-03-07T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 2153-1 (linux-2.6)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4242", "CVE-2011-0521", "CVE-2010-4163", "CVE-2010-4529", "CVE-2010-4668", "CVE-2010-4346", "CVE-2010-4527", "CVE-2010-4649", "CVE-2010-0435", "CVE-2010-4656", "CVE-2010-4158", "CVE-2010-4526", "CVE-2010-4162", "CVE-2010-4258", "CVE-2010-4248", "CVE-2010-4243", "CVE-2010-4249", "CVE-2010-4342", "CVE-2010-3699", "CVE-2010-4565"], "modified": "2019-03-18T00:00:00", "id": "OPENVAS:136141256231068992", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231068992", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_2153_1.nasl 14275 2019-03-18 14:39:45Z cfischer $\n# Description: Auto-generated from advisory DSA 2153-1 (linux-2.6)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.68992\");\n script_version(\"$Revision: 14275 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:39:45 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-03-07 16:04:02 +0100 (Mon, 07 Mar 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_cve_id(\"CVE-2010-0435\", \"CVE-2010-3699\", \"CVE-2010-4158\", \"CVE-2010-4162\", \"CVE-2010-4163\", \"CVE-2010-4242\", \"CVE-2010-4243\", \"CVE-2010-4248\", \"CVE-2010-4249\", \"CVE-2010-4258\", \"CVE-2010-4342\", \"CVE-2010-4346\", \"CVE-2010-4526\", \"CVE-2010-4527\", \"CVE-2010-4529\", \"CVE-2010-4565\", \"CVE-2010-4649\", \"CVE-2010-4656\", \"CVE-2010-4668\", \"CVE-2011-0521\");\n script_name(\"Debian Security Advisory DSA 2153-1 (linux-2.6)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB5\");\n script_xref(name:\"URL\", value:\"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202153-1\");\n script_tag(name:\"insight\", value:\"CVE-2010-0435\nGleb Napatov reported an issue in the KVM subsystem that allows virtual\nmachines to cause a denial of service of the host machine.\n\nCVE-2010-3699\nKeir Fraser provided a fix for an issue in the Xen subsystem.\n\nCVE-2010-4158\nDan Rosenberg discovered an issue in the socket filters subsystem.\n\nCVE-2010-4162\nDan Rosenberg discovered an overflow issue in the block I/O subsystem.\n\nCVE-2010-4163\nDan Rosenberg discovered an issue in the block I/O subsystem.\n\nCVE-2010-4242\nAlan Cox reported an issue in the Bluetooth subsystem.\n\nCVE-2010-4243\nBrad Spengler reported a denial-of-service issue in the kernel memory\naccounting system.\n\nCVE-2010-4248\nOleg Nesterov reported an issue in the POSIX CPU timers subsystem.\n\nCVE-2010-4249\nVegard Nossum reported an issue with the UNIX socket garbage collector.\n\nCVE-2010-4258\nNelson Elhage reported an issue in Linux oops handling.\n\nCVE-2010-4342\nNelson Elhage reported an issue in the econet protocol.\n\nCVE-2010-4346\nTavis Ormandy discovered an issue in the install_special_mapping routine\nwhich allows local users to bypass the mmap_min_addr security restriction.\n\nCVE-2010-4526\nEugene Teo reported a race condition in the Linux SCTP implementation.\n\nCVE-2010-4527\nDan Rosenberg reported two issues in the OSS soundcard driver. Local users\nwith access to the device (members of group 'audio' on default Debian\ninstallations) may contain access to sensitive kernel memory or cause a\nbuffer overflow.\n\nCVE-2010-4529\nDan Rosenberg reported an issue in the Linux kernel IrDA socket\nimplementation on non-x86 architectures. Local users may be able to gain\naccess to sensitive kernel memory via a specially crafted IRLMP_ENUMDEVICES\ngetsockopt call.\n\nCVE-2010-4565\nDan Rosenberg reported an issue in the Linux CAN protocol implementation.\nLocal users can obtain the address of a kernel heap object which might help\nfacilitate system exploitation.\n\nCVE-2010-4649\nDan Carpenter reported an issue in the uverb handling of the InfiniBand\nsubsystem. A potential buffer overflow may allow local users to cause a\ndenial of service (memory corruption) by passing in a large cmd.ne value.\n\nCVE-2010-4656\nKees Cook reported an issue in the driver for I/O-Warrior USB devices.\nLocal users with access to these devices maybe able to overrun kernel\nbuffers, resulting in a denial of service or privilege escalation.\n\nCVE-2010-4668\nDan Rosenberg reported an issue in the block subsystem. A local user can\ncause a denial of service (kernel panic) by submitting certain 0-length I/O\nrequests.\n\nCVE-2011-0521\nDan Carpenter reported an issue in the DVB driver for AV7110 cards. Local\nusers can pass a negative info->num value, corrupting kernel memory and\ncausing a denial of service.\nFor the stable distribution (lenny), this problem has been fixed in\nversion 2.6.26-26lenny2.\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update to linux-2.6\nannounced via advisory DSA 2153-1.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"26\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-486\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-4kc-malta\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-5kc-malta\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-686\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-686-bigmem\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-all\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-all-alpha\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-all-amd64\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-all-arm\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-all-armel\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-all-hppa\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-all-i386\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-all-ia64\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-all-mips\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-all-mipsel\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-all-powerpc\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-all-s390\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-all-sparc\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-alpha-generic\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-alpha-legacy\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-alpha-smp\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-amd64\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-common\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-common-openvz\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-common-vserver\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-common-xen\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-footbridge\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-iop32x\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-itanium\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-ixp4xx\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-mckinley\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-openvz-686\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-openvz-amd64\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-orion5x\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-parisc\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-parisc-smp\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-parisc64\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-parisc64-smp\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-powerpc\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-powerpc-smp\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-powerpc64\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-r4k-ip22\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-r5k-cobalt\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-r5k-ip32\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-s390\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-s390x\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-sb1-bcm91250a\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-sb1a-bcm91480b\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-sparc64\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-sparc64-smp\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-versatile\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-vserver-686\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-vserver-686-bigmem\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-vserver-amd64\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-vserver-itanium\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-vserver-mckinley\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-vserver-powerpc\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-vserver-powerpc64\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-vserver-s390x\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-vserver-sparc64\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-xen-686\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-xen-amd64\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2-s390-tape\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"linux-libc-dev\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"26-2\", ver:\"2.6.26-26lenny2\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-15T16:26:41", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1072-1", "cvss3": {}, "published": "2011-02-28T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux vulnerabilities USN-1072-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4081", "CVE-2010-3297", "CVE-2010-4072", "CVE-2010-4074", "CVE-2010-4083", "CVE-2010-2943", "CVE-2010-0435", "CVE-2010-3859", "CVE-2010-4080", "CVE-2010-3877", "CVE-2010-3875", "CVE-2010-3876", "CVE-2010-3296", "CVE-2010-3698", "CVE-2010-4248", "CVE-2010-4079", "CVE-2010-3880", "CVE-2010-4157", "CVE-2010-4160", "CVE-2010-3858", "CVE-2010-3699", "CVE-2010-3873", "CVE-2010-3448", "CVE-2010-4078"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310840594", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310840594", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1072_1.nasl 14132 2019-03-13 09:25:59Z cfischer $\n#\n# Ubuntu Update for linux vulnerabilities USN-1072-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-1072-1/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.840594\");\n script_version(\"$Revision: 14132 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 10:25:59 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-02-28 16:24:14 +0100 (Mon, 28 Feb 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:C/I:C/A:N\");\n script_xref(name:\"USN\", value:\"1072-1\");\n script_cve_id(\"CVE-2010-0435\", \"CVE-2010-2943\", \"CVE-2010-3296\", \"CVE-2010-3297\", \"CVE-2010-3448\", \"CVE-2010-3698\", \"CVE-2010-3699\", \"CVE-2010-3858\", \"CVE-2010-3859\", \"CVE-2010-3873\", \"CVE-2010-3875\", \"CVE-2010-3876\", \"CVE-2010-3877\", \"CVE-2010-3880\", \"CVE-2010-4072\", \"CVE-2010-4074\", \"CVE-2010-4078\", \"CVE-2010-4079\", \"CVE-2010-4080\", \"CVE-2010-4081\", \"CVE-2010-4083\", \"CVE-2010-4157\", \"CVE-2010-4160\", \"CVE-2010-4248\");\n script_name(\"Ubuntu Update for linux vulnerabilities USN-1072-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU8\\.04 LTS\");\n script_tag(name:\"summary\", value:\"Ubuntu Update for Linux kernel vulnerabilities USN-1072-1\");\n script_tag(name:\"affected\", value:\"linux vulnerabilities on Ubuntu 8.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"Gleb Napatov discovered that KVM did not correctly check certain privileged\n operations. A local attacker with access to a guest kernel could exploit\n this to crash the host system, leading to a denial of service.\n (CVE-2010-0435)\n\n Dave Chinner discovered that the XFS filesystem did not correctly order\n inode lookups when exported by NFS. A remote attacker could exploit this to\n read or write disk blocks that had changed file assignment or had become\n unlinked, leading to a loss of privacy. (CVE-2010-2943)\n\n Dan Rosenberg discovered that several network ioctls did not clear kernel\n memory correctly. A local user could exploit this to read kernel stack\n memory, leading to a loss of privacy. (CVE-2010-3296, CVE-2010-3297)\n\n Dan Jacobson discovered that ThinkPad video output was not correctly\n access controlled. A local attacker could exploit this to hang the system,\n leading to a denial of service. (CVE-2010-3448)\n\n It was discovered that KVM did not correctly initialize certain CPU\n registers. A local attacker could exploit this to crash the system,\n leading to a denial of service. (CVE-2010-3698)\n\n It was discovered that Xen did not correctly clean up threads. A local\n attacker in a guest system could exploit this to exhaust host system\n resources, leading to a denial of service. (CVE-2010-3699)\n\n Brad Spengler discovered that stack memory for new a process was not\n correctly calculated. A local attacker could exploit this to crash the\n system, leading to a denial of service. (CVE-2010-3858)\n\n Dan Rosenberg discovered that the Linux kernel TIPC implementation\n contained multiple integer signedness errors. A local attacker could\n exploit this to gain root privileges. (CVE-2010-3859)\n\n Dan Rosenberg discovered that the Linux kernel X.25 implementation\n incorrectly parsed facilities. A remote attacker could exploit this to\n crash the kernel, leading to a denial of service. (CVE-2010-3873)\n\n Vasiliy Kulikov discovered that the Linux kernel X.25 implementation did\n not correctly clear kernel memory. A local attacker could exploit this to\n read kernel stack memory, leading to a loss of privacy. (CVE-2010-3875)\n\n Vasiliy Kulikov discovered that the Linux kernel sockets implementation did\n not properly initialize certain structures. A local attacker could exploit\n this to read kernel stack memory, leading to a loss of privacy.\n (CVE-2010-3876)\n\n Vasiliy Kulikov discovered that the TIPC interface did not correctly\n initialize certain structures. A local attacker could exploit this to\n read kernel stack memory, leading to a l ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU8.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-28-386\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-28-generic\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-28-openvz\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-28-rt\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-28-server\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-28-virtual\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-28-xen\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-28-386\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-28-generic\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-28-openvz\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-28-rt\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-28-server\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-28-virtual\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-28-xen\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-debug-2.6.24-28-386\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-debug-2.6.24-28-generic\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-debug-2.6.24-28-server\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-debug-2.6.24-28-virtual\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-libc-dev\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-doc-2.6.24\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-28\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-kernel-devel\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-source-2.6.24\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"acpi-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"acpi-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"block-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"block-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"crypto-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"crypto-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fat-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fat-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fb-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fb-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"firewire-core-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"firewire-core-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"floppy-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"floppy-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-core-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-core-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-secondary-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-secondary-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ide-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ide-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"input-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"input-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ipv6-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ipv6-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"irda-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"irda-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel-image-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel-image-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"md-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"md-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"message-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"message-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nfs-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nfs-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-shared-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-shared-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-usb-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-usb-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"parport-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"parport-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pata-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pata-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"plip-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"plip-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ppp-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ppp-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"sata-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"sata-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"scsi-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"scsi-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"serial-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"serial-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"socket-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"socket-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"storage-core-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"storage-core-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"usb-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"usb-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-12-04T11:26:37", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1072-1", "cvss3": {}, "published": "2011-02-28T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux vulnerabilities USN-1072-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4081", "CVE-2010-3297", "CVE-2010-4072", "CVE-2010-4074", "CVE-2010-4083", "CVE-2010-2943", "CVE-2010-0435", "CVE-2010-3859", "CVE-2010-4080", "CVE-2010-3877", "CVE-2010-3875", "CVE-2010-3876", "CVE-2010-3296", "CVE-2010-3698", "CVE-2010-4248", "CVE-2010-4079", "CVE-2010-3880", "CVE-2010-4157", "CVE-2010-4160", "CVE-2010-3858", "CVE-2010-3699", "CVE-2010-3873", "CVE-2010-3448", "CVE-2010-4078"], "modified": "2017-12-01T00:00:00", "id": "OPENVAS:840594", "href": "http://plugins.openvas.org/nasl.php?oid=840594", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1072_1.nasl 7964 2017-12-01 07:32:11Z santu $\n#\n# Ubuntu Update for linux vulnerabilities USN-1072-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Gleb Napatov discovered that KVM did not correctly check certain privileged\n operations. A local attacker with access to a guest kernel could exploit\n this to crash the host system, leading to a denial of service.\n (CVE-2010-0435)\n\n Dave Chinner discovered that the XFS filesystem did not correctly order\n inode lookups when exported by NFS. A remote attacker could exploit this to\n read or write disk blocks that had changed file assignment or had become\n unlinked, leading to a loss of privacy. (CVE-2010-2943)\n \n Dan Rosenberg discovered that several network ioctls did not clear kernel\n memory correctly. A local user could exploit this to read kernel stack\n memory, leading to a loss of privacy. (CVE-2010-3296, CVE-2010-3297)\n \n Dan Jacobson discovered that ThinkPad video output was not correctly\n access controlled. A local attacker could exploit this to hang the system,\n leading to a denial of service. (CVE-2010-3448)\n \n It was discovered that KVM did not correctly initialize certain CPU\n registers. A local attacker could exploit this to crash the system,\n leading to a denial of service. (CVE-2010-3698)\n \n It was discovered that Xen did not correctly clean up threads. A local\n attacker in a guest system could exploit this to exhaust host system\n resources, leading to a denial of serivce. (CVE-2010-3699)\n \n Brad Spengler discovered that stack memory for new a process was not\n correctly calculated. A local attacker could exploit this to crash the\n system, leading to a denial of service. (CVE-2010-3858)\n \n Dan Rosenberg discovered that the Linux kernel TIPC implementation\n contained multiple integer signedness errors. A local attacker could\n exploit this to gain root privileges. (CVE-2010-3859)\n \n Dan Rosenberg discovered that the Linux kernel X.25 implementation\n incorrectly parsed facilities. A remote attacker could exploit this to\n crash the kernel, leading to a denial of service. (CVE-2010-3873)\n \n Vasiliy Kulikov discovered that the Linux kernel X.25 implementation did\n not correctly clear kernel memory. A local attacker could exploit this to\n read kernel stack memory, leading to a loss of privacy. (CVE-2010-3875)\n \n Vasiliy Kulikov discovered that the Linux kernel sockets implementation did\n not properly initialize certain structures. A local attacker could exploit\n this to read kernel stack memory, leading to a loss of privacy.\n (CVE-2010-3876)\n \n Vasiliy Kulikov discovered that the TIPC interface did not correctly\n initialize certain structures. A local attacker could exploit this to\n read kernel stack memory, leading to a l ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1072-1\";\ntag_affected = \"linux vulnerabilities on Ubuntu 8.04 LTS\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1072-1/\");\n script_id(840594);\n script_version(\"$Revision: 7964 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 08:32:11 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-02-28 16:24:14 +0100 (Mon, 28 Feb 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:C/I:C/A:N\");\n script_xref(name: \"USN\", value: \"1072-1\");\n script_cve_id(\"CVE-2010-0435\", \"CVE-2010-2943\", \"CVE-2010-3296\", \"CVE-2010-3297\", \"CVE-2010-3448\", \"CVE-2010-3698\", \"CVE-2010-3699\", \"CVE-2010-3858\", \"CVE-2010-3859\", \"CVE-2010-3873\", \"CVE-2010-3875\", \"CVE-2010-3876\", \"CVE-2010-3877\", \"CVE-2010-3880\", \"CVE-2010-4072\", \"CVE-2010-4074\", \"CVE-2010-4078\", \"CVE-2010-4079\", \"CVE-2010-4080\", \"CVE-2010-4081\", \"CVE-2010-4083\", \"CVE-2010-4157\", \"CVE-2010-4160\", \"CVE-2010-4248\");\n script_name(\"Ubuntu Update for linux vulnerabilities USN-1072-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU8.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-28-386\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-28-generic\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-28-openvz\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-28-rt\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-28-server\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-28-virtual\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-28-xen\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-28-386\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-28-generic\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-28-openvz\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-28-rt\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-28-server\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-28-virtual\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.24-28-xen\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-debug-2.6.24-28-386\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-debug-2.6.24-28-generic\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-debug-2.6.24-28-server\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-debug-2.6.24-28-virtual\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-libc-dev\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-doc-2.6.24\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.24-28\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-kernel-devel\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-source-2.6.24\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"acpi-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"acpi-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"block-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"block-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"crypto-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"crypto-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fat-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fat-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fb-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fb-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"firewire-core-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"firewire-core-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"floppy-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"floppy-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-core-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-core-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-secondary-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-secondary-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ide-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ide-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"input-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"input-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ipv6-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ipv6-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"irda-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"irda-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel-image-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel-image-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"md-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"md-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"message-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"message-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nfs-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nfs-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-shared-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-shared-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-usb-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-usb-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"parport-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"parport-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pata-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pata-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"plip-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"plip-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ppp-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ppp-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"sata-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"sata-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"scsi-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"scsi-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"serial-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"serial-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"socket-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"socket-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"storage-core-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"storage-core-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"usb-modules-2.6.24-28-386-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"usb-modules-2.6.24-28-generic-di\", ver:\"2.6.24-28.86\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.9, "vector": "AV:NETWORK/AC:MEDIUM/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:NONE/"}}, {"lastseen": "2020-08-15T16:27:12", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1073-1", "cvss3": {}, "published": "2011-02-28T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux, linux-ec2 vulnerabilities USN-1073-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4081", "CVE-2010-3865", "CVE-2010-4165", "CVE-2010-4074", "CVE-2010-4083", "CVE-2010-4082", "CVE-2010-0435", "CVE-2010-3859", "CVE-2010-4080", "CVE-2010-4169", "CVE-2010-3877", "CVE-2010-3875", "CVE-2010-3876", "CVE-2010-3698", "CVE-2010-4248", "CVE-2010-4079", "CVE-2010-3880", "CVE-2010-3874", "CVE-2010-4249", "CVE-2010-4157", "CVE-2010-4160", "CVE-2010-3873", "CVE-2010-3448", "CVE-2010-4078"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310840592", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310840592", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1073_1.nasl 14132 2019-03-13 09:25:59Z cfischer $\n#\n# Ubuntu Update for linux, linux-ec2 vulnerabilities USN-1073-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-1073-1/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.840592\");\n script_version(\"$Revision: 14132 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 10:25:59 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-02-28 16:24:14 +0100 (Mon, 28 Feb 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name:\"USN\", value:\"1073-1\");\n script_cve_id(\"CVE-2010-0435\", \"CVE-2010-3448\", \"CVE-2010-3698\", \"CVE-2010-3859\", \"CVE-2010-3865\", \"CVE-2010-3873\", \"CVE-2010-3874\", \"CVE-2010-3875\", \"CVE-2010-3876\", \"CVE-2010-3877\", \"CVE-2010-3880\", \"CVE-2010-4074\", \"CVE-2010-4078\", \"CVE-2010-4079\", \"CVE-2010-4080\", \"CVE-2010-4081\", \"CVE-2010-4082\", \"CVE-2010-4083\", \"CVE-2010-4157\", \"CVE-2010-4160\", \"CVE-2010-4165\", \"CVE-2010-4169\", \"CVE-2010-4248\", \"CVE-2010-4249\");\n script_name(\"Ubuntu Update for linux, linux-ec2 vulnerabilities USN-1073-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU9\\.10\");\n script_tag(name:\"summary\", value:\"Ubuntu Update for Linux kernel vulnerabilities USN-1073-1\");\n script_tag(name:\"affected\", value:\"linux, linux-ec2 vulnerabilities on Ubuntu 9.10\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"Gleb Napatov discovered that KVM did not correctly check certain privileged\n operations. A local attacker with access to a guest kernel could exploit\n this to crash the host system, leading to a denial of service.\n (CVE-2010-0435)\n\n Dan Jacobson discovered that ThinkPad video output was not correctly access\n controlled. A local attacker could exploit this to hang the system, leading\n to a denial of service. (CVE-2010-3448)\n\n It was discovered that KVM did not correctly initialize certain CPU\n registers. A local attacker could exploit this to crash the system, leading\n to a denial of service. (CVE-2010-3698)\n\n Dan Rosenberg discovered that the Linux kernel TIPC implementation\n contained multiple integer signedness errors. A local attacker could\n exploit this to gain root privileges. (CVE-2010-3859)\n\n Thomas Pollet discovered that the RDS network protocol did not\n check certain iovec buffers. A local attacker could exploit this\n to crash the system or possibly execute arbitrary code as the root\n user. (CVE-2010-3865)\n\n Dan Rosenberg discovered that the Linux kernel X.25 implementation\n incorrectly parsed facilities. A remote attacker could exploit this to\n crash the kernel, leading to a denial of service. (CVE-2010-3873)\n\n Dan Rosenberg discovered that the CAN protocol on 64bit systems did not\n correctly calculate the size of certain buffers. A local attacker could\n exploit this to crash the system or possibly execute arbitrary code as\n the root user. (CVE-2010-3874)\n\n Vasiliy Kulikov discovered that the Linux kernel X.25 implementation did\n not correctly clear kernel memory. A local attacker could exploit this to\n read kernel stack memory, leading to a loss of privacy. (CVE-2010-3875)\n\n Vasiliy Kulikov discovered that the Linux kernel sockets implementation did\n not properly initialize certain structures. A local attacker could exploit\n this to read kernel stack memory, leading to a loss of privacy.\n (CVE-2010-3876)\n\n Vasiliy Kulikov discovered that the TIPC interface did not correctly\n initialize certain structures. A local attacker could exploit this to read\n kernel stack memory, leading to a loss of privacy. (CVE-2010-3877)\n\n Nelson Elhage discovered that the Linux kernel IPv4 implementation did not\n properly audit certain bytecodes in netlink messages. A local attacker\n could exploit this to cause the kernel to hang, leading to a denial of\n service. (CVE-2010-3880)\n\n Dan Rosenberg discovered that the USB subsystem did not correctly\n initialize certain structures. A local attacker could exploit this to read ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU9.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.31-307-ec2\", ver:\"2.6.31-307.27\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.31-307-ec2\", ver:\"2.6.31-307.27\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.31-22-386\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.31-22-generic-pae\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.31-22-generic\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.31-22-386\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.31-22-generic-pae\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.31-22-generic\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.31-22-virtual\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-libc-dev\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-ec2-doc\", ver:\"2.6.31-307.27\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-ec2-source-2.6.31\", ver:\"2.6.31-307.27\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.31-307\", ver:\"2.6.31-307.27\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-doc\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.31-22\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-source-2.6.31\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"block-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"char-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"crypto-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fat-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fb-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"firewire-core-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"floppy-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-core-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-secondary-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"input-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"irda-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel-image-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"md-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"message-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mouse-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nfs-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-shared-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-usb-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"parport-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pata-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"plip-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ppp-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"sata-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"scsi-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"serial-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"storage-core-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"usb-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"virtio-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-10-09T15:25:49", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2011-01-11T00:00:00", "type": "openvas", "title": "SuSE Update for kernel SUSE-SA:2011:001", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4163", "CVE-2010-4081", "CVE-2010-3865", "CVE-2010-4073", "CVE-2010-4165", "CVE-2010-4072", "CVE-2010-3437", "CVE-2010-4083", "CVE-2010-4082", "CVE-2010-0435", "CVE-2010-4080", "CVE-2010-4169", "CVE-2010-4158", "CVE-2010-4162", "CVE-2010-4258", "CVE-2010-3442", "CVE-2010-3874", "CVE-2010-4157", "CVE-2010-4347", "CVE-2010-3067", "CVE-2010-4164", "CVE-2010-3432", "CVE-2010-4078", "CVE-2010-4175", "CVE-2010-3861"], "modified": "2019-10-07T00:00:00", "id": "OPENVAS:1361412562310850157", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310850157", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# SuSE Update for kernel SUSE-SA:2011:001\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.850157\");\n script_version(\"2019-10-07T14:34:48+0000\");\n script_tag(name:\"last_modification\", value:\"2019-10-07 14:34:48 +0000 (Mon, 07 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2011-01-11 16:07:49 +0100 (Tue, 11 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name:\"SUSE-SA\", value:\"2011-001\");\n script_cve_id(\"CVE-2010-0435\", \"CVE-2010-3067\", \"CVE-2010-3432\", \"CVE-2010-3437\", \"CVE-2010-3442\", \"CVE-2010-3861\", \"CVE-2010-3865\", \"CVE-2010-3874\", \"CVE-2010-4072\", \"CVE-2010-4073\", \"CVE-2010-4078\", \"CVE-2010-4080\", \"CVE-2010-4081\", \"CVE-2010-4082\", \"CVE-2010-4083\", \"CVE-2010-4157\", \"CVE-2010-4158\", \"CVE-2010-4162\", \"CVE-2010-4163\", \"CVE-2010-4164\", \"CVE-2010-4165\", \"CVE-2010-4169\", \"CVE-2010-4175\", \"CVE-2010-4258\", \"CVE-2010-4347\");\n script_name(\"SuSE Update for kernel SUSE-SA:2011:001\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSE11\\.3\");\n script_tag(name:\"impact\", value:\"local privilege escalation, remote denial of service\");\n script_tag(name:\"affected\", value:\"kernel on openSUSE 11.3\");\n script_tag(name:\"insight\", value:\"The openSUSE 11.3 kernel was updated to fix various bugs and security\n issues.\n\n The following security issues have been fixed:\n CVE-2010-4347: A local user could inject ACPI code into the kernel\n via the world-writable 'custom_debug' file, allowing local privilege\n escalation.\n\n CVE-2010-4258: A local attacker could use a Oops (kernel crash) caused\n by other flaws to write a 0 byte to a attacker controlled address\n in the kernel. This could lead to privilege escalation together with\n other issues.\n\n CVE-2010-4157: A 32bit vs 64bit integer mismatch in gdth_ioctl_alloc\n could lead to memory corruption in the GDTH driver.\n\n CVE-2010-4165: The do_tcp_setsockopt function in net/ipv4/tcp.c\n in the Linux kernel did not properly restrict TCP_MAXSEG (aka MSS)\n values, which allows local users to cause a denial of service (OOPS)\n via a setsockopt call that specifies a small value, leading to a\n divide-by-zero error or incorrect use of a signed integer.\n\n CVE-2010-4164: A remote (or local) attacker communicating over X.25\n could cause a kernel panic by attempting to negotiate malformed\n facilities.\n\n CVE-2010-4175: A local attacker could cause memory overruns in the\n RDS protocol stack, potentially crashing the kernel. So far it is\n considered not to be exploitable.\n\n CVE-2010-4169: Use-after-free vulnerability in mm/mprotect.c in the\n Linux kernel allowed local users to cause a denial of service via\n vectors involving an mprotect system call.\n\n CVE-2010-3874: A minor heap overflow in the CAN network module\n was fixed. Due to nature of the memory allocator it is likely not\n exploitable.\n\n CVE-2010-4158: A memory information leak in Berkeley packet filter\n rules allowed local attackers to read uninitialized memory of the\n kernel stack.\n\n CVE-2010-4162: A local denial of service in the blockdevice layer\n was fixed.\n\n CVE-2010-4163: By submitting certain I/O requests with 0 length,\n a local user could have caused a kernel panic.\n\n CVE-2010-0435: The Hypervisor in KVM 83, when the Intel VT-x extension\n is enabled, allows guest OS users to cause a denial of service\n (NULL pointer dereference and host OS crash) via vectors related to\n instruction emulation.\n\n CVE-2010-3861: The ethtool_get_rxnfc function in net/core/ethtool.c\n in the Linux kernel did not initialize a certain block of heap memory,\n which allowed local users to obtain potentially sensitive information\n via an ETHTOOL_GRXCLSRLALL ethtool command with a large info.rule_cnt\n value.\n\n CVE-2010-3442: Multiple integer overflows in the snd_ctl_ne ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\nres = \"\";\n\nif(release == \"openSUSE11.3\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-base\", rpm:\"kernel-debug-base~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-default-base\", rpm:\"kernel-default-base~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-default-devel\", rpm:\"kernel-default-devel~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-desktop\", rpm:\"kernel-desktop~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-desktop-base\", rpm:\"kernel-desktop-base~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-desktop-devel\", rpm:\"kernel-desktop-devel~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-ec2\", rpm:\"kernel-ec2~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-ec2-base\", rpm:\"kernel-ec2-base~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-ec2-devel\", rpm:\"kernel-ec2-devel~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-ec2-extra\", rpm:\"kernel-ec2-extra~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-pae\", rpm:\"kernel-pae~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-pae-base\", rpm:\"kernel-pae-base~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-pae-devel\", rpm:\"kernel-pae-devel~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-trace\", rpm:\"kernel-trace~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-trace-base\", rpm:\"kernel-trace-base~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-trace-devel\", rpm:\"kernel-trace-devel~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-vanilla\", rpm:\"kernel-vanilla~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-vanilla-base\", rpm:\"kernel-vanilla-base~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-vanilla-devel\", rpm:\"kernel-vanilla-devel~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-vmi\", rpm:\"kernel-vmi~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-vmi-base\", rpm:\"kernel-vmi-base~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-vmi-devel\", rpm:\"kernel-vmi-devel~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-base\", rpm:\"kernel-xen-base~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"preload-kmp-default\", rpm:\"preload-kmp-default~1.1_k2.6.34.7_0.7~19.1.11\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"preload-kmp-desktop\", rpm:\"preload-kmp-desktop~1.1_k2.6.34.7_0.7~19.1.11\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2017-12-04T11:26:45", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1073-1", "cvss3": {}, "published": "2011-02-28T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux, linux-ec2 vulnerabilities USN-1073-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4081", "CVE-2010-3865", "CVE-2010-4165", "CVE-2010-4074", "CVE-2010-4083", "CVE-2010-4082", "CVE-2010-0435", "CVE-2010-3859", "CVE-2010-4080", "CVE-2010-4169", "CVE-2010-3877", "CVE-2010-3875", "CVE-2010-3876", "CVE-2010-3698", "CVE-2010-4248", "CVE-2010-4079", "CVE-2010-3880", "CVE-2010-3874", "CVE-2010-4249", "CVE-2010-4157", "CVE-2010-4160", "CVE-2010-3873", "CVE-2010-3448", "CVE-2010-4078"], "modified": "2017-12-01T00:00:00", "id": "OPENVAS:840592", "href": "http://plugins.openvas.org/nasl.php?oid=840592", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1073_1.nasl 7964 2017-12-01 07:32:11Z santu $\n#\n# Ubuntu Update for linux, linux-ec2 vulnerabilities USN-1073-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Gleb Napatov discovered that KVM did not correctly check certain privileged\n operations. A local attacker with access to a guest kernel could exploit\n this to crash the host system, leading to a denial of service.\n (CVE-2010-0435)\n\n Dan Jacobson discovered that ThinkPad video output was not correctly access\n controlled. A local attacker could exploit this to hang the system, leading\n to a denial of service. (CVE-2010-3448)\n \n It was discovered that KVM did not correctly initialize certain CPU\n registers. A local attacker could exploit this to crash the system, leading\n to a denial of service. (CVE-2010-3698)\n \n Dan Rosenberg discovered that the Linux kernel TIPC implementation\n contained multiple integer signedness errors. A local attacker could\n exploit this to gain root privileges. (CVE-2010-3859)\n \n Thomas Pollet discovered that the RDS network protocol did not\n check certain iovec buffers. A local attacker could exploit this\n to crash the system or possibly execute arbitrary code as the root\n user. (CVE-2010-3865)\n \n Dan Rosenberg discovered that the Linux kernel X.25 implementation\n incorrectly parsed facilities. A remote attacker could exploit this to\n crash the kernel, leading to a denial of service. (CVE-2010-3873)\n \n Dan Rosenberg discovered that the CAN protocol on 64bit systems did not\n correctly calculate the size of certain buffers. A local attacker could\n exploit this to crash the system or possibly execute arbitrary code as\n the root user. (CVE-2010-3874)\n \n Vasiliy Kulikov discovered that the Linux kernel X.25 implementation did\n not correctly clear kernel memory. A local attacker could exploit this to\n read kernel stack memory, leading to a loss of privacy. (CVE-2010-3875)\n \n Vasiliy Kulikov discovered that the Linux kernel sockets implementation did\n not properly initialize certain structures. A local attacker could exploit\n this to read kernel stack memory, leading to a loss of privacy.\n (CVE-2010-3876)\n \n Vasiliy Kulikov discovered that the TIPC interface did not correctly\n initialize certain structures. A local attacker could exploit this to read\n kernel stack memory, leading to a loss of privacy. (CVE-2010-3877)\n \n Nelson Elhage discovered that the Linux kernel IPv4 implementation did not\n properly audit certain bytecodes in netlink messages. A local attacker\n could exploit this to cause the kernel to hang, leading to a denial of\n service. (CVE-2010-3880)\n \n Dan Rosenberg discovered that the USB subsystem did not correctly\n initialize certain structures. A local attacker could exploit this to read ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1073-1\";\ntag_affected = \"linux, linux-ec2 vulnerabilities on Ubuntu 9.10\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1073-1/\");\n script_id(840592);\n script_version(\"$Revision: 7964 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 08:32:11 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-02-28 16:24:14 +0100 (Mon, 28 Feb 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"USN\", value: \"1073-1\");\n script_cve_id(\"CVE-2010-0435\", \"CVE-2010-3448\", \"CVE-2010-3698\", \"CVE-2010-3859\", \"CVE-2010-3865\", \"CVE-2010-3873\", \"CVE-2010-3874\", \"CVE-2010-3875\", \"CVE-2010-3876\", \"CVE-2010-3877\", \"CVE-2010-3880\", \"CVE-2010-4074\", \"CVE-2010-4078\", \"CVE-2010-4079\", \"CVE-2010-4080\", \"CVE-2010-4081\", \"CVE-2010-4082\", \"CVE-2010-4083\", \"CVE-2010-4157\", \"CVE-2010-4160\", \"CVE-2010-4165\", \"CVE-2010-4169\", \"CVE-2010-4248\", \"CVE-2010-4249\");\n script_name(\"Ubuntu Update for linux, linux-ec2 vulnerabilities USN-1073-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU9.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.31-307-ec2\", ver:\"2.6.31-307.27\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.31-307-ec2\", ver:\"2.6.31-307.27\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.31-22-386\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.31-22-generic-pae\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.31-22-generic\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.31-22-386\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.31-22-generic-pae\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.31-22-generic\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.31-22-virtual\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-libc-dev\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-ec2-doc\", ver:\"2.6.31-307.27\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-ec2-source-2.6.31\", ver:\"2.6.31-307.27\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.31-307\", ver:\"2.6.31-307.27\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-doc\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.31-22\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-source-2.6.31\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"block-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"char-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"crypto-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fat-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fb-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"firewire-core-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"floppy-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-core-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-secondary-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"input-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"irda-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel-image-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"md-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"message-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mouse-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nfs-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-shared-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-usb-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"parport-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pata-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"plip-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ppp-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"sata-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"scsi-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"serial-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"storage-core-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"usb-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"virtio-modules-2.6.31-22-generic-di\", ver:\"2.6.31-22.73\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-12-12T11:19:33", "description": "Check for the Version of kernel", "cvss3": {}, "published": "2011-01-11T00:00:00", "type": "openvas", "title": "SuSE Update for kernel SUSE-SA:2011:001", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4163", "CVE-2010-4081", "CVE-2010-3865", "CVE-2010-4073", "CVE-2010-4165", "CVE-2010-4072", "CVE-2010-3437", "CVE-2010-4083", "CVE-2010-4082", "CVE-2010-0435", "CVE-2010-4080", "CVE-2010-4169", "CVE-2010-4158", "CVE-2010-4162", "CVE-2010-4258", "CVE-2010-3442", "CVE-2010-3874", "CVE-2010-4157", "CVE-2010-4347", "CVE-2010-3067", "CVE-2010-4164", "CVE-2010-3432", "CVE-2010-4078", "CVE-2010-4175", "CVE-2010-3861"], "modified": "2017-12-08T00:00:00", "id": "OPENVAS:850157", "href": "http://plugins.openvas.org/nasl.php?oid=850157", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# SuSE Update for kernel SUSE-SA:2011:001\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The openSUSE 11.3 kernel was updated to fix various bugs and security\n issues.\n\n Following security issues have been fixed:\n CVE-2010-4347: A local user could inject ACPI code into the kernel\n via the world-writable "custom_debug" file, allowing local privilege\n escalation.\n\n CVE-2010-4258: A local attacker could use a Oops (kernel crash) caused\n by other flaws to write a 0 byte to a attacker controlled address\n in the kernel. This could lead to privilege escalation together with\n other issues.\n\n CVE-2010-4157: A 32bit vs 64bit integer mismatch in gdth_ioctl_alloc\n could lead to memory corruption in the GDTH driver.\n\n CVE-2010-4165: The do_tcp_setsockopt function in net/ipv4/tcp.c\n in the Linux kernel did not properly restrict TCP_MAXSEG (aka MSS)\n values, which allows local users to cause a denial of service (OOPS)\n via a setsockopt call that specifies a small value, leading to a\n divide-by-zero error or incorrect use of a signed integer.\n\n CVE-2010-4164: A remote (or local) attacker communicating over X.25\n could cause a kernel panic by attempting to negotiate malformed\n facilities.\n\n CVE-2010-4175: A local attacker could cause memory overruns in the\n RDS protocol stack, potentially crashing the kernel. So far it is\n considered not to be exploitable.\n\n CVE-2010-4169: Use-after-free vulnerability in mm/mprotect.c in the\n Linux kernel allowed local users to cause a denial of service via\n vectors involving an mprotect system call.\n\n CVE-2010-3874: A minor heap overflow in the CAN network module\n was fixed. Due to nature of the memory allocator it is likely not\n exploitable.\n\n CVE-2010-4158: A memory information leak in Berkeley packet filter\n rules allowed local attackers to read uninitialized memory of the\n kernel stack.\n\n CVE-2010-4162: A local denial of service in the blockdevice layer\n was fixed.\n\n CVE-2010-4163: By submitting certain I/O requests with 0 length,\n a local user could have caused a kernel panic.\n\n CVE-2010-0435: The Hypervisor in KVM 83, when the Intel VT-x extension\n is enabled, allows guest OS users to cause a denial of service\n (NULL pointer dereference and host OS crash) via vectors related to\n instruction emulation.\n\n CVE-2010-3861: The ethtool_get_rxnfc function in net/core/ethtool.c\n in the Linux kernel did not initialize a certain block of heap memory,\n which allowed local users to obtain potentially sensitive information\n via an ETHTOOL_GRXCLSRLALL ethtool command with a large info.rule_cnt\n value.\n\n CVE-2010-3442: Multiple integer overflows in the snd_ctl_ne ... \n\n Description truncated, for more information please check the Reference URL\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_impact = \"local privilege escalation, remote denial of service\";\ntag_affected = \"kernel on openSUSE 11.3\";\n\n\nif(description)\n{\n script_id(850157);\n script_version(\"$Revision: 8041 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-08 08:28:21 +0100 (Fri, 08 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-11 16:07:49 +0100 (Tue, 11 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"SUSE-SA\", value: \"2011-001\");\n script_cve_id(\"CVE-2010-0435\", \"CVE-2010-3067\", \"CVE-2010-3432\", \"CVE-2010-3437\", \"CVE-2010-3442\", \"CVE-2010-3861\", \"CVE-2010-3865\", \"CVE-2010-3874\", \"CVE-2010-4072\", \"CVE-2010-4073\", \"CVE-2010-4078\", \"CVE-2010-4080\", \"CVE-2010-4081\", \"CVE-2010-4082\", \"CVE-2010-4083\", \"CVE-2010-4157\", \"CVE-2010-4158\", \"CVE-2010-4162\", \"CVE-2010-4163\", \"CVE-2010-4164\", \"CVE-2010-4165\", \"CVE-2010-4169\", \"CVE-2010-4175\", \"CVE-2010-4258\", \"CVE-2010-4347\");\n script_name(\"SuSE Update for kernel SUSE-SA:2011:001\");\n\n script_summary(\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"openSUSE11.3\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-base\", rpm:\"kernel-debug-base~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-default-base\", rpm:\"kernel-default-base~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-default-devel\", rpm:\"kernel-default-devel~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-desktop\", rpm:\"kernel-desktop~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-desktop-base\", rpm:\"kernel-desktop-base~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-desktop-devel\", rpm:\"kernel-desktop-devel~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-ec2\", rpm:\"kernel-ec2~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-ec2-base\", rpm:\"kernel-ec2-base~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-ec2-devel\", rpm:\"kernel-ec2-devel~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-ec2-extra\", rpm:\"kernel-ec2-extra~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-pae\", rpm:\"kernel-pae~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-pae-base\", rpm:\"kernel-pae-base~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-pae-devel\", rpm:\"kernel-pae-devel~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-trace\", rpm:\"kernel-trace~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-trace-base\", rpm:\"kernel-trace-base~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-trace-devel\", rpm:\"kernel-trace-devel~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-vanilla\", rpm:\"kernel-vanilla~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-vanilla-base\", rpm:\"kernel-vanilla-base~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-vanilla-devel\", rpm:\"kernel-vanilla-devel~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-vmi\", rpm:\"kernel-vmi~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-vmi-base\", rpm:\"kernel-vmi-base~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-vmi-devel\", rpm:\"kernel-vmi-devel~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-base\", rpm:\"kernel-xen-base~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.34.7~0.7.1\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"preload-kmp-default\", rpm:\"preload-kmp-default~1.1_k2.6.34.7_0.7~19.1.11\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"preload-kmp-desktop\", rpm:\"preload-kmp-desktop~1.1_k2.6.34.7_0.7~19.1.11\", rls:\"openSUSE11.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:39:42", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1083-1", "cvss3": {}, "published": "2011-03-07T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux-lts-backport-maverick vulnerabilities USN-1083-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-2942", "CVE-2010-3904", "CVE-2010-3078", "CVE-2010-2066", "CVE-2010-3297", "CVE-2010-2248", "CVE-2010-2226", "CVE-2010-4165", "CVE-2010-2960", "CVE-2010-4072", "CVE-2010-2955", "CVE-2010-2946", "CVE-2009-4895", "CVE-2010-3437", "CVE-2010-2521", "CVE-2010-2943", "CVE-2010-0435", "CVE-2010-3477", "CVE-2010-4169", "CVE-2010-3310", "CVE-2010-2963", "CVE-2010-2524", "CVE-2010-3296", "CVE-2010-2478", "CVE-2010-3850", "CVE-2010-3015", "CVE-2010-2495", "CVE-2010-3442", "CVE-2010-3705", "CVE-2010-3848", "CVE-2010-2954", "CVE-2010-4249", "CVE-2010-3858", "CVE-2010-3067", "CVE-2010-2537", "CVE-2010-3084", "CVE-2010-2798", "CVE-2010-2962", "CVE-2010-3080", "CVE-2010-3432", "CVE-2010-3298", "CVE-2010-3849", "CVE-2010-3079", "CVE-2010-2538", "CVE-2010-3861", "CVE-2010-3301"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310840605", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310840605", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1083_1.nasl 14132 2019-03-13 09:25:59Z cfischer $\n#\n# Ubuntu Update for linux-lts-backport-maverick vulnerabilities USN-1083-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-1083-1/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.840605\");\n script_version(\"$Revision: 14132 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 10:25:59 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-03-07 06:45:55 +0100 (Mon, 07 Mar 2011)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"USN\", value:\"1083-1\");\n script_cve_id(\"CVE-2009-4895\", \"CVE-2010-0435\", \"CVE-2010-2066\", \"CVE-2010-2226\", \"CVE-2010-2248\", \"CVE-2010-2478\", \"CVE-2010-2495\", \"CVE-2010-2521\", \"CVE-2010-2524\", \"CVE-2010-2537\", \"CVE-2010-2538\", \"CVE-2010-2798\", \"CVE-2010-2942\", \"CVE-2010-2943\", \"CVE-2010-2946\", \"CVE-2010-2954\", \"CVE-2010-2955\", \"CVE-2010-2960\", \"CVE-2010-2962\", \"CVE-2010-2963\", \"CVE-2010-3015\", \"CVE-2010-3067\", \"CVE-2010-3078\", \"CVE-2010-3079\", \"CVE-2010-3080\", \"CVE-2010-3084\", \"CVE-2010-3296\", \"CVE-2010-3297\", \"CVE-2010-3298\", \"CVE-2010-3301\", \"CVE-2010-3310\", \"CVE-2010-3432\", \"CVE-2010-3437\", \"CVE-2010-3442\", \"CVE-2010-3477\", \"CVE-2010-3705\", \"CVE-2010-3848\", \"CVE-2010-3849\", \"CVE-2010-3850\", \"CVE-2010-3858\", \"CVE-2010-3861\", \"CVE-2010-3904\", \"CVE-2010-4072\", \"CVE-2010-4165\", \"CVE-2010-4169\", \"CVE-2010-4249\");\n script_name(\"Ubuntu Update for linux-lts-backport-maverick vulnerabilities USN-1083-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU10\\.04 LTS\");\n script_tag(name:\"summary\", value:\"Ubuntu Update for Linux kernel vulnerabilities USN-1083-1\");\n script_tag(name:\"affected\", value:\"linux-lts-backport-maverick vulnerabilities on Ubuntu 10.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"Al Viro discovered a race condition in the TTY driver. A local attacker\n could exploit this to crash the system, leading to a denial of service.\n (CVE-2009-4895)\n\n Gleb Napatov discovered that KVM did not correctly check certain privileged\n operations. A local attacker with access to a guest kernel could exploit\n this to crash the host system, leading to a denial of service.\n (CVE-2010-0435)\n\n Dan Rosenberg discovered that the MOVE_EXT ext4 ioctl did not correctly\n check file permissions. A local attacker could overwrite append-only files,\n leading to potential data loss. (CVE-2010-2066)\n\n Dan Rosenberg discovered that the swapexit xfs ioctl did not correctly\n check file permissions. A local attacker could exploit this to read from\n write-only files, leading to a loss of privacy. (CVE-2010-2226)\n\n Suresh Jayaraman discovered that CIFS did not correctly validate certain\n response packats. A remote attacker could send specially crafted traffic\n that would crash the system, leading to a denial of service.\n (CVE-2010-2248)\n\n Ben Hutchings discovered that the ethtool interface did not correctly check\n certain sizes. A local attacker could perform malicious ioctl calls that\n could crash the system, leading to a denial of service. (CVE-2010-2478,\n CVE-2010-3084)\n\n James Chapman discovered that L2TP did not correctly evaluate checksum\n capabilities. If an attacker could make malicious routing changes, they\n could crash the system, leading to a denial of service. (CVE-2010-2495)\n\n Neil Brown discovered that NFSv4 did not correctly check certain write\n requests. A remote attacker could send specially crafted traffic that could\n crash the system or possibly gain root privileges. (CVE-2010-2521)\n\n David Howells discovered that DNS resolution in CIFS could be spoofed. A\n local attacker could exploit this to control DNS replies, leading to a loss\n of privacy and possible privilege escalation. (CVE-2010-2524)\n\n Dan Rosenberg discovered that the btrfs filesystem did not correctly\n validate permissions when using the clone function. A local attacker could\n overwrite the contents of file handles that were opened for append-only, or\n potentially read arbitrary contents, leading to a loss of privacy.\n (CVE-2010-2537, CVE-2010-2538)\n\n Bob Peterson discovered that GFS2 rename operations did not correctly\n validate certain sizes. A local attacker could exploit this to crash the\n system, leading to a denial of service. (CVE-2010-2798)\n\n Eric Dumazet discovered that many network functions could leak kernel stack\n cont ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.35-25-generic-pae\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.35-25-generic\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.35-25-virtual\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.35-25-generic-pae\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.35-25-generic\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.35-25-virtual\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.35-25\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"block-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"block-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"block-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"char-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"char-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"char-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"crypto-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"crypto-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"crypto-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fat-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fat-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fat-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fb-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fb-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fb-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"firewire-core-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"firewire-core-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"firewire-core-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"floppy-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"floppy-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"floppy-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-core-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-core-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-core-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-secondary-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-secondary-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-secondary-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"input-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"input-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"input-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"irda-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"irda-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"irda-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel-image-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel-image-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel-image-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"md-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"md-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"md-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"message-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"message-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"message-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mouse-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mouse-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mouse-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nfs-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nfs-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nfs-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-shared-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-shared-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-shared-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-usb-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-usb-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-usb-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"parport-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"parport-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"parport-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pata-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pata-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pata-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"plip-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"plip-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"plip-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ppp-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ppp-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ppp-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"sata-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"sata-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"sata-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"scsi-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"scsi-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"scsi-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"serial-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"serial-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"serial-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"squashfs-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"squashfs-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"squashfs-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"storage-core-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"storage-core-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"storage-core-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"usb-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"usb-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"usb-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"virtio-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"virtio-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"virtio-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"vlan-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"vlan-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"vlan-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-12-04T11:27:15", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1083-1", "cvss3": {}, "published": "2011-03-07T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux-lts-backport-maverick vulnerabilities USN-1083-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-2942", "CVE-2010-3904", "CVE-2010-3078", "CVE-2010-2066", "CVE-2010-3297", "CVE-2010-2248", "CVE-2010-2226", "CVE-2010-4165", "CVE-2010-2960", "CVE-2010-4072", "CVE-2010-2955", "CVE-2010-2946", "CVE-2009-4895", "CVE-2010-3437", "CVE-2010-2521", "CVE-2010-2943", "CVE-2010-0435", "CVE-2010-3477", "CVE-2010-4169", "CVE-2010-3310", "CVE-2010-2963", "CVE-2010-2524", "CVE-2010-3296", "CVE-2010-2478", "CVE-2010-3850", "CVE-2010-3015", "CVE-2010-2495", "CVE-2010-3442", "CVE-2010-3705", "CVE-2010-3848", "CVE-2010-2954", "CVE-2010-4249", "CVE-2010-3858", "CVE-2010-3067", "CVE-2010-2537", "CVE-2010-3084", "CVE-2010-2798", "CVE-2010-2962", "CVE-2010-3080", "CVE-2010-3432", "CVE-2010-3298", "CVE-2010-3849", "CVE-2010-3079", "CVE-2010-2538", "CVE-2010-3861", "CVE-2010-3301"], "modified": "2017-12-01T00:00:00", "id": "OPENVAS:840605", "href": "http://plugins.openvas.org/nasl.php?oid=840605", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1083_1.nasl 7964 2017-12-01 07:32:11Z santu $\n#\n# Ubuntu Update for linux-lts-backport-maverick vulnerabilities USN-1083-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Al Viro discovered a race condition in the TTY driver. A local attacker\n could exploit this to crash the system, leading to a denial of service.\n (CVE-2009-4895)\n\n Gleb Napatov discovered that KVM did not correctly check certain privileged\n operations. A local attacker with access to a guest kernel could exploit\n this to crash the host system, leading to a denial of service.\n (CVE-2010-0435)\n \n Dan Rosenberg discovered that the MOVE_EXT ext4 ioctl did not correctly\n check file permissions. A local attacker could overwrite append-only files,\n leading to potential data loss. (CVE-2010-2066)\n \n Dan Rosenberg discovered that the swapexit xfs ioctl did not correctly\n check file permissions. A local attacker could exploit this to read from\n write-only files, leading to a loss of privacy. (CVE-2010-2226)\n \n Suresh Jayaraman discovered that CIFS did not correctly validate certain\n response packats. A remote attacker could send specially crafted traffic\n that would crash the system, leading to a denial of service.\n (CVE-2010-2248)\n \n Ben Hutchings discovered that the ethtool interface did not correctly check\n certain sizes. A local attacker could perform malicious ioctl calls that\n could crash the system, leading to a denial of service. (CVE-2010-2478,\n CVE-2010-3084)\n \n James Chapman discovered that L2TP did not correctly evaluate checksum\n capabilities. If an attacker could make malicious routing changes, they\n could crash the system, leading to a denial of service. (CVE-2010-2495)\n \n Neil Brown discovered that NFSv4 did not correctly check certain write\n requests. A remote attacker could send specially crafted traffic that could\n crash the system or possibly gain root privileges. (CVE-2010-2521)\n \n David Howells discovered that DNS resolution in CIFS could be spoofed. A\n local attacker could exploit this to control DNS replies, leading to a loss\n of privacy and possible privilege escalation. (CVE-2010-2524)\n \n Dan Rosenberg discovered that the btrfs filesystem did not correctly\n validate permissions when using the clone function. A local attacker could\n overwrite the contents of file handles that were opened for append-only, or\n potentially read arbitrary contents, leading to a loss of privacy.\n (CVE-2010-2537, CVE-2010-2538)\n \n Bob Peterson discovered that GFS2 rename operations did not correctly\n validate certain sizes. A local attacker could exploit this to crash the\n system, leading to a denial of service. (CVE-2010-2798)\n \n Eric Dumazet discovered that many network functions could leak kernel stack\n cont ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1083-1\";\ntag_affected = \"linux-lts-backport-maverick vulnerabilities on Ubuntu 10.04 LTS\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1083-1/\");\n script_id(840605);\n script_version(\"$Revision: 7964 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 08:32:11 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-03-07 06:45:55 +0100 (Mon, 07 Mar 2011)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"USN\", value: \"1083-1\");\n script_cve_id(\"CVE-2009-4895\", \"CVE-2010-0435\", \"CVE-2010-2066\", \"CVE-2010-2226\", \"CVE-2010-2248\", \"CVE-2010-2478\", \"CVE-2010-2495\", \"CVE-2010-2521\", \"CVE-2010-2524\", \"CVE-2010-2537\", \"CVE-2010-2538\", \"CVE-2010-2798\", \"CVE-2010-2942\", \"CVE-2010-2943\", \"CVE-2010-2946\", \"CVE-2010-2954\", \"CVE-2010-2955\", \"CVE-2010-2960\", \"CVE-2010-2962\", \"CVE-2010-2963\", \"CVE-2010-3015\", \"CVE-2010-3067\", \"CVE-2010-3078\", \"CVE-2010-3079\", \"CVE-2010-3080\", \"CVE-2010-3084\", \"CVE-2010-3296\", \"CVE-2010-3297\", \"CVE-2010-3298\", \"CVE-2010-3301\", \"CVE-2010-3310\", \"CVE-2010-3432\", \"CVE-2010-3437\", \"CVE-2010-3442\", \"CVE-2010-3477\", \"CVE-2010-3705\", \"CVE-2010-3848\", \"CVE-2010-3849\", \"CVE-2010-3850\", \"CVE-2010-3858\", \"CVE-2010-3861\", \"CVE-2010-3904\", \"CVE-2010-4072\", \"CVE-2010-4165\", \"CVE-2010-4169\", \"CVE-2010-4249\");\n script_name(\"Ubuntu Update for linux-lts-backport-maverick vulnerabilities USN-1083-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.35-25-generic-pae\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.35-25-generic\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.35-25-virtual\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.35-25-generic-pae\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.35-25-generic\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-2.6.35-25-virtual\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers-2.6.35-25\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"block-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"block-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"block-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"char-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"char-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"char-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"crypto-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"crypto-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"crypto-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fat-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fat-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fat-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fb-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fb-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fb-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"firewire-core-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"firewire-core-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"firewire-core-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"floppy-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"floppy-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"floppy-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-core-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-core-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-core-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-secondary-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-secondary-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"fs-secondary-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"input-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"input-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"input-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"irda-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"irda-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"irda-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel-image-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel-image-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel-image-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"md-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"md-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"md-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"message-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"message-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"message-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mouse-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mouse-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"mouse-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nfs-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nfs-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nfs-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-pcmcia-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-shared-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-shared-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-shared-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-usb-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-usb-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"nic-usb-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"parport-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"parport-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"parport-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pata-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pata-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pata-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"pcmcia-storage-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"plip-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"plip-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"plip-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ppp-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ppp-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ppp-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"sata-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"sata-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"sata-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"scsi-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"scsi-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"scsi-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"serial-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"serial-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"serial-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"squashfs-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"squashfs-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"squashfs-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"storage-core-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"storage-core-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"storage-core-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"usb-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"usb-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"usb-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"virtio-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"virtio-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"virtio-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"vlan-modules-2.6.35-25-generic-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"vlan-modules-2.6.35-25-generic-pae-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"vlan-modules-2.6.35-25-virtual-di\", ver:\"2.6.35-25.44~lucid1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:35:28", "description": "[kvm-83-224.0.1]\n- Added kvm-add-oracle-workaround-for-libvirt-bug.patch\n- Added kvm-Introduce-oel-machine-type.patch\n[kvm-83-224.el5]\n- kvm-kernel-KVM-x86-zero-kvm_vcpu_events-interrupt.pad.patch [bz#665407]\n- Resolves: bz#665407\n (kvm_vcpu_events.interrupt.pad must be zeroed)\n- CVE: CVE-2010-4525\n[kvm-83-223.el5]\n- Updated kversion to 2.6.18-237.el to match build root\n- Reverting patches for bz#608709 as they are not complete\n - kvm-kernel-Revert-KVM-VMX-Return-0-from-a-failed-VMREAD.patch [bz#608709]\n - kvm-kernel-Revert-KVM-Don-t-spin-on-virt-instruction-faults-dur.patch [bz#608709]\n- bz#608709: reboot(RB_AUTOBOOT) fails if kvm instance is running\n- Related: bz#661117\n[kvm-83-222.el5]\n- kvm-kernel-kvm-change-signed-int-to-unsigned-in-mmu_shrink.patch [bz#661117]\n- Resolves: bz#661117\n ([RHEL5.6 CC] mmu_shrink patch)\n[kvm-83-221.el5]\n- Updated kversion to 2.6.18-236.el to match build root\n- kvm-kernel-KVM-Don-t-spin-on-virt-instruction-faults-during-reb.patch [bz#608709]\n- kvm-kernel-KVM-VMX-Return-0-from-a-failed-VMREAD.patch [bz#608709]\n- Resolves: bz#608709\n (reboot(RB_AUTOBOOT) fails if kvm instance is running)\n[kvm-83-220.el5]\n- Updated kversion to 2.6.18-235.el to match build root\n- kvm-load-registers-after-restoring-pvclock-msrs.patch [bz#655990]\n- Resolves: bz#655990\n (clock drift when migrating a guest between mis-matched CPU clock speed)\n[kvm-83-219.el5]\n- kvm-kernel-KVM-fix-AMD-initial-TSC-offset-problems-additional-f.patch [bz#642659]\n- Resolves: bz#642659\n (TSC offset of virtual machines is not initialized correctly by 'kvm_amd' kernel module.)\n[kvm-83-218.el5]\n- kvm-vnc-fix-key-event-processing.patch [bz#643317]\n- Resolves: bz#643317\n ('sendkey ctrl-alt-delete' dont work via VNC)\n[kvm-83-217.el5]\n- kvm-kernel-fix-null-pointer-dereference.patch [bz#570532]\n- Resolves: bz#570532\n (CVE-2010-0435 kvm: vmx null pointer dereference)\n- CVE: CVE-2010-0435\n[kvm-83-216.el5]\n- Updated kversion to 2.6.18-233.el to match build root\n- kvm-kernel-KVM-fix-AMD-initial-TSC-offset-problems.patch [bz#642659]\n- Resolves: bz#642659\n (TSC offset of virtual machines is not initialized correctly by 'kvm_amd' kernel module.)\n[kvm-83-215.el5]\n- Reverts previous patch (it doesnt build)\n- kvm-kernel-Revert-KVM-fix-AMD-initial-TSC-bugs.patch [bz#642659]\n- Related: bz#642659\n (TSC offset of virtual machines is not initialized correctly by 'kvm_amd' kernel module.)\n[kvm-83-214.el5]\n- kvm-kernel-KVM-fix-AMD-initial-TSC-bugs.patch [bz#642659]\n- Resolves: bz#642659\n (TSC offset of virtual machines is not initialized correctly by 'kvm_amd' kernel module.)\n[kvm-83-213.el5]\n- kvm-No-need-to-iterate-if-we-already-are-over-the-limit.patch [bz#513765 bz#589017]\n- kvm-don-t-care-about-TLB-handling.patch [bz#513765 bz#589017]\n- kvm-Fix-transferred-memory-calculation.patch [bz#513765 bz#589017]\n- kvm-Maintaing-number-of-dirty-pages.patch [bz#513765 bz#589017]\n- kvm-Exit-loop-if-we-have-been-there-too-long.patch [bz#513765 bz#589017]\n- kvm-Change-calculation-to-exit-live-migration.patch [bz#513765 bz#589017]\n- Resolves: bz#513765\n (Large guest ( 256G RAM + 16 vcpu ) hang during live migration)\n- Resolves: bz#589017\n ([rhel5.5] [kvm] dead lock in qemu during off-line migration)\n[kvm-83-212.el5]\n- kvm-implement-dummy-PnP-support.patch [bz#652671]\n- Resolves: bz#652671\n (If VM boot seq. is set up as nc (PXE then disk) the VM is always stuck on trying to PXE boot)\n[kvm-83-211.el5]\n- Dont try build kvmctl\n- Resolves: bz#632707\n[kvm-83-210.el5]\n- Adding load_gs_index to kmod symbol greylist\n- Related: bz#639887\n (CVE-2010-3698 kvm: invalid selector in fs/gs causes kernel panic [rhel-5.6])\n[kvm-83-209.el5]\n- kvm-kernel-KVM-Fix-fs-gs-reload-oops-with-invalid-ldt.patch [bz#639887]\n- Resolves: bz#639887\n (CVE-2010-3698 kvm: invalid selector in fs/gs causes kernel panic [rhel-5.6])\n[kvm-83-208.el5]\n- Updated kversion to 2.6.18-232.el5 to match build root\n- kvm-kernel-KVM-x86-fix-information-leak-to-userland.patch [bz#649929]\n- Resolves: bz#649929\n (CVE-2010-3881 kvm: arch/x86/kvm/x86.c: reading uninitialized stack memory [5.6])\n- kvm-usb-linux-increase-buffer-for-USB-control-requests.patch [bz#627343]\n- kvm-e1000-Fix-TCP-checksum-overflow-with-TSO.patch [bz#648328]\n- kvm-fix-help-string-to-reflect-the-fact-that-cpu-topolog.patch [bz#611785]\n- kvm-VGA-Don-t-register-deprecated-VBE-range.patch [bz#651715]\n- Resolves: bz#611785\n ([RFE] Support cores/sockets/threads topology configuration)\n- Resolves: bz#627343\n (husb: ctrl buffer too small error received for passthrough usb device, fixed upstream)\n- Resolves: bz#648328\n (TCP checksum overflows in qemus e1000 emulation code when TSO is enabled in guest OS)\n- Resolves: bz#651715\n (qemu-kvm aborted when installing the driver for the newly hotplugged rtl8139 nic)\n[kvm-83-207.el5]\n- kvm-Add-drive-readonly-option-to-help-output.patch [bz#645798]\n- Resolves: bz#645798\n (Add drive readonly option to help output)\n[kvm-83-206.el5]\n- Updated kversion to 2.6.18-227.el5 to match build root\n- spec: fix/hack dependencies of kvm-kmod-debug\n- Resolves: bz#643272\n- create qemu user/group on %post\n- Resolves: bz#643525\n[kvm-83-205.el5]\n- Require right gcrypt version\n- Resolves: bz#503118\n- spec: fix the kmod kernel version checking code\n- Resolves: bz#637267\n- spec: fix module dir name on %install\n- Resolves: bz#517565\n- Build kmod-kvm for kernel-debug too\n- Resolves: bz#517565\n[kvm-83-204.el5]\n- kvm-don-t-link-qemu-tools-against-spice-libs.patch [bz#514578]\n- kvm-block-Fix-image-re-open-in-bdrv_commit.patch [bz#640949]\n- Resolves: bz#514578\n (kvm-qemu-img subpackage has dependency on qspice-libs)\n- Resolves: bz#640949\n (Can not commit copy-on-write images data to raw backing-image)\n[kvm-83-203.el5]\n- Updated kversion to 2.6.18-226.el5 to match build root\n- Add pci_get_domain_bus_and_slot to kmod symbol greylist\n- Related: bz#539642\n (use native pci_get_bus_and_slot function)\n[kvm-83-202.el5]\n- kvm-fix-and-on-russian-keymap.patch [bz#580637]\n- Resolves: bz#580637\n (Incorrect russian vnc keymap)\n[kvm-83-201.el5]\n- kvm-kernel-KVM-Fix-reboot-on-Intel-hosts.patch [bz#608709]\n- Resolves: bz#608709\n (reboot(RB_AUTOBOOT) fails if kvm instance is running)\n- kvm-kmod-move-cancel_work_sync-availability-test-to-conf.patch [bz#539642]\n- kvm-kmod-use-native-pci_get_bus_and_slot-if-available.patch [bz#539642]\n- Resolves: bz#539642\n (use native pci_get_bus_and_slot function)\n[kvm-83-200.el5]\n- Updated kversion to 2.6.18-225.el5 to match build root\n- kvm-qemu-fix-unsafe-ring-handling.patch [bz#568817]\n- CVE: CVE-2010-0431\n- Resolves: bz#568817\n (CVE-2010-0431 qemu: Insufficient guest provided pointers validation)\n[kvm-83-199.el5]\n- Updated kversion to 2.6.18-221.el5 to match build root\n- kvm-kernel-KVM-Prevent-kvm_init-from-corrupting-debugfs-structu.patch [bz#619268]\n- Resolves: bz#619268\n (rmmod kvm modules cause host kernel panic)\n[kvm-83-198.el5]\n- run 'make sync' before final ./configure line on build\n- Resolves: bz#632707\n (fix kvm build warnings and enable -Werror)\n[kvm-83-197.el5]\n- Updated kversion to 2.6.18-219.el5 to match build root\n- kvm-kill-bogus-return-ret-on-spawn_thread.patch [bz#632707]\n- kvm-virtio-net-fix-format-strings-on-virtio_net_receive2.patch [bz#632707]\n- kvm-kvmtrace-check-for-ftruncate-errors.patch [bz#632707]\n- Add --enable-werror to ./configure command-line [bz#632707]\n- Add ./configure arguments: --enable-kvm-cap-pit --enable-kvm-cap-device-assignment\n- Remove duplicate --enable-spice arg from ./configure \n- Resolves: bz#632707\n (fix kvm build warnings and enable -Werror)\n[kvm-83-196.el5]\n- Updated kversion to 2.6.18-215.el5 to match build root\n- kvm-introduce-__rhel5-marker-into-the-migration-save-dat.patch [bz#603026]\n- kvm-block-raw-posix-Factor-out-cdrom_probe_device.patch [bz#609472]\n- kvm-raw-posix-Detect-CDROM-via-ioctl-on-linux.patch [bz#609472]\n- kvm-raw-posix-Don-t-use-file-name-for-host_cdrom-detecti.patch [bz#609472]\n- Resolves: bz#603026\n (CPU save version is now 9, but the format is _very_ different from non-RHEL5 version 9)\n- Resolves: bz#609472\n (qemu-kvm misclassifies a /dev/cd*/* disk device as a CD-ROM)\n[kvm-83-195.el5]\n- Updated kversion to 2.6.18-211.el5 to match build root\n- kvm-use-native-cancel_work_sync-function-if-available.patch [bz#629334]\n- Resolves: bz#629334\n (use native cancel_work_sync() function)\n[kvm-83-194.el5]\n- Updated kversion to 2.6.18-212.el5 to match build root\n- kvm-Add-cache-unsafe-parameter-to-drive.patch [bz#623484]\n- kvm-qemu-img-convert-Use-cache-unsafe-for-output-image.patch [bz#623484]\n- kvm-fix-cancel_work_sync-conflict-on-compat-code.patch [bz#629333]\n- kvm-bz-547276-e1000-secrc-support.patch [bz#547276]\n- kvm-Use-native-smp_call_function_single-on-RHEL-5.5.patch [bz#533078]\n- kvm-use-native-smp_call_function_many.patch [bz#533078]\n- kvm-qemu-don-t-strip-qemu-img-and-qemu-io-in-make-instal.patch [bz#606394]\n- Resolves: bz#533078\n (use native smp_call_function_many/single functions)\n- Resolves: bz#547276\n (Vmcore cannot be captured by netdump when RHEL3.9 was installed as guest OS on KVM.)\n- Resolves: bz#606394\n ([kvm] debug-info missing from kvm-qemu-img-83-164.el5_5.12)\n- Resolves: bz#623484\n (KVM: qemu-img convert poor performance ( on NFS storage ))\n- Resolves: bz#629333\n (fix build against kernel-devel-2.6.18-214.el5.x86_64: (cancel_work_sync() conflict))\n[kvm-83-193.el5]\n- kvm-virtio-net-correct-packet-length-checks.patch [bz#606238]\n- kvm-Fix-segfault-in-mmio-subpage-handling-code.patch [bz#619413]\n- Resolves: bz#606238\n (Virtio: Transfer file caused guest in same vlan abnormally quit)\n- Resolves: bz#619413\n (CVE-2010-2784 qemu: insufficient constraints checking in exec.c:subpage_register() [rhel-5.6])\n[kvm-83-192.el5]\n- kvm-Fix-changing-password-using-monitor-over-VNC.patch [bz#569743]\n- kvm-qcow2-Fix-qemu-img-check-segfault-on-corrupted-image.patch [bz#606434]\n- kvm-qcow2-Don-t-try-to-check-tables-that-couldn-t-be-loa.patch [bz#606434]\n- kvm-qemu-img-check-Distinguish-different-kinds-of-errors.patch [bz#606651]\n- kvm-qcow2-Change-check-to-distinguish-error-cases.patch [bz#606651]\n- Resolves: bz#569743\n (Change vnc password caused 'Segmentation fault')\n- Resolves: bz#606434\n ([kvm] segmentation fault when running qemu-img check on faulty image)\n- Resolves: bz#606651\n ([kvm] qemu image check returns cluster errors when using virtIO block (thinly provisioned) during e_no_space events (along with EIO errors))\n[kvm-83-191.el5]\n- kvm-kernel-KVM-MMU-fix-conflict-access-permissions-in-direct-sp.patch [bz#615225]\n- Resolves: bz#615225\n (KVM uses wrong permissions for large guest pages)\n[kvm-83-190.el5]\n- kvm-New-slots-need-dirty-tracking-enabled-when-migrating.patch [bz#567046]\n- Resolves: bz#567046\n (SPICE - race in KVM/Spice would cause migration to fail (slots are not registered properly?))\n[kvm-83-189.el5]\n- kvm-Monitor-Check-for-error-in-do_change.patch [bz#611982]\n- Resolves: bz#611982\n (Monitor doesnt check for 'change' command failure)\n[kvm-83-188.el5]\n- kvm-qcow2-Fix-access-after-end-of-array.patch [bz#605701]\n- kvm-qcow2-Don-t-ignore-immediate-read-write-failures.patch [bz#605701]\n- kvm-qcow2-Return-0-errno-in-write_l2_entries.patch [bz#605701]\n- kvm-qcow2-Fix-error-return-code-in-qcow2_alloc_cluster_l.patch [bz#605701]\n- kvm-qcow2-Return-0-errno-in-write_l1_entry.patch [bz#605701]\n- kvm-qcow2-Return-0-errno-in-l2_allocate.patch [bz#605701]\n- kvm-qcow2-Allow-qcow2_get_cluster_offset-to-return-error.patch [bz#605701]\n- kvm-qcow2-Change-l2_load-to-return-0-errno.patch [bz#605701]\n- kvm-qcow2-Return-right-error-code-in-write_refcount_bloc.patch [bz#605701]\n- kvm-qcow2-Fix-corruption-after-error-in-update_refcount.patch [bz#605701]\n- kvm-qcow2-Clear-L2-table-cache-after-write-error.patch [bz#605701]\n- kvm-qcow2-Fix-error-handling-in-l2_allocate.patch [bz#605701]\n- kvm-qcow2-Restore-L1-entry-on-l2_allocate-failure.patch [bz#605701]\n- kvm-qcow2-Allow-get_refcount-to-return-errors.patch [bz#605701]\n- kvm-qcow2-Allow-alloc_clusters_noref-to-return-errors.patch [bz#605701]\n- kvm-qcow2-Return-real-error-code-in-load_refcount_block.patch [bz#605701]\n- kvm-block-Add-bdrv_-p-write_sync.patch [bz#572825]\n- kvm-qcow2-Use-bdrv_-p-write_sync-for-metadata-writes.patch [bz#572825]\n- Resolves: bz#572825\n (qcow2 image corruption when using cache=writeback)\n- Resolves: bz#605701\n (Backport qcow2 fixes to RHEL 5)\n[kvm-83-187.el5]\n- kvm-Error-checking.patch [bz#587049]\n- kvm-Avoid-thundering-herd-problem.patch [bz#587049]\n- Resolves: bz#587049\n (qemu posix_aio use pthread_cond_signal instead of broadcast to prevent lock storm)\n[kvm-83-186.el5]\n- Updated kversion to 2.6.18-203.el5 to match build root\n- kvm-kernel-KVM-Keep-slot-ID-in-memory-slot-structure.patch [bz#606953]\n- kvm-kernel-KVM-Prevent-internal-slots-from-being-COWed.patch [bz#606953]\n- Resolves: bz#606953\n (fork causes trouble for vcpu threads)\n[kvm-83-185.el5]\n- kvm-turn-off-kvmclock-when-resetting-cpu.patch [bz#588878]\n- kvm-raw-posix-Use-pread-pwrite-instead-of-lseek-read-wri.patch [bz#600375]\n- kvm-block-Cache-total_sectors-to-reduce-bdrv_getlength-c.patch [bz#600375]\n- Resolves: bz#588878\n (Rebooting a kernel with kvmclock enabled, into a kernel with kvmclock disabled, causes random crashes)\n- Resolves: bz#600375\n (Excessive lseek() causes severe performance issues with vm disk images over NFS)\n[kvm-83-184.el5]\n- kvm-virtio-net-truncating-packet.patch [bz#606238]\n- Resolves: bz#606238\n (Virtio: Transfer file caused guest in same vlan abnormally quit)\n[kvm-83-183.el5]\n- kvm-virtio-blk.c-avoid-zero-every-request-structure.patch [bz#598042]\n- kvm-qemu-io-Open-files-read-write-again.patch [bz#601494]\n- Resolves: bz#598042\n (virtio-blk: Avoid zeroing every request structure)\n- Resolves: bz#601494\n (qemu-io: No permission to write image)\n[kvm-83-182.el5]\n- kvm-kernel-KVM-Fix-wallclock-version-writing-race.patch [bz#592021]\n- Resolves: bz#592021\n (race condition in pvclock wallclock calculation)\n- kvm-qcow2-Fix-corruption-after-refblock-allocation.patch [bz#598488]\n- Resolves: bz#598488\n (qcow2 corruption bug in refcount table growth)\n[kvm-83-181.el5]\n- kvm-kernel-KVM-MMU-bail-out-pagewalk-on-kvm_read_guest-error.patch [bz#588251]\n- Resolves: bz#588251\n (kvm spinning updating a guest pte, unkillable)\n- kvm-qemu-img-rebase-Fix-output-image-corruption.patch [bz#587278]\n- kvm-block-Fix-bdrv_commit.patch [bz#587604]\n- Resolves: bz#587278\n (After re-base snapshot, the file in the snapshot disappeared)\n- Resolves: bz#587604\n (Qcow2 snapshot got corruption after commit using block device)\n[kvm-83-180.el5]\n- kvm-qemu-img-open-file-to-be-rebased-with-read-write-per.patch [bz#587605]\n- Resolves: bz#587605\n (Failed to re-base qcow2 snapshot)\n[kvm-83-179.el5]\n- Renumber kvm module patches from 501-625 to 1501-1625\n (so the userspace patch numbers can use slots 501 to 1500)\n- kvm-qcow2-Export-synchronous-qcow_read-write-to-avoid-br.patch [bz#542954]\n- Resolves: bz#542954\n (Guest suffers kernel panic when save snapshot then restart guest)\n[kvm-83-178.el5]\n- Remove bios-nohotplug.bin from package\n- Related: bz#498774\n (QEMU: Too many devices are available for unplug in Windows XP (and we dont support that))\n[kvm-83-177.el5]\n- kvm-Bail-out-when-VCPU_CREATE-fails.patch [bz#587661]\n- Resolves: bz#587661\n (Fix segfault when creating more vcpus than allowed.)\n[kvm-83-176.el5]\n- kvm-Revert-fix-wrong-acpi-mapping-rhel5.x-kvm-userspace.patch [bz#576554]\n - patch causes issues when using Spice without QXL on some guest OSes\n [bz#581758 comment 8]\n- Related: bz#576554\n (Win7/32 stuck on 100% CPU (in testing VDI driver unclassified WHQL tests))\n[kvm-83-175.el5]\n- kvm-kernel-EPT-accessed-bit-emulation-fixed.patch [bz#582038]\n- Resolves: bz#582038\n (backport EPT accessed bit emulation)\n[kvm-83-174.el5]\n- kvm-kernel-Revert-EPT-accessed-bit-emulation.patch [bz#582038]\n (patch fails to build)\n- Related: bz#582038\n (backport EPT accessed bit emulation)\n[kvm-83-173.el5]\n- kvm-kernel-EPT-accessed-bit-emulation.patch [bz#582038]\n- Resolves: bz#582038\n (backport EPT accessed bit emulation)\n[kvm-83-172.el5]\n- kvm-qcow2-Remove-abort-on-free_clusters-failure.patch [bz#583947]\n- Resolves: bz#583947\n (Guest aborted when make guest stop on write error)\n[kvm-83-171.el5]\n- kvm-pcnet-make-subsystem-vendor-id-match-hardware.patch [bz#521247]\n- kvm-read-only-add-RO-feature-macro.patch [bz#510630]\n- kvm-read-only-Pass-the-read-only-attribute-to-the-Guest.patch [bz#510630]\n- kvm-read-only-BDRV_O_FLAGS-changes-default-now-is-read-o.patch [bz#510630]\n- kvm-read-only-qemu-img-Allow-opening-an-image-with-read-.patch [bz#510630]\n- kvm-read-only-Added-readonly-option-to-drive-s-command-l.patch [bz#510630]\n- kvm-read-only-Make-CDROM-a-read-only-drive.patch [bz#510630]\n- kvm-read-only-Disable-fall-back-to-read-only.patch [bz#510630]\n- kvm-read-only-Open-backing-file-read-only-where-possible.patch [bz#510630]\n- kvm-read-only-don-t-rely-on-CDROM-hint-for-read_only-att.patch [bz#510630]\n- kvm-read-only-open-for-read-only-where-possible.patch [bz#510630]\n- kvm-read-only-allow-read-only-CDROM-with-any-interface.patch [bz#510630]\n- Resolves: bz#510630\n (-drive arg has no way to request a read only disk)\n- Resolves: bz#521247\n (emulated pcnet nic in qemu-kvm has wrong PCI subsystem ID for Windows XP driver)\n[kvm-83-170.el5]\n- kvm-fix-wrong-acpi-mapping-rhel5.x-kvm-userspace.patch [bz#576554]\n- Resolves: bz#576554\n (Win7/32 stuck on 100% CPU (in testing VDI driver unclassified WHQL tests))\n[kvm-83-169.el5]\n- kvm-qcow2-Factor-next_refcount_table_size-out.patch [bz#577225]\n- kvm-qcow2-Rewrite-alloc_refcount_block-grow_refcount_tab.patch [bz#577225]\n- kvm-qcow2-More-checks-for-qemu-img-check.patch [bz#577225]\n- Resolves: bz#577225\n (qcow2 corruption with I/O error during refcount block allocation)\n- Added register_kprobe and unregister_kprobe to the ignored ksyms list\n- Resolves: bz#580410\n (Failed to install kvm for failed dependencies: ksym)\n[kvm-83-168.el5]\n- Fix build warnings:\n- kvm-Revert-avoid-leaving-orphaned-swapcache-in-ksm.patch [bz#575585]\n- Related: bz#575585\n (memory reported as used (by SwapCache and by Cache) though no process holds it.)\n- kvm-avoid-leaving-orphaned-swapcache-in-ksm-v2.patch.patch [bz#575585]\n- Resolves: bz#575585\n (memory reported as used (by SwapCache and by Cache) though no process holds it.)\n[kvm-83-167.el5]\n- kvm-avoid-leaving-orphaned-swapcache-in-ksm.patch [bz#575585]\n- Resolves: bz#575585\n (memory reported as used (by SwapCache and by Cache) though no process holds it.)\n[kvm-83-166.el5]\n- kvm-Build-an-additional-bios-without-hotplug-support.patch [bz#498774]\n- Resolves: bz#498774\n (QEMU: Too many devices are available for unplug in Windows XP (and we dont support that))\n[kvm-83-165.el5]\n- Updated kversion to 2.6.18-194.el5 to match build root\n- kvm-kernel-account-only-for-IRQ-injected-into-vcpu0.patch [bz#555727]\n- kvm-kernel-Backport-KVM-fix-irq_source_id-size-verification.patch [bz#520572]\n- kvm-kernel-KVM-x86-disable-paravirt-mmu-reporting.patch [bz#574621]\n- Resolves: bz#520572\n (SR-IOV -- Guest exit and host hang on if boot VM with 8 VFs assigned)\n- Resolves: bz#555727\n (Time drift in win2k3-64bit and win2k8-64bit smp guest)\n- Resolves: bz#574621\n (Linux pvmmu guests (FC11, FC12, etc) crash on boot on AMD hosts with NPT disabled)\n- kvm-kbd-leds-infrastructure.patch [bz#517814]\n- kvm-kbd-leds-ps-2-kbd.patch [bz#517814]\n- kvm-kbd-leds-usb-kbd.patch [bz#517814]\n- kvm-kbd-keds-vnc.patch [bz#517814]\n- Resolves: bz#517814\n (Caps Lock the keys appearance of guest is not synchronous as hosts --view kvm with vnc)", "cvss3": {}, "published": "2011-01-20T00:00:00", "type": "oraclelinux", "title": "kvm security and bug fix update", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2010-3881", "CVE-2010-2784", "CVE-2010-0435", "CVE-2010-4525", "CVE-2010-3698", "CVE-2010-0431"], "modified": "2011-01-20T00:00:00", "id": "ELSA-2011-0028", "href": "http://linux.oracle.com/errata/ELSA-2011-0028.html", "cvss": {"score": 6.6, "vector": "AV:L/AC:M/Au:S/C:C/I:C/A:C"}}], "ubuntucve": [{"lastseen": "2022-08-04T14:36:15", "description": "QEMU-KVM, as used in the Hypervisor (aka rhev-hypervisor) in Red Hat\nEnterprise Virtualization (RHEV) 2.2 and KVM 83, does not properly validate\nguest QXL driver pointers, which allows guest OS users to cause a denial of\nservice (invalid pointer dereference and guest OS crash) or possibly gain\nprivileges via unspecified vectors.", "cvss3": {}, "published": "2010-08-24T00:00:00", "type": "ubuntucve", "title": "CVE-2010-0431", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 2.7, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.6, "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-0431"], "modified": "2010-08-24T00:00:00", "id": "UB:CVE-2010-0431", "href": "https://ubuntu.com/security/CVE-2010-0431", "cvss": {"score": 6.6, "vector": "AV:L/AC:M/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2022-08-04T14:36:14", "description": "The subpage MMIO initialization functionality in the subpage_register\nfunction in exec.c in QEMU-KVM, as used in the Hypervisor (aka\nrhev-hypervisor) in Red Hat Enterprise Virtualization (RHEV) 2.2 and KVM\n83, does not properly select the index for access to the callback array,\nwhich allows guest OS users to cause a denial of service (guest OS crash)\nor possibly gain privileges via unspecified vectors.", "cvss3": {}, "published": "2010-08-24T00:00:00", "type": "ubuntucve", "title": "CVE-2010-2784", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 2.7, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.6, "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-2784"], "modified": "2010-08-24T00:00:00", "id": "UB:CVE-2010-2784", "href": "https://ubuntu.com/security/CVE-2010-2784", "cvss": {"score": 6.6, "vector": "AV:L/AC:M/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2022-08-04T14:36:15", "description": "The Hypervisor (aka rhev-hypervisor) in Red Hat Enterprise Virtualization\n(RHEV) 2.2, and KVM 83, when the Intel VT-x extension is enabled, allows\nguest OS users to cause a denial of service (NULL pointer dereference and\nhost OS crash) via vectors related to instruction emulation.\n\n#### Notes\n\nAuthor| Note \n---|--- \n[kees](<https://launchpad.net/~kees>) | guest can crash host \n[smb](<https://launchpad.net/~smb>) | Looking at the redhat bugzilla it says: \"If emulator is tricked into emulating mov to/from DR instruction it causes NULL pointer dereference on VMX since kvm_x86_ops->(set|get)_dr are not initialized.\" Now before v2.6.36-rc1 KVM has no ops->(set|get)_dr but calls the function directly. So that Oops cannot happen. \n[kees](<https://launchpad.net/~kees>) | but a fix was included for Lucid anyway? \n[smb](<https://launchpad.net/~smb>) | It was by upstream. Now pulled that change back to Hardy and Karmic. I believe the reference in the backport is pointing to upstream commit 020df0794f5764e742feaa718be88b8f1b4ce04f which was part of 2.6.35-rc1\n", "cvss3": {}, "published": "2010-08-24T00:00:00", "type": "ubuntucve", "title": "CVE-2010-0435", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-0435"], "modified": "2010-08-24T00:00:00", "id": "UB:CVE-2010-0435", "href": "https://ubuntu.com/security/CVE-2010-0435", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:S/C:N/I:N/A:C"}}], "veracode": [{"lastseen": "2022-07-27T10:16:27", "description": "kvm is vulnerable to privilege escalation. The vulnerability exists as it was found that QEMU-KVM on the host did not validate all pointers provided from a guest system's QXL graphics card driver. A privileged guest user could use this flaw to cause the host to dereference an invalid pointer, causing the guest to crash (denial of service) or, possibly, resulting in the privileged guest user escalating their privileges on the host.\n", "cvss3": {}, "published": "2020-04-10T00:53:33", "type": "veracode", "title": "Privilege Escalation", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 2.7, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.6, "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-0431"], "modified": "2022-04-19T18:24:32", "id": "VERACODE:24403", "href": "https://sca.analysiscenter.veracode.com/vulnerability-database/security/1/1/sid-24403/summary", "cvss": {"score": 6.6, "vector": "AV:L/AC:M/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2022-07-27T10:16:28", "description": "kvm is vulnerable to privilege escalation. The vulnerability exists as a flaw was found in QEMU-KVM, allowing the guest some control over the index used to access the callback array during sub-page MMIO initialization. A privileged guest user could use this flaw to crash the guest (denial of service) or, possibly, escalate their privileges on the host.\n", "cvss3": {}, "published": "2020-04-10T00:53:33", "type": "veracode", "title": "Privilege Escalation", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 2.7, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.6, "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-2784"], "modified": "2022-04-19T18:25:11", "id": "VERACODE:24405", "href": "https://sca.analysiscenter.veracode.com/vulnerability-database/security/1/1/sid-24405/summary", "cvss": {"score": 6.6, "vector": "AV:L/AC:M/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2022-07-27T10:34:07", "description": "kvm is vulnerable to denial of service (DoS). The vulnerability exists as a NULL pointer dereference flaw was found when the host system had a processor with the Intel VT-x extension enabled. A privileged guest user could use this flaw to trick the host into emulating a certain instruction.\n", "cvss3": {}, "published": "2020-04-10T00:53:33", "type": "veracode", "title": "Denial Of Service (DoS)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-0435"], "modified": "2022-04-19T18:31:48", "id": "VERACODE:24404", "href": "https://sca.analysiscenter.veracode.com/vulnerability-database/security/1/1/sid-24404/summary", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:S/C:N/I:N/A:C"}}], "cve": [{"lastseen": "2022-03-23T11:35:48", "description": "QEMU-KVM, as used in the Hypervisor (aka rhev-hypervisor) in Red Hat Enterprise Virtualization (RHEV) 2.2 and KVM 83, does not properly validate guest QXL driver pointers, which allows guest OS users to cause a denial of service (invalid pointer dereference and guest OS crash) or possibly gain privileges via unspecified vectors.", "cvss3": {}, "published": "2010-08-24T18:00:00", "type": "cve", "title": "CVE-2010-0431", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 2.7, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.6, "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-0431"], "modified": "2010-08-25T04:00:00", "cpe": ["cpe:/a:redhat:enterprise_virtualization:2.2", "cpe:/a:redhat:kvm:83"], "id": "CVE-2010-0431", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0431", "cvss": {"score": 6.6, "vector": "AV:L/AC:M/Au:S/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:redhat:kvm:83:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T12:18:54", "description": "The subpage MMIO initialization functionality in the subpage_register function in exec.c in QEMU-KVM, as used in the Hypervisor (aka rhev-hypervisor) in Red Hat Enterprise Virtualization (RHEV) 2.2 and KVM 83, does not properly select the index for access to the callback array, which allows guest OS users to cause a denial of service (guest OS crash) or possibly gain privileges via unspecified vectors.", "cvss3": {}, "published": "2010-08-24T18:00:00", "type": "cve", "title": "CVE-2010-2784", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 2.7, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.6, "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-2784"], "modified": "2010-08-25T04:00:00", "cpe": ["cpe:/a:redhat:enterprise_virtualization:2.2", "cpe:/a:redhat:kvm:83"], "id": "CVE-2010-2784", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2784", "cvss": {"score": 6.6, "vector": "AV:L/AC:M/Au:S/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:redhat:kvm:83:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:35:53", "description": "The Hypervisor (aka rhev-hypervisor) in Red Hat Enterprise Virtualization (RHEV) 2.2, and KVM 83, when the Intel VT-x extension is enabled, allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via vectors related to instruction emulation.", "cvss3": {}, "published": "2010-08-24T18:00:00", "type": "cve", "title": "CVE-2010-0435", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-0435"], "modified": "2011-01-19T06:54:00", "cpe": ["cpe:/a:redhat:enterprise_virtualization:2.2", "cpe:/a:redhat:kvm:83"], "id": "CVE-2010-0435", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0435", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:S/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:a:redhat:kvm:83:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*"]}], "seebug": [{"lastseen": "2017-11-19T18:08:49", "description": "BUGTRAQ ID: 42582\r\nCVE ID: CVE-2010-0435\r\n\r\nLinux Kernel\u662f\u5f00\u653e\u6e90\u7801\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\n\u4e3b\u673a\u7cfb\u7edf\u4e0a\u7684\u5904\u7406\u5668\u542f\u7528\u4e86Intel VT-x\u6269\u5c55\u65f6\u5b58\u5728\u7a7a\u6307\u9488\u5f15\u7528\u6f0f\u6d1e\u3002\u5982\u679c\u6a21\u62df\u5668\u53d7\u9a97\u6a21\u62df\u4e86mov to/from DR\u6307\u4ee4\uff0c\u7531\u4e8e\u6ca1\u6709\u521d\u59cb\u5316kvm_x86_ops->(set|get)_dr\uff0c\u53ef\u80fd\u4f1a\u89e6\u53d1\u8fd9\u4e2a\u7a7a\u6307\u9488\u5f15\u7528\uff0c\u5bfc\u81f4\u4e3b\u673a\u5d29\u6e83\u3002\n\nLinux kernel 2.6.x\n\u5382\u5546\u8865\u4e01\uff1a\r\n\r\nLinux\r\n-----\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\nhttps://patchwork.kernel.org/patch/95725/\r\n\r\nRedHat\r\n------\r\nRedHat\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08RHSA-2010:0627-01\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\nRHSA-2010:0627-01\uff1aImportant: kvm security and bug fix update\r\n\u94fe\u63a5\uff1ahttps://www.redhat.com/support/errata/RHSA-2010-0627.html", "cvss3": {}, "published": "2010-08-24T00:00:00", "type": "seebug", "title": "Linux kernel 2.6.x KVM Intel VT-x\u6269\u5c55\u7a7a\u6307\u9488\u5f15\u7528\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2010-0435"], "modified": "2010-08-24T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-20059", "id": "SSV:20059", "sourceData": "", "sourceHref": "", "cvss": {"score": 4.6, "vector": "AV:LOCAL/AC:LOW/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:COMPLETE/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:38", "description": "===========================================================\r\nUbuntu Security Notice USN-1054-1 February 01, 2011\r\nlinux, linux-ec2 vulnerabilities\r\nCVE-2010-0435, CVE-2010-4165, CVE-2010-4169, CVE-2010-4249\r\n===========================================================\r\n\r\nA security issue affects the following Ubuntu releases:\r\n\r\nUbuntu 10.04 LTS\r\nUbuntu 10.10\r\n\r\nThis advisory also applies to the corresponding versions of\r\nKubuntu, Edubuntu, and Xubuntu.\r\n\r\nThe problem can be corrected by upgrading your system to the\r\nfollowing package versions:\r\n\r\nUbuntu 10.04 LTS:\r\n linux-image-2.6.32-28-386 2.6.32-28.55\r\n linux-image-2.6.32-28-generic 2.6.32-28.55\r\n linux-image-2.6.32-28-generic-pae 2.6.32-28.55\r\n linux-image-2.6.32-28-ia64 2.6.32-28.55\r\n linux-image-2.6.32-28-lpia 2.6.32-28.55\r\n linux-image-2.6.32-28-powerpc 2.6.32-28.55\r\n linux-image-2.6.32-28-powerpc-smp 2.6.32-28.55\r\n linux-image-2.6.32-28-powerpc64-smp 2.6.32-28.55\r\n linux-image-2.6.32-28-preempt 2.6.32-28.55\r\n linux-image-2.6.32-28-server 2.6.32-28.55\r\n linux-image-2.6.32-28-sparc64 2.6.32-28.55\r\n linux-image-2.6.32-28-sparc64-smp 2.6.32-28.55\r\n linux-image-2.6.32-28-versatile 2.6.32-28.55\r\n linux-image-2.6.32-28-virtual 2.6.32-28.55\r\n linux-image-2.6.32-312-ec2 2.6.32-312.24\r\n\r\nUbuntu 10.10:\r\n linux-image-2.6.35-25-generic 2.6.35-25.44\r\n linux-image-2.6.35-25-generic-pae 2.6.35-25.44\r\n linux-image-2.6.35-25-omap 2.6.35-25.44\r\n linux-image-2.6.35-25-powerpc 2.6.35-25.44\r\n linux-image-2.6.35-25-powerpc-smp 2.6.35-25.44\r\n linux-image-2.6.35-25-powerpc64-smp 2.6.35-25.44\r\n linux-image-2.6.35-25-server 2.6.35-25.44\r\n linux-image-2.6.35-25-versatile 2.6.35-25.44\r\n linux-image-2.6.35-25-virtual 2.6.35-25.44\r\n\r\nAfter a standard system update you need to reboot your computer to make\r\nall the necessary changes.\r\n\r\nATTENTION: Due to an unavoidable ABI change the kernel updates have\r\nbeen given a new version number, which requires you to recompile and\r\nreinstall all third party kernel modules you might have installed. If\r\nyou use linux-restricted-modules, you have to update that package as\r\nwell to get modules which work with the new kernel version. Unless you\r\nmanually uninstalled the standard kernel metapackages (e.g. linux-generic,\r\nlinux-server, linux-powerpc), a standard system upgrade will automatically\r\nperform this as well.\r\n\r\nDetails follow:\r\n\r\nGleb Napatov discovered that KVM did not correctly check certain\r\nprivileged operations. A local attacker with access to a guest kernel\r\ncould exploit this to crash the host system, leading to a denial of\r\nservice. (CVE-2010-0435)\r\n\r\nSteve Chen discovered that setsockopt did not correctly check MSS values.\r\nA local attacker could make a specially crafted socket call to crash\r\nthe system, leading to a denial of service. (CVE-2010-4165)\r\n\r\nDave Jones discovered that the mprotect system call did not correctly\r\nhandle merged VMAs. A local attacker could exploit this to crash the\r\nsystem, leading to a denial of service. (CVE-2010-4169)\r\n\r\nVegard Nossum discovered that memory garbage collection was not\r\nhandled correctly for active sockets. A local attacker could exploit\r\nthis to allocate all available kernel memory, leading to a denial of\r\nservice. (CVE-2010-4249)\r\n\r\n\r\nUpdated packages for Ubuntu 10.04 LTS:\r\n\r\n Source archives:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2_2.6.32-312.24.diff.gz\r\n Size/MD5: 8987000 0a15b6ffeb6b82dac8f0d2183b54e89c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2_2.6.32-312.24.dsc\r\n Size/MD5: 2104 ca9acfb9f4de054200495ef9d1b3ef49\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2_2.6.32.orig.tar.gz\r\n Size/MD5: 81900940 4b1f6f6fac43a23e783079db589fc7e2\r\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.32-28.55.diff.gz\r\n Size/MD5: 5092730 21cd0005957f842db1436b15abe9f3c9\r\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.32-28.55.dsc\r\n Size/MD5: 6170 aaac9600e6505f190e5ed84878944f39\r\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.32.orig.tar.gz\r\n Size/MD5: 81900940 4b1f6f6fac43a23e783079db589fc7e2\r\n\r\n Architecture independent packages:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2-doc_2.6.32-312.24_all.deb\r\n Size/MD5: 6428564 70d78e605dadc4550049757f3614cf68\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2-source-2.6.32_2.6.32-312.24_all.deb\r\n Size/MD5: 68173994 daa81e56618a4614ec21e7b63f04f8df\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-headers-2.6.32-312_2.6.32-312.24_all.deb\r\n Size/MD5: 10041174 10f1977974ad2f16af47a1217a30d6ed\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc_2.6.32-28.55_all.deb\r\n Size/MD5: 6427956 d982d2c5ce63ccded71920ae7513cc46\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.32-28_2.6.32-28.55_all.deb\r\n Size/MD5: 9906550 3b56c8b331171d4b83ab8b656c484def\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.32_2.6.32-28.55_all.deb\r\n Size/MD5: 65913962 6ee2688fda012f8b5e6973323557d293\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-tools-common_2.6.32-28.55_all.deb\r\n Size/MD5: 95494 44349b757e03fbe7c05d07f4640d96ad\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-headers-2.6.32-312-ec2_2.6.32-312.24_amd64.deb\r\n Size/MD5: 679760 b4b316d698383105533a1e461f179ba0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-image-2.6.32-312-ec2_2.6.32-312.24_amd64.deb\r\n Size/MD5: 19885308 f3d13d705228acb376517e33460a45ee\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 245258 c083dd83bddd7b32cead685e55e30c40\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/char-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 16458 a1ce222b8d7daa8d2cbfd17b54d93893\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 50472 f7b0a06026066d79e8deec7f3f96f7b6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 46202 a2cf9d3b9c4c54198947f02973528cfb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 52040 6435d1cdb82e2c6a7b6b83f50e924ceb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 94730 a3470bfa69fc0d70e71929c59b5167ca\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 38660 22199c692bf834dfe380c590f5cd9ebb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 540068 5e81f8f5cff4a66c2bda997acbc34bee\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 133654 b04f521c9e777d3f841c4be0638e10ff\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 100832 d7255cc68e246cfd7bfbac5b1b3c9eb8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 324100 dc8327d54937770913b719cc5f7898e1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 4465316 2df537d769387fb9a81e8afa874ef75b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.32-28-generic_2.6.32-28.55_amd64.deb\r\n Size/MD5: 793008 e804e2beda47bf14b253ce2944a279e9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.32-28-preempt_2.6.32-28.55_amd64.deb\r\n Size/MD5: 793264 c6d3defbab41cdb2181c2cbf45ba29ef\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.32-28-server_2.6.32-28.55_amd64.deb\r\n Size/MD5: 794480 f1dd0ae306f67232cce4d47939b21446\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.32-28-generic_2.6.32-28.55_amd64.deb\r\n Size/MD5: 31695638 d627f41ffb23a536b510afa0550e0387\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.32-28-preempt_2.6.32-28.55_amd64.deb\r\n Size/MD5: 31931030 22f8a7860dccb3c7ece51f0e5a1399a3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.32-28-server_2.6.32-28.55_amd64.deb\r\n Size/MD5: 31734548 706ea2e435894f0493109f2055727c13\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.32-28-virtual_2.6.32-28.55_amd64.deb\r\n Size/MD5: 12527482 22758db62368bf9472d5d90db6663959\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.32-28.55_amd64.deb\r\n Size/MD5: 824952 3e9ca9c36b6c30d58c3b8d7154e4f3fa\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-tools-2.6.32-28_2.6.32-28.55_amd64.deb\r\n Size/MD5: 223304 0a470b1a742bd0c520cfe0b1848c3d99\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 177468 6e4ad0743df66dcf10341e0761ca0f5c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 266802 2d26713ac7de30d426c2908600e30ce0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 32452 f247dff43b2112bbdd5f29b303a9ce47\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 331554 0cb913c385dbd7c9f7e2d6d56fbb3cea\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 2426230 d4052d2f5992bc976fafa3b42f38e629\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 163666 6254f15ed7627aced11faf56d05f3391\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 246072 63afda04d6f0609cc4146cc0567fdeae\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 180524 e431eecca625608d3112d8cff011c7f8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 39260 d8f6a0fae18293acb5f62dc137186d30\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 152456 f9b89b24af9aed006d6e3828e5c309a6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 77346 31ce85a50b5050bea61e305836dece36\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 22998 c94b6e6de6edf21c82740d80eef2f375\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 9742 b9752514f105a5f7c1b9eb43acb3d39e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 40876 1727693357d159f89404a22f5c158fbb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 104254 55cbd73ff31fd0e02ef847224274dac2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 1476204 8d6652b714065978f5d20bed3dfac8a8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 40994 5994806be048cda7b8aad7d792c1b970\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/squashfs-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 15420 d3d8b006c20a1c4290aa379b9e2e5e63\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 53130 84d8e16b51ab348d760d54a5d87f187d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 134520 921c3a9b6001ecaa47ca8cd90a01be5f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 16734 d03d746bd167dd5e3d8e813bc33c566b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/vlan-modules-2.6.32-28-generic-di_2.6.32-28.55_amd64.udeb\r\n Size/MD5: 22378 6c19fd323e09df5529b89346bb6818a6\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-headers-2.6.32-312-ec2_2.6.32-312.24_i386.deb\r\n Size/MD5: 655420 6f114ad32812e1dde95f188a3d153415\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-image-2.6.32-312-ec2_2.6.32-312.24_i386.deb\r\n Size/MD5: 19224436 25485d5f3bf1f87bbbdbda35f8bb9e36\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 207174 3103b7a465f8c50d94703e3431a07180\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 212536 d48370a99bec30a5aead214221ef3c56\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/char-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 34258 77e35784ade960740baaa336af1cf830\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/char-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 34566 8c6b25529baaf6e8e1fb2d586dbdc5cb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 48016 1eb5029ec3b567882cf52890a8fc2d5b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 48040 0a8ab3b760654e07a5a8d17de0647f02\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 43650 6fb7771de1c004cc47b89390374bba3c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 43656 fc2b8fb4e6e9b7709e37a5fb91821022\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 47832 756628bee5dfdc44672626f035128704\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 47882 331ee5afc0f980390ea9be739d8b009e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 90450 f76996473d3e8deb77b94a8738cfe396\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 90742 b8435994a1edabe689ad536ed65e66b9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 34642 83a448394d1c7a8a075a7d92d75bc2d9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 34694 89108134cff8ec1c21646a8cb3ea4731\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 535824 5c8c5a7973b10e4d89d6f76a56d8f22f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 535684 362d6466a13f88b7ea06d7cc288407bf\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 130860 bba69d3fd672406b07c51fcb36eec98f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 130864 64132cdd8b0cccf0747c085e462f0c81\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 91624 bcbe8c8d98d48410527533f3007a234f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 91686 f20edaefcf78de1acb42bc7dfc73dd3d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 305264 65d2f2b8130265389f4b1cadc06026ba\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 306270 0cc555fbd5fedafcf8604433b2940f8d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 4313792 4b1a5efbefe4b32e93e992484016f0bb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 4443756 18e9623a1a15c76256786ed2ee0581ca\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.32-28-386_2.6.32-28.55_i386.deb\r\n Size/MD5: 763818 10988467352dd82b5b70556fcdadcdd0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.32-28-generic-pae_2.6.32-28.55_i386.deb\r\n Size/MD5: 765720 1a3a3aa15834a9e78f9949a543988d6b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.32-28-generic_2.6.32-28.55_i386.deb\r\n Size/MD5: 764418 327887ed989e7d8eb60fc57705da7008\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.32-28-386_2.6.32-28.55_i386.deb\r\n Size/MD5: 31494606 2886b2a9dfc41789f139ffd9973ec15f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.32-28-generic-pae_2.6.32-28.55_i386.deb\r\n Size/MD5: 31608926 f6a9140fb2565b60b8d1962fedf5ad84\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.32-28-generic_2.6.32-28.55_i386.deb\r\n Size/MD5: 31536668 06327237124811828ea41d4ca15fef0f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.32-28-virtual_2.6.32-28.55_i386.deb\r\n Size/MD5: 12014576 c0e3196e9a6b98905f5251aa7189e2ee\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.32-28.55_i386.deb\r\n Size/MD5: 806034 5545c31f13cf057f5c22246c4aaa2de5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-tools-2.6.32-28_2.6.32-28.55_i386.deb\r\n Size/MD5: 215178 27b72f4f18ce22a7559059b37236d875\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 183210 abad66e8631784da80387710d3189aae\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 183396 6f055ed524c2419ea243657070f1aa4b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 249680 5797f6bcb011f94015aabdd943d8a4ce\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 252340 25efde9649f6a0d27b926872c9d5ba69\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 33838 2fd0dde45b528f7da8848cb314c529cc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 33860 1778f8b3795cc28c3d2dae93bc5589bb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 310430 4c7c842a43d38f826a811d3b439aa84f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 310482 a17033c679f451a5fa0383c9e6194257\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 2535012 9432d2858d8049e8f804cc5d1f437a3e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 2553322 1725a4123cf8b56d168914463fd47e62\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 147202 7804fc9392a0f38bba1a0c4849da9c4f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 147312 8ef5b6368178d25724f383e3b7fe332d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 228920 8ea36133d511f9e88ee07509727a3d25\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 228964 f4bdfd55c2df44e74c8830c8890a13f0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 166082 c4697ef917da52d222e61640b21bda03\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 166166 5ee5e7262f065f4a865ce8393a3eed18\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 36360 853a79509ca9c3df4957313d57b5cb87\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 36492 1f05408305302143a8fb5e9670c06221\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 157022 78d5bbc417dbc3cbb0fdc4c89a745c91\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 157272 17c43c4b62744f6e58cfe8ba0d18e885\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 90196 efe5beb504e05584f1caaab752b24b5e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 91094 4db5778b11f957deffeb23b9ea3153aa\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 48108 e3f8f401b0d65d692e53fee967c08285\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 48158 697e8e6d02eaf492fbeb5064a33812ef\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 9106 907bf6c225b443455497de45a26a1ba3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 9116 357727982d8deb8c24dd34b18eb9382a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 37460 afe07d04eee785d0ae4650662e4f2d1c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 37468 ce9c6eafb690e6b7667d0b258ac0e705\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 94002 566753f8bc1215e570cc1626d0a2e891\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 94598 5fb38544dad0535f5b1a3d268d4f7897\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 1584132 9656a768ccb23cc4d6618183e6c8e3bc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 1535710 2a02e22d340adc80f8e90bdcd2deb282\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 37970 2c9616b89eaed2578830cf60f10f09ef\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 37976 aab753d35004d56903e34227c8fa8829\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/squashfs-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 15568 c774cee308abec787ba383e28f36fb85\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/squashfs-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 15566 1b439d6a6a19fe89053053144174a123\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 50070 5369cf31c9b435f3de2a33037125d9de\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 50104 179ccc7329ece83cfd58b4781605de87\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 123834 1364b73c03759e76eddb05a73c83987f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 124258 cac3e1816d3d0a197272c50c18358208\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 15520 43a53ed3b87e1480e00e8b3f44fc9c9b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 5702 333ef371c00df5d80d7094f4c387575b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/vlan-modules-2.6.32-28-generic-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 20766 180cea9380b3d4f233d6e7c691edf721\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/vlan-modules-2.6.32-28-generic-pae-di_2.6.32-28.55_i386.udeb\r\n Size/MD5: 20788 8cc8f03ba601fe2b861fc15d6c6c11ae\r\n\r\n armel architecture (ARM Architecture):\r\n\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.32-28-versatile-di_2.6.32-28.55_armel.udeb\r\n Size/MD5: 129346 35c10010fc262c708eea3bbe3a6ab8bc\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.32-28-versatile-di_2.6.32-28.55_armel.udeb\r\n Size/MD5: 43446 c6b502028dbeee9d5e9c10fc6054b673\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.32-28-versatile-di_2.6.32-28.55_armel.udeb\r\n Size/MD5: 87662 55fe7d574a06938e061606cb0205d03d\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.32-28-versatile-di_2.6.32-28.55_armel.udeb\r\n Size/MD5: 91778 1030a2f5a3f2c4b87a8d4c9a874aa62e\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.32-28-versatile-di_2.6.32-28.55_armel.udeb\r\n Size/MD5: 3196298 7d3ce0be68e7140a815d09a433bc0b5e\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.32-28-versatile_2.6.32-28.55_armel.deb\r\n Size/MD5: 741512 8d23e2f5694479d9e3a15c9619c3191e\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.32-28-versatile_2.6.32-28.55_armel.deb\r\n Size/MD5: 20172262 c5e30641489b10f1b2500bd0022daf44\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.32-28.55_armel.deb\r\n Size/MD5: 802482 38ab178808f434667414b220b306241c\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.32-28-versatile-di_2.6.32-28.55_armel.udeb\r\n Size/MD5: 166298 cccb578ce226580abee5beb39a51e4f8\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.32-28-versatile-di_2.6.32-28.55_armel.udeb\r\n Size/MD5: 279278 ee994a0d3442c558a3c9bd32582e36f1\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.32-28-versatile-di_2.6.32-28.55_armel.udeb\r\n Size/MD5: 448026 172ddd3c15e6f10e49d6f79a2f75b302\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.32-28-versatile-di_2.6.32-28.55_armel.udeb\r\n Size/MD5: 226740 cb584a1931a6cd12fdb74dae3ad96e42\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.32-28-versatile-di_2.6.32-28.55_armel.udeb\r\n Size/MD5: 95490 1f28369ec8c963a47a596e9dccf66aac\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.32-28-versatile-di_2.6.32-28.55_armel.udeb\r\n Size/MD5: 38076 c16d0e283f79fee75e6226f2566e4a79\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.32-28-versatile-di_2.6.32-28.55_armel.udeb\r\n Size/MD5: 94522 7cd6adf1fdf3ad3d8c97816917a0639c\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.32-28-versatile-di_2.6.32-28.55_armel.udeb\r\n Size/MD5: 55152 652835261e10c020a6bbda613511dfce\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/squashfs-modules-2.6.32-28-versatile-di_2.6.32-28.55_armel.udeb\r\n Size/MD5: 14858 8f1947ff1325de7a1200e69fe3c99be1\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.32-28-versatile-di_2.6.32-28.55_armel.udeb\r\n Size/MD5: 209762 6ccb2d5dabceacf2be3a7a212db883f7\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/vlan-modules-2.6.32-28-versatile-di_2.6.32-28.55_armel.udeb\r\n Size/MD5: 21174 4653164f36f71f6a20fbc206c7914a70\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 340846 342574e72d46b43872631956a81ca060\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 281656 c99b2354371cdcfc49fdb9c53734bc36\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 60554 1ce39f363e9ecce3d7e3d0254abe1637\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 68706 16f4f4cc060e4e5e2648268db9475d62\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 48400 64c4c045f943fead31da3ccc9cf0312a\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 53146 ad4abfba83c9a356a84334c59013e807\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 96776 e90ba316de8885d7affd4f6924b579ae\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 109866 de29990d7e1c419586a2ed084580871c\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 41006 ea971cd9ee3ca9a57da748d05aa377c8\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 40386 e7c8b8ca459102c2519e8fd36ba22d19\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 598886 66a9062da78076213478dbb48d46bb35\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 632294 2f1614fe89875141759e4dbce0d7c5fb\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 155072 66d992a0e87516a6dee229a4b6bd3e36\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 150520 7d8c7e07a13e314f95cec5335aef84df\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 106246 5db80f4ed7a0652812b63873c015d91a\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 110212 070d3168ec87a50857420bb3dcdd1091\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 418886 e9776b46a5a75bfa663a188d6b79835d\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 355156 db90edb0acbe01b09ee22e301d9c951b\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 4229924 e49fb4d704bf43b8fff4d94cd2ae590e\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 5630772 324e9369c69b8e50f313d37b2f9cf322\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.32-28-powerpc-smp_2.6.32-28.55_powerpc.deb\r\n Size/MD5: 868540 12522a095b75935adaf65598194aab3c\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.32-28-powerpc64-smp_2.6.32-28.55_powerpc.deb\r\n Size/MD5: 887460 b54d8677f133c7e4fc85c46c7abef141\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.32-28-powerpc_2.6.32-28.55_powerpc.deb\r\n Size/MD5: 867694 fbe0135e203b03bbeaa371b9a93486e5\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.32-28-powerpc-smp_2.6.32-28.55_powerpc.deb\r\n Size/MD5: 27774850 85c258300c559a231032205f8d6ff7e4\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.32-28-powerpc64-smp_2.6.32-28.55_powerpc.deb\r\n Size/MD5: 28644060 47b235820f65be01f49e64d1b4c826d3\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.32-28-powerpc_2.6.32-28.55_powerpc.deb\r\n Size/MD5: 27536364 7c20fe67a17ca7eae72513d6bda029cb\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.32-28.55_powerpc.deb\r\n Size/MD5: 795302 2f19543e98ff628f4a03b3a72a80de15\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-tools-2.6.32-28_2.6.32-28.55_powerpc.deb\r\n Size/MD5: 231226 88d0091f363824a2e3543302d69988d6\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 244072 6ec3a9d46a8a7564b1b8b45542cd1d2f\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 257302 a9761720921c0c2f1568d971b0ab5cd5\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 221440 0569cb7844b6dac3d02e3a56a7555218\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 224134 b8010f57845a15142abe5558f9588a8a\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 31958 960bb13862d34f1dbbdaff9189b2e1c3\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 36482 cb4a4c845854325dc1ee952040b9c502\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 344026 227c274ffd2b3ab45bb55e8212a6efe3\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 385876 491cd4781b1780f74f9b163b6bf8b381\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 2174716 c2f6622c80d217bc25ba69bec5a7592b\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 2375316 0cd719dd702c2e7d91926701025a5ebe\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 222990 dbaebe110a46b3730a10fff26b25a618\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 217320 e2279d6c0791f136abafae6fa7f2ba44\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 260286 3841b8d30f7dec108c4c293d10d6161e\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 296370 bc115d10a5adb53956c3181b656548ef\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 132040 f31ef813def1c2e4cbdbee894bd3ca02\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 154928 ea6e2dac7854e0d4241b8cb9960ed197\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 50984 ba834ca89e2896542d1c82e65849b57d\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 45510 ee4bf7627276d2d217916065904a210f\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 108056 5b219598d1907932cc09af9757f7952a\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 123898 f43c8baae59c26c1d5dc56b5d07c39db\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 84348 0c2d566ddfdb44a7f7ed8091b91f9c72\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 89968 aee58d3bda4f9f62439aac72f957eb43\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 77240 4edd8f3836dc4e73433782bccafa2e7b\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 28412 cd7ccd96fab2cdf20beba291a1cbf03f\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 8956 bc8fbcded3baa77fdabed709ae466f36\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 10186 600571e6087e52b413a9ff7e5b0bf529\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 62108 59e310c46a73b6379269ce17c9a18c64\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 72512 013ac1c90862b3d152979f9d394a007a\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 107194 6c508ca09c2c638887b7b7021f46e39b\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 136798 33e877aafc615d644e040292f534d777\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 1649222 4bb31c23d481a7043a9b8b7bbc2b97a1\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 1576420 bae2f8e351ef2583d896db43d605bab2\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 78246 ccc4535e189dccf82c221fe5e599e414\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 83500 4e8c6267a217a3db12c2828eca6756ff\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/squashfs-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 17462 7d72e38a07af9206a15e4697d189a7c5\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/squashfs-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 18522 a07658db715e2458a4dc8b9932aa3ddf\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 68010 e7eff09198869bc8be1d474ca77bf589\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 80402 65129387dd13b5e66ac65ea2dc59b4b1\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 152194 de9304b41dfc7de479457399a2564df1\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 159724 a6b53656dc11d49003c3746ce716fac1\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/vlan-modules-2.6.32-28-powerpc-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 22518 4c59b8b22c1d07f9a4dc165452a310b8\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/vlan-modules-2.6.32-28-powerpc64-smp-di_2.6.32-28.55_powerpc.udeb\r\n Size/MD5: 25788 e3c04bec55fafe0689bf4cf35131603f\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 146476 8b6e5e0d50438fc619fda0a261691e37\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 71448 516414f98e8a0206648da9084db6112c\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 47608 962ea23e980527f2ff1b2a78358d5a31\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 98040 535fbb7c81f2e66764b1a3946a806495\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 591776 f3bbcc5b903a29399029494b3cb36c26\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 151672 e05776bb99ffccad537ed011762f85f7\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 99370 3cfd984ddb2afdde66f81cd5c9d94c93\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 3235260 f824b31c467ae8540b119dd1eaa7cbea\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.32-28-sparc64-smp_2.6.32-28.55_sparc.deb\r\n Size/MD5: 686974 f15d7fdf179adbf0c7040416d16d7023\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.32-28-sparc64_2.6.32-28.55_sparc.deb\r\n Size/MD5: 685822 b6245df7c3a8ef0d1ed2225a84f96394\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.32-28-sparc64-smp_2.6.32-28.55_sparc.deb\r\n Size/MD5: 22692350 a842e5acc65c67f44a7c16a507c08946\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.32-28-sparc64_2.6.32-28.55_sparc.deb\r\n Size/MD5: 22232324 2bfec27fe83350aa112db843194ff091\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.32-28.55_sparc.deb\r\n Size/MD5: 805736 b71e2b4132c1580da1b9a4de2f1a3b67\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-tools-2.6.32-28_2.6.32-28.55_sparc.deb\r\n Size/MD5: 232786 5d7a4e6b721b26243f6cd8e1375223b0\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 234870 9eb6a09780e38b72d8e1a8e06887ce01\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 215162 d9aefb4204543b027f911728c34035f5\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 31902 1d99ad8b6d9988a3c5c2928bbecf4f57\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 337276 f353b17f563574a5cd66d0e74469b625\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 1812762 d7888abdfaba1f78ee53bff09c83d52c\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 247296 a1fa5f7172178bf921e8f6efc6071901\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 140172 c876df53300d1d64d247daa68e22714a\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 39954 4bce54b8a48a6fc74cb4e43c625227ff\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 207162 82901639c6e383b9e0300654bde5e226\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 9182 0e34fd322f328cf0d9dcb4eafd144cfa\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 64472 705e42ebb94bf8a6844b737caa9fabc2\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 213360 c2e04c96f8d789dc85658f202348bd79\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 1304788 a6ac22f9ae3980789cb3751dbebc0dfa\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 96628 9c61da9973d25f77c9bb55e8a707ac86\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/squashfs-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 17706 0b9a0ea76090d5cd468e73a5f87f29da\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 208396 c702b360697d79371997274762fc3cee\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 193384 da5904407230ba583ac24e9bfc59ef7f\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/vlan-modules-2.6.32-28-sparc64-di_2.6.32-28.55_sparc.udeb\r\n Size/MD5: 27198 80156933d4e4bd242196e0e7a61996cc\r\n\r\nUpdated packages for Ubuntu 10.10:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.35-25.44.diff.gz\r\n Size/MD5: 3718650 1c5262e3416693473677f033ca388706\r\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.35-25.44.dsc\r\n Size/MD5: 6539 4a134aa711518dfc655e1fbbcfe60743\r\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.35.orig.tar.gz\r\n Size/MD5: 88300782 62001687bd94d1c0dd9a3654c64257d6\r\n\r\n Architecture independent packages:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc_2.6.35-25.44_all.deb\r\n Size/MD5: 6680698 0de88b1de4a06c398be5340aae61e9cb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.35-25_2.6.35-25.44_all.deb\r\n Size/MD5: 10323478 adc44ee8e923ffa9be850b8620c838cb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.35_2.6.35-25.44_all.deb\r\n Size/MD5: 72444300 21e32945f089aead209863c720a770cd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-tools-common_2.6.35-25.44_all.deb\r\n Size/MD5: 102024 d30e2c959f0dd7b43a1a5bcd490213fb\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 236840 cd47499ba4caa7d229a15fa586a1cd9e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.35-25-virtual-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 9516 1b51afefe16550a1287dbbca9d804602\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/char-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 18146 c5facd2399bfbbfae22f977c030cd5d7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 50084 1d9f464d4377f081e61ba1b93b50e265\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.35-25-virtual-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 50088 891d618c3927b54dd9092a438217a66c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 46866 de1ac3e361af1398e0512ec0045894eb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.35-25-virtual-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 42980 656acba4f949fbd1dec5ba62238d2952\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 15128 a4402d2903c68b687d1df137204eb5f0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.35-25-virtual-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 15124 4dbdfeca9b2ef67cab6ddb05aa98b9c5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 95796 fcf3dcc9b315cf0ebaa64fcd593beaeb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 39394 fbd0bca3a9774af6a7d69e701ba015e1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.35-25-virtual-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 39302 e468f09cc345ce01f5bd742d4908100c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 599984 122659e77eb65437db4e9b731d0874bc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.35-25-virtual-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 354332 29b4d7f94f474602b3f13167688901b0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 406362 011364ed716380be9c8e2092ea006488\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.35-25-virtual-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 272164 0a1c643e42689fa3a432e31f9921daa3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 103080 e800ffc5f8ac283415b022783d7f401f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 319794 32a07978e61a34343a39ded452d96fe7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.35-25-virtual-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 170880 cd8a7d5ced417c140a6b7e6537b89eaa\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 4789750 d8f88dd0d89609eaf278d51f88cdf2c5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.35-25-virtual-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 4860814 a6772b70434698c4e5f4a49a255ca2d9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.35-25-generic_2.6.35-25.44_amd64.deb\r\n Size/MD5: 806506 fb40b5fc4e44548c49e282da0dbf88bc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.35-25-server_2.6.35-25.44_amd64.deb\r\n Size/MD5: 806964 fc181e020b60a5e5c2c0b096585fc0a8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.35-25-virtual_2.6.35-25.44_amd64.deb\r\n Size/MD5: 808212 e3055783c0d06cde52cf9799d943bf6b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.35-25-generic_2.6.35-25.44_amd64.deb\r\n Size/MD5: 33982302 75dbf5fa8147fe00d4639f72d21b6602\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.35-25-server_2.6.35-25.44_amd64.deb\r\n Size/MD5: 33911890 29267cca820959829dd444ca00ebe89a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.35-25-virtual_2.6.35-25.44_amd64.deb\r\n Size/MD5: 10768818 2501645566cc5b9779019f7906d2ba0e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.35-1025.44_amd64.deb\r\n Size/MD5: 811988 c65a01c9c62d09688a01e10c205e2766\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-tools-2.6.35-25_2.6.35-25.44_amd64.deb\r\n Size/MD5: 263320 eb3cdb2067324643cb4877b37878ad86\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 180458 95f98b28e3437528fd92de8b8ceefe48\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.35-25-virtual-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 180412 64f27e49be922c3436ca8fd818ad30b6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 277904 b71150f18d1549493626cc0999e04ec9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.35-25-virtual-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 148782 315bb06e62b97648e6c1aed868121cc7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 33748 fce387c249ab0c54b2de7a304a84d2ea\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.35-25-virtual-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 33744 beda5a09d17ca3d505293094ba4cfda2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 367494 32b2641a584d2ba368c407cd45b2c1ab\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 2478222 d533f4cefa9bd2d1df37139fc46a741f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.35-25-virtual-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 799228 48626a7811d1ab2464f6c2608fc7a143\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 134954 d7f28d3e1c50f7156c77434daa20c073\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 270708 2b606db9baf4dbfa388517b173d81fa8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.35-25-virtual-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 249508 c4ba32a879b4075a721b589e226b54e4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 266040 a2ab51afde17c85cd9e1947e7c2b2213\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 39256 b870ccd8db9c3d8068b3f988f06efb24\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.35-25-virtual-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 39220 cb0181f2e41410774743e62154fe62c4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 151192 255022d19b12322b27ea38cdf5d4ed4e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 67786 d941f0c05e4b328170de392822d3ad5f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 22268 35875c9d2bd3fadaf7f58ba483484dd6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 9688 f0b0f0ef0e45ba03277659d7ae1f8675\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 40916 960c7ae38047eea51a9b560e00dc1398\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.35-25-virtual-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 40648 b9ef8a12b046cea90d02733944d5aced\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 112052 deedc2199ce6e9b1a137364e326acdf2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.35-25-virtual-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 11126 9719df79842be39b179339d82230ad11\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 1590620 83c7162b968f44fd1d350299bf7cf32e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.35-25-virtual-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 248946 9b7cb9f42c06ae425b7e5a557e5cdb01\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 40468 f7b369d5895512757617483252edd3ef\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/squashfs-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 18196 f3b7cf160fb433da5f47c2fc99d342ce\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/squashfs-modules-2.6.35-25-virtual-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 18168 0966d6cd74f8e3569a78de9aa0ce4e3a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 54038 5a2871e0a9d47a813ba1fac70cc74d76\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.35-25-virtual-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 53948 ec97c6e8a938ffd56a007cacd6842b35\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 129228 25dcd82334d93935cdbdd7ea93d3a666\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 17850 90b69fb10acbed5c2c384d6ff9790ce2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.35-25-virtual-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 5044 af8b65872dfaca59289f83add75c38ae\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/vlan-modules-2.6.35-25-generic-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 23024 7380ccecd5aa2abdb51a1e2faead8fe9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/vlan-modules-2.6.35-25-virtual-di_2.6.35-25.44_amd64.udeb\r\n Size/MD5: 23004 3c73194166fb65a953d8f988aa9cdf8b\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 211584 354b13371ad5d9f75155ea3caec7c4fb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 218012 dfbbcbebd638bf4f42afddd373618680\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.35-25-virtual-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 8916 2beaedd58647b90a2d55ab7193fdcd6e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/char-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 36018 c47e5e262932adc0de893057c2ae823f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/char-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 36306 fc74770ba662aab1335c1df3906a8b47\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 48154 1aa391a539dc6d523e7d045e596ba7ed\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 48168 74201d57ea230d506280287845a9a841\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.35-25-virtual-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 48166 c1ac65d18828adda16f5410aa5514843\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 44304 60f0a10d5139d914f1cf162c98bb34bd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 44322 c00d2c8c5e7031960ae0a8d994589b07\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.35-25-virtual-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 40918 e84a760793d476d20605aadf0f463fb8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 14142 c1eb2d6496b58095a473108b84364973\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 14154 3007ca35ba65762b980326eca8e66de4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.35-25-virtual-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 14150 fc2607a994f66ea8950e3a47cc9d8d92\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 90428 d201c275052185f17ecc101f2c295071\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 90776 97f2dab5fa44d4494b616a623a6ce843\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 35194 0949280713d76d4d930cbec5198393f8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 35254 c5303a9b303e0b2dbda211d16c8c7e86\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.35-25-virtual-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 35246 464d61d96715c8f250130a59a5515ad8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 589908 c2b084b38271a28fe29bad1a9438d1b7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 589982 c08084f7c972869766e813ec1dd285e9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.35-25-virtual-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 351400 577df549e24af64726d849ee53cb4164\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 416584 0f598a67362137fde8617714bcbc0d1b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 416684 2e88e51ffa5e8c19dd8d808f36c0ad40\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.35-25-virtual-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 284730 7262d62f5ff4e0ed401c2d7137bee9dd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 95374 abcecbd0156936056c62c3a8ceccb223\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 95406 0413e8c32c36f96130cc01e4ce60c419\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 303620 713da47f59e6fe58b0f13fd465083820\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 304218 572b5fd1f366a2dfa187864278ede107\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.35-25-virtual-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 162044 23a9d632e47a4542e0350cedbef31c2c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 4599830 da26020187aa16381aa72cdeb6760524\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 4729808 bca440e8c1bd3ca9b8cf2abe7cabf2d3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.35-25-virtual-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 4742902 b76e0e3ef7117456ee4f04098e2643c6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.35-25-generic-pae_2.6.35-25.44_i386.deb\r\n Size/MD5: 789454 26151f34fbcc00ba989429103624cbff\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.35-25-generic_2.6.35-25.44_i386.deb\r\n Size/MD5: 787572 6b11774da360d38fe48ccf383bdab194\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.35-25-virtual_2.6.35-25.44_i386.deb\r\n Size/MD5: 789970 d9df001cd2e7d83f27558136531fae6a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.35-25-generic-pae_2.6.35-25.44_i386.deb\r\n Size/MD5: 34058830 67fb35d704d531d2fd23237fc137391a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.35-25-generic_2.6.35-25.44_i386.deb\r\n Size/MD5: 33913440 96a664d2d94c5a0ae71f6e38ad9e3ff6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.35-25-virtual_2.6.35-25.44_i386.deb\r\n Size/MD5: 10586962 cdbf3c7a539e5c4dcd4d426ff3bdb607\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.35-1025.44_i386.deb\r\n Size/MD5: 811970 6465c0b50bbd485d0f79feae39822b4d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-tools-2.6.35-25_2.6.35-25.44_i386.deb\r\n Size/MD5: 250296 11f3af84f8733243de455c6ce06f7a35\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 187322 af91528ec0ca0966e924de2773fa36a4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 187610 f0c3b9542053c196550086d03d534fbd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.35-25-virtual-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 187602 ce356fac153d82a965e6281b189ac88c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 260082 9cb39799d8c8c640ef94701e0ecb921a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 262642 8e2b90bcccd76f99d953b015090a13f9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.35-25-virtual-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 141240 7b62103074aa051393fe67a00c9d7b19\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 34790 c99c7bf39234b77ac00feb40229e6de3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 34798 006cb0cc1d8c7ea38501bc8178812b60\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.35-25-virtual-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 34782 58dcd7b6f1fbfef04a6d96997a93a48b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 343478 a5e322452ecdab67cf3c554fd5493fb5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 343510 4727c16b5fba069f7946cfd8cef7ed9d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 2559840 771e19cf1db5dfa33b03da39a59a4e3f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 2578948 99928d16dd2a493d5769fcf7d27f1e21\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.35-25-virtual-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 778390 b7961765324c36286c158ad93fe0261b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 123004 09cbedabe72e28faf84a1e6cea332cb4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 123204 0cb9a3ccdc207ee7a91ee4ab211f56a1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 254190 7de53d9ee41756b6a410ec856805a36f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 254224 1b1394bf1f0fba9799d5b88c5c49cac4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.35-25-virtual-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 235392 a07631838e4528d2bc73cc9d3cf40025\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 245906 4d02612c4caa4ff475d76f75e85d22c9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 245896 adff10c41ee5ed9e62ae507485af9c15\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 36498 f13ec04c429b95fa26c46f5bea49bbce\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 36690 ea293fd62c9dd2506287732c02a3416d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.35-25-virtual-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 36688 dece37a0ca990b895106c04d5d054941\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 148624 d288f6e304fcb5c50867d4d4e04d8edb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 148658 a35638e04d21916be206275fcd0dc8ef\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 80428 37ac6ed992d5cd7cf1d3af21e86becc5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 81236 5869ffecc47ad4b12b48217dbf0343c0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 49170 4c3ceca92bbcdb37042ececf79c6cd73\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 49254 98e667af3075f2b574f391b0bc51eb62\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 9122 7e2c0760fedfbbaded17f8b27f61ba46\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 9120 ce0f518ff22624a503c6e26c1888182d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 37584 4b820fca51d2bda1d35144aec9e8c26f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 37596 aa171692f94ab298add67123791e9199\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.35-25-virtual-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 37596 f5f4402b68c802ab69b20c09244df665\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 102320 2ceb0b6b33b3526f68d6a527beb84d19\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 102842 fd3474b98ec7f74739e2c382b93dc676\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.35-25-virtual-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 10730 12c71abebaa5742a5f894586563ead9e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 1705060 a3f0f1d47c2c8e5f7bb8110f38113077\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 1655010 0fad9fe2e387956b3f02e0f59ffcc7b6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.35-25-virtual-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 235792 700cc93fdb8ad95087eb136ba5e722d8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 37710 371a181afd7dbe2f342e07b9a5d00777\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 37718 ff3711647173480cb43fcfa8e4821f40\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/squashfs-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 18138 80ba316fc13e2fa8f1f6e0c54a5dd840\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/squashfs-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 18146 5b750e04cc78cfa9226dd6bd4c415345\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/squashfs-modules-2.6.35-25-virtual-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 18146 99a39567cc31db4aa178851c4c9bf90a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 51514 9a103036fdcce3c0cf3f33421265be3b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 51526 4a46a5ff0274bd077d01a46999e02580\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.35-25-virtual-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 51506 954392e3edd598e4e43394362a71a882\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 117332 2bc4dfe2800af9bc76e36af4f5b905a9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 117628 4daba2e467cea3d82b768ae806deed43\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 16590 33e98f8be1eae113e46ff1d8fcf60f3c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 6284 6b8ef7373738b33d2f9aaaa621f06c27\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.35-25-virtual-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 4924 e99a235bb9ce694cb4bdd4b98e9a142d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/vlan-modules-2.6.35-25-generic-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 21316 21717ae3daede35e4adef2b8c4f7dd0c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/vlan-modules-2.6.35-25-generic-pae-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 21320 d76315ff205196a652f8281303454f9a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux/vlan-modules-2.6.35-25-virtual-di_2.6.35-25.44_i386.udeb\r\n Size/MD5: 21314 d7849e7a2c0f0815542a9de2a8c44e3a\r\n\r\n armel architecture (ARM Architecture):\r\n\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.35-25-omap-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 28476 7c4a2aad3c7fc071f019332b16954395\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.35-25-versatile-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 128756 902a5ef90285095a993e17e431bcdd7a\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.35-25-omap-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 70324 e0d52c3de25569e7f94d1e45745c6420\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.35-25-omap-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 51230 9d6699ecfa6ea96fbde0f32baa75aa78\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.35-25-versatile-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 42962 10030a25cd99c5a877a177181611167e\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.35-25-versatile-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 88102 898b08d682d52c54135260f65845325b\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.35-25-omap-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 685644 0e7d8edc6af848495998333d6123c1a5\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.35-25-omap-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 507548 5419bea97ff75811687732a23a59d309\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.35-25-omap-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 111238 04609a1641a3c78654be18202c62b021\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.35-25-versatile-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 94980 196f5ac10da9064e27f89baafe586b1e\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.35-25-omap-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 267600 ce3694c15cb95d9e285f533356251859\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.35-25-omap-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 4073672 2e0c0b8f51e51460d8ff6a47491c0e5e\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.35-25-versatile-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 3375492 490d02f80c20b29566848cd48b0e7bf2\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.35-25-omap_2.6.35-25.44_armel.deb\r\n Size/MD5: 776624 ae19a7629b844fb7252be78f84be50e0\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.35-25-versatile_2.6.35-25.44_armel.deb\r\n Size/MD5: 793428 a8c6ef379f74b9ee80dd959ef4cddd4f\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.35-25-omap_2.6.35-25.44_armel.deb\r\n Size/MD5: 19545118 d8604b2d5ae639f1d3b5d606f138c16c\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.35-25-versatile_2.6.35-25.44_armel.deb\r\n Size/MD5: 21981998 7e0e1d7e0214ef669bcb71bdabb24372\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.35-1025.44_armel.deb\r\n Size/MD5: 808702 8e795bbaf55eb87d76d1fba35960b8b3\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-tools-2.6.35-25_2.6.35-25.44_armel.deb\r\n Size/MD5: 252440 5d4b0f52f3c39a63596b500b83135f1e\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.35-25-omap-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 201686 bdd3e6a0cab7cbd546406c163e75f806\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.35-25-versatile-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 174668 2a9b13cefb0f16d6763d531349a5f435\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.35-25-versatile-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 290292 103f3a5f7ddde2fe0981c5992379ed9f\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.35-25-omap-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 33500 fcf1c81fa8b45bc4bc91fff49e446fba\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.35-25-omap-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 386304 df53c30225b8cd877f8039bf7d044f9c\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.35-25-omap-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 165148 2a0c9a28fe18786aa4e10cbb62b352de\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.35-25-versatile-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 450158 3c17d8ce11ac09bd188e06c620074129\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.35-25-omap-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 293664 b98923b80a374275f55dbc424d312f39\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.35-25-versatile-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 248182 ba4b6677b79f272fc417fdc8842e255a\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.35-25-omap-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 226986 0e1eb13f6b1997c8e9cf85163c3f8e64\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.35-25-omap-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 21650 ae3e613a80f927e7e1f917433bc1463d\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.35-25-versatile-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 102152 9693ada8173d6b59faf57ed5c6b958df\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.35-25-omap-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 10704 090d298191b5359b5a983994504aea1b\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.35-25-omap-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 44668 4b127c9b3c40b135c82218972a15cfbc\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.35-25-versatile-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 35474 0273401c706f058d1353dd8b437dee54\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.35-25-omap-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 19642 de195295ad1b194df19b879a0976946e\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.35-25-versatile-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 101320 2137fc2abc737035337ba8eb6baaf194\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.35-25-omap-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 239914 a0e575e8bc5a40c0511f6c7a20ed83fd\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.35-25-versatile-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 51452 2997ec3ebca7fe48e0b6fef331ad0dcb\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/squashfs-modules-2.6.35-25-omap-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 21688 82c308cc19cebcb4b26f18032ae122a1\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/squashfs-modules-2.6.35-25-versatile-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 17484 fb72cf64c06448631723cc2c2d049763\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.35-25-omap-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 56552 10482f3f569eba9d641d7f831f44abad\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.35-25-omap-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 94878 de4a218ce33025140a00577f97e7b38e\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.35-25-versatile-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 134482 9c85b0f772c9855edca71256566be740\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/vlan-modules-2.6.35-25-omap-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 26578 56d2b2b230d38e2175e67df803d673be\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/vlan-modules-2.6.35-25-versatile-di_2.6.35-25.44_armel.udeb\r\n Size/MD5: 21416 70868875749dae30f6f8ec8fde920681\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 345992 0c8e51ed5407cad9ee703f06589de605\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 288514 3610285b5100cb40ed3f2a3be409686b\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 57494 e874c66a9260e37d0b766aef08faa9bc\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 62538 84a266d3b3ad0d600bd9aef71ab1dc58\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 48912 0ef2000eafcc387fc1316ea90fbf8496\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 53816 d44265f0d0b323be0a72c88412f4883e\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 97084 bdb413eb356adc9e72e14262f938c895\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 110264 e132d1e85c1f24fd3331ac5d99245f3f\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 41710 16242617fd76ea70ca2f4a0f43d4d80f\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 40922 77affc2fa8c517fbde70a6f4198d9864\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 666120 a6b8c6e701b722bebb86dd514282557a\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 697746 c22174a72f924fb4e8b03bea2e48674c\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 487802 1cddaebd6a99273e768f72edffe858c3\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 507280 8e8d6881204e9fd4b60e0438524a4912\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 109294 112ad37e1bc5a3831d41db7190ce7598\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 113730 0b5edef1b92d9697fb2c79973caec399\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 419138 1144a2e815d1a08aa73ad69534ed3f7e\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 353802 a727b73aa83ebf6a378aeab8e99b8040\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 4461112 dcba40e7d1c048378a4bdb5757c279f1\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 5907238 093ec0488ff59d7306ad704a623277d6\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.35-25-powerpc-smp_2.6.35-25.44_powerpc.deb\r\n Size/MD5: 880440 c8415632582b9bee610d781a71eef649\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.35-25-powerpc64-smp_2.6.35-25.44_powerpc.deb\r\n Size/MD5: 900974 1fcd395e69b973e62be960186e8a21af\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.35-25-powerpc_2.6.35-25.44_powerpc.deb\r\n Size/MD5: 883804 4271f6745945df7687327e8b0d8128ab\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.35-25-powerpc-smp_2.6.35-25.44_powerpc.deb\r\n Size/MD5: 30855650 34d668a0b487785e2b0921c3394521d1\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.35-25-powerpc64-smp_2.6.35-25.44_powerpc.deb\r\n Size/MD5: 32207392 bb0a4413201518187926ad8d9d115240\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.35-25-powerpc_2.6.35-25.44_powerpc.deb\r\n Size/MD5: 30621436 eb3ee886b1e022605b5d64a7999281f6\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.35-1025.44_powerpc.deb\r\n Size/MD5: 798964 0511cdc0ba38ab40edd808b423996dbb\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/linux-tools-2.6.35-25_2.6.35-25.44_powerpc.deb\r\n Size/MD5: 275392 d098440a59214ee352ebf7e81d66cc42\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 253286 8454ff19c8110725b5f4db1322737904\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 266250 53907b4567b25336f40f16ec9ef89b3e\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 224226 2e11ea5bdf60678876f59cfc98a3f0ef\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 227734 3e3025dcf9f6de8a0cbd345e88a67630\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 32806 d2bd786d445e0271d9c5691fe508c302\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 37500 274f5b29664ae331592b5bceeaf7a8c6\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 378546 8c5b0851faac9356e7cfd84386963730\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 425696 4604578537d1ad4e59b1f29db3f9880a\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 2686662 92e57b5837628701945d32badf3c416b\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 2902434 22c2b4e2c5edaf64a2ebbd502f1aa0af\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 187494 db4bc14caff41812305dcc78d24c8ed9\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 181612 e4355264a67521ec94f848f2f7875c08\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 273740 37db24a54c2d69d9ed5aeababd8aeeac\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 311726 fe6c5174161a9bb54e34b558920bf82d\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 215442 c1e632adce0eca57c2761de6c2dbab70\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 248742 f80887ff4d7632c9b89d9efa1b9f1a57\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 50996 7f2464f954a5f9c1352a7bf2feca7a01\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 45498 799385f7c9ab08add315e24a01d6acda\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 113028 b99dd0a4c42d6cbf9a25066455fa7d4b\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 125738 1bf0cfbb83c9f3b503bc5d88a0c49039\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 75432 d415fcbec62915a16c260184387b8077\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 79674 49365482989aa3c559f30fb337a534f6\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 79706 bdad178f5656144670fc025c8aebc5db\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 27592 affe4f3239fb116dc60ca13611a029df\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 8920 696481af377862403690621d0be6f995\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 10238 76d80a50ea12c520ce0e4c342141032b\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 61862 1923f996fbc3d34e4733a11ee05170de\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 73018 4505bb31614baa997fb6ffad51a66c61\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 115078 44c52873dcf6d9ecd4da17e33341b25d\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 146728 b88126bab1c134d7adf8ece2bb25685a\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 1700462 071852dc7e1a09ba028316c7b5e91289\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 1632350 dff07d1318a5c2bd1ea21841c3591e3d\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 78400 1f1666d18084650c4104323778038126\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 83916 e832c72b9755faf607c929a892012827\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/squashfs-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 20522 750c9480c55724ced6376430c1ffc0ae\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/squashfs-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 22148 be237e00e1971703d4aa40bd070899c1\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 68312 9cb576dd7c69ceabe15421ae899958a5\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 81460 7575869bcbd2150e67c225bbaa17d2be\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 129510 3fcd48fb9f5e97b7f130c98467eb8e35\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 146936 f6428500371c6a3fd35f7c259158f648\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/vlan-modules-2.6.35-25-powerpc-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 22930 0f7832a57127823ee0292f1803d59326\r\n \r\nhttp://ports.ubuntu.com/pool/main/l/linux/vlan-modules-2.6.35-25-powerpc64-smp-di_2.6.35-25.44_powerpc.udeb\r\n Size/MD5: 26632 bd8c788a92ebcf309926273018d83631\r\n", "edition": 1, "cvss3": {}, "published": "2011-02-02T00:00:00", "title": "[USN-1054-1] Linux kernel vulnerabilities", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2010-4165", "CVE-2010-0435", "CVE-2010-4169", "CVE-2010-4249"], "modified": "2011-02-02T00:00:00", "id": "SECURITYVULNS:DOC:25593", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:25593", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:38", "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA256\r\n\r\n- -------------------------------------------------------------------------\r\nDebian Security Advisory DSA-2153-1 security@debian.org\r\nhttp://www.debian.org/security/ dann frazier\r\nJanuary 30, 2011 http://www.debian.org/security/faq\r\n- -------------------------------------------------------------------------\r\n\r\nPackage : linux-2.6\r\nVulnerability : privilege escalation/denial of service/information leak\r\nProblem type : local/remote\r\nDebian-specific: no\r\nCVE Id(s) : CVE-2010-0435 CVE-2010-3699 CVE-2010-4158 CVE-2010-4162 \r\n CVE-2010-4163 CVE-2010-4242 CVE-2010-4243 CVE-2010-4248 \r\n CVE-2010-4249 CVE-2010-4258 CVE-2010-4342 CVE-2010-4346 \r\n CVE-2010-4526 CVE-2010-4527 CVE-2010-4529 CVE-2010-4565 \r\n CVE-2010-4649 CVE-2010-4656 CVE-2010-4668 CVE-2011-0521\r\n\r\nSeveral vulnerabilities have been discovered in the Linux kernel that may lead\r\nto a privilege escalation, denial of service or information leak. The Common\r\nVulnerabilities and Exposures project identifies the following problems:\r\n\r\nCVE-2010-0435\r\n\r\n Gleb Napatov reported an issue in the KVM subsystem that allows virtual\r\n machines to cause a denial of service of the host machine by executing mov\r\n to/from DR instructions.\r\n\r\nCVE-2010-3699\r\n\r\n Keir Fraser provided a fix for an issue in the Xen subsystem. A guest can\r\n cause a denial of service on the host by retaining a leaked reference to a\r\n device. This can result in a zombie domain, xenwatch process hangs, and xm\r\n command failures.\r\n\r\nCVE-2010-4158\r\n\r\n Dan Rosenberg discovered an issue in the socket filters subsystem, allowing\r\n local unprivileged users to obtain the contents of sensitive kernel memory.\r\n\r\nCVE-2010-4162\r\n\r\n Dan Rosenberg discovered an overflow issue in the block I/O subsystem that\r\n allows local users to map large numbers of pages, resulting in a denial of\r\n service due to invocation of the out of memory killer.\r\n\r\nCVE-2010-4163\r\n\r\n Dan Rosenberg discovered an issue in the block I/O subsystem. Due to\r\n improper validation of iov segments, local users can trigger a kernel panic\r\n resulting in a denial of service.\r\n\r\nCVE-2010-4242\r\n\r\n Alan Cox reported an issue in the Bluetooth subsystem. Local users with\r\n sufficient permission to access HCI UART devices can cause a denial of\r\n service (NULL pointer dereference) due to a missing check for an existing\r\n tty write operation.\r\n\r\nCVE-2010-4243\r\n\r\n Brad Spengler reported a denial-of-service issue in the kernel memory\r\n accounting system. By passing large argv/envp values to exec, local users\r\n can cause the out of memory killer to kill processes owned by other users.\r\n\r\nCVE-2010-4248\r\n\r\n Oleg Nesterov reported an issue in the POSIX CPU timers subsystem. Local\r\n users can cause a denial of service (Oops) due to incorrect assumptions\r\n about thread group leader behavior.\r\n\r\nCVE-2010-4249\r\n\r\n Vegard Nossum reported an issue with the UNIX socket garbage collector.\r\n Local users can consume all of LOWMEM and decrease system performance by\r\n overloading the system with inflight sockets.\r\n\r\nCVE-2010-4258\r\n\r\n Nelson Elhage reported an issue in Linux oops handling. Local users may be\r\n able to obtain elevated privileges if they are able to trigger an oops with\r\n a process' fs set to KERNEL_DS.\r\n\r\nCVE-2010-4342\r\n\r\n Nelson Elhage reported an issue in the econet protocol. Remote attackers can\r\n cause a denial of service by sending an Acorn Universal Networking packet\r\n over UDP.\r\n\r\nCVE-2010-4346\r\n\r\n Tavis Ormandy discovered an issue in the install_special_mapping routine\r\n which allows local users to bypass the mmap_min_addr security restriction.\r\n Combined with an otherwise low severity local denial of service\r\n vulnerability (NULL pointer dereference), a local user could obtain elevated\r\n privileges.\r\n\r\nCVE-2010-4526\r\n\r\n Eugene Teo reported a race condition in the Linux SCTP implementation.\r\n Remote users can cause a denial of service (kernel memory corruption) by\r\n transmitting an ICMP unreachable message to a locked socket.\r\n\r\nCVE-2010-4527\r\n\r\n Dan Rosenberg reported two issues in the OSS soundcard driver. Local users\r\n with access to the device (members of group 'audio' on default Debian\r\n installations) may contain access to sensitive kernel memory or cause a\r\n buffer overflow, potentially leading to an escalation of privileges.\r\n\r\nCVE-2010-4529\r\n\r\n Dan Rosenberg reported an issue in the Linux kernel IrDA socket\r\n implementation on non-x86 architectures. Local users may be able to gain\r\n access to sensitive kernel memory via a specially crafted IRLMP_ENUMDEVICES\r\n getsockopt call.\r\n\r\nCVE-2010-4565\r\n\r\n Dan Rosenberg reported an issue in the Linux CAN protocol implementation.\r\n Local users can obtain the address of a kernel heap object which might help\r\n facilitate system exploitation.\r\n\r\nCVE-2010-4649\r\n\r\n Dan Carpenter reported an issue in the uverb handling of the InfiniBand\r\n subsystem. A potential buffer overflow may allow local users to cause a\r\n denial of service (memory corruption) by passing in a large cmd.ne value.\r\n\r\nCVE-2010-4656\r\n\r\n Kees Cook reported an issue in the driver for I/O-Warrior USB devices.\r\n Local users with access to these devices maybe able to overrun kernel\r\n buffers, resulting in a denial of service or privilege escalation.\r\n\r\nCVE-2010-4668\r\n\r\n Dan Rosenberg reported an issue in the block subsystem. A local user can\r\n cause a denial of service (kernel panic) by submitting certain 0-length I/O\r\n requests.\r\n\r\nCVE-2011-0521\r\n\r\n Dan Carpenter reported an issue in the DVB driver for AV7110 cards. Local\r\n users can pass a negative info->num value, corrupting kernel memory and\r\n causing a denial of service.\r\n\r\nFor the stable distribution (lenny), this problem has been fixed in\r\nversion 2.6.26-26lenny2.\r\n\r\nThe following matrix lists additional source packages that were rebuilt for\r\ncompatibility with or to take advantage of this update:\r\n\r\n Debian 5.0 (lenny)\r\n user-mode-linux 2.6.26-1um-2+26lenny2\r\n\r\nWe recommend that you upgrade your linux-2.6 and user-mode-linux packages.\r\n\r\nNote that these updates will not become active until after your system is\r\nrebooted.\r\n\r\nFurther information about Debian Security Advisories, how to apply\r\nthese updates to your system and frequently asked questions can be\r\nfound at: http://www.debian.org/security/\r\n\r\nMailing list: debian-security-announce@lists.debian.org\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.10 (GNU/Linux)\r\n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\r\nMC+/ZgUkQGUrY/0pi/dN\r\n=wlsd\r\n-----END PGP SIGNATURE-----", "edition": 1, "cvss3": {}, "published": "2011-02-02T00:00:00", "title": "[SECURITY] [DSA 2153-1] linux-2.6 security update", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2010-4242", "CVE-2011-0521", "CVE-2010-4163", "CVE-2010-4529", "CVE-2010-4668", "CVE-2010-4346", "CVE-2010-4527", "CVE-2010-4649", "CVE-2010-0435", "CVE-2010-4656", "CVE-2010-4158", "CVE-2010-4526", "CVE-2010-4162", "CVE-2010-4258", "CVE-2010-4248", "CVE-2010-4243", "CVE-2010-4249", "CVE-2010-4342", "CVE-2010-3699", "CVE-2010-4565"], "modified": "2011-02-02T00:00:00", "id": "SECURITYVULNS:DOC:25594", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:25594", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:40", "description": "DoS via sendmsg, mprotect, setsockopt, Hypervisor/KVM etc, information leaks, privilege escalation.", "edition": 1, "cvss3": {}, "published": "2011-02-02T00:00:00", "title": "Linux kernel multiple security vulnerabilities", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2011-0521", "CVE-2010-4163", "CVE-2010-4529", "CVE-2010-4668", "CVE-2010-4165", "CVE-2010-4346", "CVE-2010-4527", "CVE-2010-4649", "CVE-2010-0435", "CVE-2010-3086", "CVE-2010-4169", "CVE-2010-4656", "CVE-2010-4158", "CVE-2010-4526", "CVE-2010-4162", "CVE-2011-1044", "CVE-2010-4249", "CVE-2010-4157", "CVE-2010-4342", "CVE-2010-4160", "CVE-2010-4565"], "modified": "2011-02-02T00:00:00", "id": "SECURITYVULNS:VULN:11394", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:11394", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "debian": [{"lastseen": "2022-07-04T02:08:01", "description": "Michael Tokarev uploaded new packages for qemu-kvm\nwhich fixed the following security issues:\n\nCVE-2011-0011\n\n Setting the VNC password to an empty string silently disabled\n all authentication.\n\nCVE-2011-1750\n\n The virtio-blk driver performed insufficient validation of\n read/write I/O from the guest instance, which could lead to\n denial of service or privilege escalation.\n\nCVE-2011-1751\n\n Incorrect memory handling during the removal of ISA devices in KVM\n could lead to denial of service of the execution of arbitrary code.\n\nCVE-2011-2512\n\n incorrect sanitising of virtio queue commands in KVM could\n lead to denial of service of the execution of arbitrary code.\n\nCVE-2010-2784\n\n The subpage MMIO initialization functionality in the subpage_register\n function in exec.c in KVM does not properly select the index for\n access to the callback array, which allows guest OS users to cause\n a denial of service (guest OS crash) or possibly gain privileges via\n unspecified vectors.\n\nFor the lenny-backports distribution the problem has been fixed\nin version 0.12.5+dfsg-5+squeeze4~bpo50+1.\n\nIf you don't use pinning (see [1]) you have to update the package\nmanually via "apt-get -t lenny-backports install <packagelist>" with\nthe packagelist of your installed packages affected by this update.\n[1] <http://backports.debian.org/Instructions>\n\nWe recommend to pin (in /etc/apt/preferences) the backports repository to\n200 so that new versions of installed backports will be installed\nautomatically.\n\n Package: *\n Pin: release a=lenny-backports\n Pin-Priority: 200\n\nWe recommend that you upgrade your qemu-kvm packages.", "cvss3": {}, "published": "2011-07-04T14:46:56", "type": "debian", "title": "[BSA-039] Security Update for qemu-kvm", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 4.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.4, "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-2784", "CVE-2011-0011", "CVE-2011-1750", "CVE-2011-1751", "CVE-2011-2512"], "modified": "2011-07-04T14:46:56", "id": "DEBIAN:BSA-039:B3390", "href": "https://lists.debian.org/debian-backports-announce/2011/07/msg00002.html", "cvss": {"score": 7.4, "vector": "AV:A/AC:M/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2021-10-22T00:28:32", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2153-1 security@debian.org\nhttp://www.debian.org/security/ dann frazier\nJanuary 30, 2011 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : linux-2.6\nVulnerability : privilege escalation/denial of service/information leak\nProblem type : local/remote\nDebian-specific: no\nCVE Id(s) : CVE-2010-0435 CVE-2010-3699 CVE-2010-4158 CVE-2010-4162 \n CVE-2010-4163 CVE-2010-4242 CVE-2010-4243 CVE-2010-4248 \n CVE-2010-4249 CVE-2010-4258 CVE-2010-4342 CVE-2010-4346 \n CVE-2010-4526 CVE-2010-4527 CVE-2010-4529 CVE-2010-4565 \n CVE-2010-4649 CVE-2010-4656 CVE-2010-4668 CVE-2011-0521\n\nSeveral vulnerabilities have been discovered in the Linux kernel that may lead\nto a privilege escalation, denial of service or information leak. The Common\nVulnerabilities and Exposures project identifies the following problems:\n\nCVE-2010-0435\n\n Gleb Napatov reported an issue in the KVM subsystem that allows virtual\n machines to cause a denial of service of the host machine by executing mov\n to/from DR instructions.\n\nCVE-2010-3699\n\n Keir Fraser provided a fix for an issue in the Xen subsystem. A guest can\n cause a denial of service on the host by retaining a leaked reference to a\n device. This can result in a zombie domain, xenwatch process hangs, and xm\n command failures.\n\nCVE-2010-4158\n\n Dan Rosenberg discovered an issue in the socket filters subsystem, allowing\n local unprivileged users to obtain the contents of sensitive kernel memory.\n\nCVE-2010-4162\n\n Dan Rosenberg discovered an overflow issue in the block I/O subsystem that\n allows local users to map large numbers of pages, resulting in a denial of\n service due to invocation of the out of memory killer.\n\nCVE-2010-4163\n\n Dan Rosenberg discovered an issue in the block I/O subsystem. Due to\n improper validation of iov segments, local users can trigger a kernel panic\n resulting in a denial of service.\n\nCVE-2010-4242\n\n Alan Cox reported an issue in the Bluetooth subsystem. Local users with\n sufficient permission to access HCI UART devices can cause a denial of\n service (NULL pointer dereference) due to a missing check for an existing\n tty write operation.\n\nCVE-2010-4243\n\n Brad Spengler reported a denial-of-service issue in the kernel memory\n accounting system. By passing large argv/envp values to exec, local users\n can cause the out of memory killer to kill processes owned by other users.\n\nCVE-2010-4248\n\n Oleg Nesterov reported an issue in the POSIX CPU timers subsystem. Local\n users can cause a denial of service (Oops) due to incorrect assumptions\n about thread group leader behavior.\n\nCVE-2010-4249\n\n Vegard Nossum reported an issue with the UNIX socket garbage collector.\n Local users can consume all of LOWMEM and decrease system performance by\n overloading the system with inflight sockets.\n\nCVE-2010-4258\n\n Nelson Elhage reported an issue in Linux oops handling. Local users may be\n able to obtain elevated privileges if they are able to trigger an oops with\n a process' fs set to KERNEL_DS.\n\nCVE-2010-4342\n\n Nelson Elhage reported an issue in the econet protocol. Remote attackers can\n cause a denial of service by sending an Acorn Universal Networking packet\n over UDP.\n\nCVE-2010-4346\n\n Tavis Ormandy discovered an issue in the install_special_mapping routine\n which allows local users to bypass the mmap_min_addr security restriction.\n Combined with an otherwise low severity local denial of service\n vulnerability (NULL pointer dereference), a local user could obtain elevated\n privileges.\n\nCVE-2010-4526\n\n Eugene Teo reported a race condition in the Linux SCTP implementation.\n Remote users can cause a denial of service (kernel memory corruption) by\n transmitting an ICMP unreachable message to a locked socket.\n\nCVE-2010-4527\n\n Dan Rosenberg reported two issues in the OSS soundcard driver. Local users\n with access to the device (members of group 'audio' on default Debian\n installations) may contain access to sensitive kernel memory or cause a\n buffer overflow, potentially leading to an escalation of privileges.\n\nCVE-2010-4529\n\n Dan Rosenberg reported an issue in the Linux kernel IrDA socket\n implementation on non-x86 architectures. Local users may be able to gain\n access to sensitive kernel memory via a specially crafted IRLMP_ENUMDEVICES\n getsockopt call.\n\nCVE-2010-4565\n\n Dan Rosenberg reported an issue in the Linux CAN protocol implementation.\n Local users can obtain the address of a kernel heap object which might help\n facilitate system exploitation.\n\nCVE-2010-4649\n\n Dan Carpenter reported an issue in the uverb handling of the InfiniBand\n subsystem. A potential buffer overflow may allow local users to cause a\n denial of service (memory corruption) by passing in a large cmd.ne value.\n\nCVE-2010-4656\n\n Kees Cook reported an issue in the driver for I/O-Warrior USB devices.\n Local users with access to these devices maybe able to overrun kernel\n buffers, resulting in a denial of service or privilege escalation.\n\nCVE-2010-4668\n\n Dan Rosenberg reported an issue in the block subsystem. A local user can\n cause a denial of service (kernel panic) by submitting certain 0-length I/O\n requests.\n\nCVE-2011-0521\n\n Dan Carpenter reported an issue in the DVB driver for AV7110 cards. Local\n users can pass a negative info->num value, corrupting kernel memory and\n causing a denial of service.\n\nFor the stable distribution (lenny), this problem has been fixed in\nversion 2.6.26-26lenny2.\n\nThe following matrix lists additional source packages that were rebuilt for\ncompatibility with or to take advantage of this update:\n\n Debian 5.0 (lenny)\n user-mode-linux 2.6.26-1um-2+26lenny2\n\nWe recommend that you upgrade your linux-2.6 and user-mode-linux packages.\n\nNote that these updates will not become active until after your system is\nrebooted.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2011-01-30T06:42:05", "type": "debian", "title": "[SECURITY] [DSA 2153-1] linux-2.6 security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-0435", "CVE-2010-3699", "CVE-2010-4158", "CVE-2010-4162", "CVE-2010-4163", "CVE-2010-4242", "CVE-2010-4243", "CVE-2010-4248", "CVE-2010-4249", "CVE-2010-4258", "CVE-2010-4342", "CVE-2010-4346", "CVE-2010-4526", "CVE-2010-4527", "CVE-2010-4529", "CVE-2010-4565", "CVE-2010-4649", "CVE-2010-4656", "CVE-2010-4668", "CVE-2011-0521"], "modified": "2011-01-30T06:42:05", "id": "DEBIAN:DSA-2153-1:FDD6A", "href": "https://lists.debian.org/debian-security-announce/2011/msg00017.html", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "ubuntu": [{"lastseen": "2022-01-04T13:16:28", "description": "Gleb Napatov discovered that KVM did not correctly check certain privileged \noperations. A local attacker with access to a guest kernel could exploit \nthis to crash the host system, leading to a denial of service. \n(CVE-2010-0435)\n\nDan Rosenberg discovered that the Linux kernel TIPC implementation \ncontained multiple integer signedness errors. A local attacker could \nexploit this to gain root privileges. (CVE-2010-3859)\n\nDan Rosenberg discovered that the Linux kernel X.25 implementation \nincorrectly parsed facilities. A remote attacker could exploit this to \ncrash the kernel, leading to a denial of service. (CVE-2010-3873)\n\nDan Rosenberg discovered that the CAN protocol on 64bit systems did not \ncorrectly calculate the size of certain buffers. A local attacker could \nexploit this to crash the system or possibly execute arbitrary code as the \nroot user. (CVE-2010-3874)\n\nVasiliy Kulikov discovered that kvm did not correctly clear memory. A local \nattacker could exploit this to read portions of the kernel stack, leading \nto a loss of privacy. (CVE-2010-3881)\n\nDan Rosenberg discovered that IPC structures were not correctly initialized \non 64bit systems. A local attacker could exploit this to read kernel stack \nmemory, leading to a loss of privacy. (CVE-2010-4073)\n\nDan Rosenberg discovered that the ivtv V4L driver did not correctly \ninitialize certian structures. A local attacker could exploit this to read \nkernel stack memory, leading to a loss of privacy. (CVE-2010-4079)\n\nDan Rosenberg discovered that the semctl syscall did not correctly clear \nkernel memory. A local attacker could exploit this to read kernel stack \nmemory, leading to a loss of privacy. (CVE-2010-4083)\n\nDan Rosenberg discovered that the socket filters did not correctly \ninitialize structure memory. A local attacker could create malicious \nfilters to read portions of kernel stack memory, leading to a loss of \nprivacy. (CVE-2010-4158)\n\nDan Rosenberg discovered that the Linux kernel L2TP implementation \ncontained multiple integer signedness errors. A local attacker could \nexploit this to to crash the kernel, or possibly gain root privileges. \n(CVE-2010-4160)\n\nDan Rosenberg discovered that certain iovec operations did not calculate \npage counts correctly. A local attacker could exploit this to crash the \nsystem, leading to a denial of service. (CVE-2010-4162)\n\nDan Rosenberg discovered multiple flaws in the X.25 facilities parsing. If \na system was using X.25, a remote attacker could exploit this to crash the \nsystem, leading to a denial of service. (CVE-2010-4164)\n\nSteve Chen discovered that setsockopt did not correctly check MSS values. A \nlocal attacker could make a specially crafted socket call to crash the \nsystem, leading to a denial of service. (CVE-2010-4165)\n\nDave Jones discovered that the mprotect system call did not correctly \nhandle merged VMAs. A local attacker could exploit this to crash the \nsystem, leading to a denial of service. (CVE-2010-4169)\n\nDan Rosenberg discovered that the RDS protocol did not correctly check \nioctl arguments. A local attacker could exploit this to crash the system, \nleading to a denial of service. (CVE-2010-4175)\n\nBrad Spengler discovered that the kernel did not correctly account for \nuserspace memory allocations during exec() calls. A local attacker could \nexploit this to consume all system memory, leading to a denial of service. \n(CVE-2010-4243)\n\nVegard Nossum discovered that memory garbage collection was not handled \ncorrectly for active sockets. A local attacker could exploit this to \nallocate all available kernel memory, leading to a denial of service. \n(CVE-2010-4249)\n\nIt was discovered that named pipes did not correctly handle certain fcntl \ncalls. A local attacker could exploit this to crash the system, leading to \na denial of service. (CVE-2010-4256)\n\nNelson Elhage discovered that the kernel did not correctly handle process \ncleanup after triggering a recoverable kernel bug. If a local attacker were \nable to trigger certain kinds of kernel bugs, they could create a specially \ncrafted process to gain root privileges. (CVE-2010-4258)\n", "cvss3": {}, "published": "2011-02-01T00:00:00", "type": "ubuntu", "title": "Linux kernel vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-4258", "CVE-2010-4256", "CVE-2010-4073", "CVE-2010-4243", "CVE-2010-3874", "CVE-2010-3881", "CVE-2010-0435", "CVE-2010-3859", "CVE-2010-4175", "CVE-2010-3873", "CVE-2010-4165", "CVE-2010-4162", "CVE-2010-4079", "CVE-2010-4160", "CVE-2010-4158", "CVE-2010-4083", "CVE-2010-4249", "CVE-2010-4169", "CVE-2010-4164"], "modified": "2011-02-01T00:00:00", "id": "USN-1054-1", "href": "https://ubuntu.com/security/notices/USN-1054-1", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2022-01-04T13:15:48", "description": "Gleb Napatov discovered that KVM did not correctly check certain privileged \noperations. A local attacker with access to a guest kernel could exploit \nthis to crash the host system, leading to a denial of service. \n(CVE-2010-0435)\n\nDave Chinner discovered that the XFS filesystem did not correctly order \ninode lookups when exported by NFS. A remote attacker could exploit this to \nread or write disk blocks that had changed file assignment or had become \nunlinked, leading to a loss of privacy. (CVE-2010-2943)\n\nDan Rosenberg discovered that several network ioctls did not clear kernel \nmemory correctly. A local user could exploit this to read kernel stack \nmemory, leading to a loss of privacy. (CVE-2010-3296, CVE-2010-3297)\n\nDan Jacobson discovered that ThinkPad video output was not correctly \naccess controlled. A local attacker could exploit this to hang the system, \nleading to a denial of service. (CVE-2010-3448)\n\nIt was discovered that KVM did not correctly initialize certain CPU \nregisters. A local attacker could exploit this to crash the system, \nleading to a denial of service. (CVE-2010-3698)\n\nIt was discovered that Xen did not correctly clean up threads. A local \nattacker in a guest system could exploit this to exhaust host system \nresources, leading to a denial of serivce. (CVE-2010-3699)\n\nBrad Spengler discovered that stack memory for new a process was not \ncorrectly calculated. A local attacker could exploit this to crash the \nsystem, leading to a denial of service. (CVE-2010-3858)\n\nDan Rosenberg discovered that the Linux kernel TIPC implementation \ncontained multiple integer signedness errors. A local attacker could \nexploit this to gain root privileges. (CVE-2010-3859)\n\nDan Rosenberg discovered that the Linux kernel X.25 implementation \nincorrectly parsed facilities. A remote attacker could exploit this to \ncrash the kernel, leading to a denial of service. (CVE-2010-3873)\n\nVasiliy Kulikov discovered that the Linux kernel X.25 implementation did \nnot correctly clear kernel memory. A local attacker could exploit this to \nread kernel stack memory, leading to a loss of privacy. (CVE-2010-3875)\n\nVasiliy Kulikov discovered that the Linux kernel sockets implementation did \nnot properly initialize certain structures. A local attacker could exploit \nthis to read kernel stack memory, leading to a loss of privacy. \n(CVE-2010-3876)\n\nVasiliy Kulikov discovered that the TIPC interface did not correctly \ninitialize certain structures. A local attacker could exploit this to \nread kernel stack memory, leading to a loss of privacy. (CVE-2010-3877)\n\nNelson Elhage discovered that the Linux kernel IPv4 implementation did not \nproperly audit certain bytecodes in netlink messages. A local attacker \ncould exploit this to cause the kernel to hang, leading to a denial of \nservice. (CVE-2010-3880)\n\nKees Cook and Vasiliy Kulikov discovered that the shm interface did not \nclear kernel memory correctly. A local attacker could exploit this to read \nkernel stack memory, leading to a loss of privacy. (CVE-2010-4072)\n\nDan Rosenberg discovered that the USB subsystem did not correctly \ninitialize certian structures. A local attacker could exploit this to \nread kernel stack memory, leading to a loss of privacy. (CVE-2010-4074)\n\nDan Rosenberg discovered that the SiS video driver did not correctly clear \nkernel memory. A local attacker could exploit this to read kernel stack \nmemory, leading to a loss of privacy. (CVE-2010-4078)\n\nDan Rosenberg discovered that the ivtv V4L driver did not correctly \ninitialize certian structures. A local attacker could exploit this to \nread kernel stack memory, leading to a loss of privacy. (CVE-2010-4079)\n\nDan Rosenberg discovered that the RME Hammerfall DSP audio interface driver \ndid not correctly clear kernel memory. A local attacker could exploit this \nto read kernel stack memory, leading to a loss of privacy. (CVE-2010-4080, \nCVE-2010-4081)\n\nDan Rosenberg discovered that the semctl syscall did not correctly clear \nkernel memory. A local attacker could exploit this to read kernel stack \nmemory, leading to a loss of privacy. (CVE-2010-4083)\n\nJames Bottomley discovered that the ICP vortex storage array controller \ndriver did not validate certain sizes. A local attacker on a 64bit system \ncould exploit this to crash the kernel, leading to a denial of service. \n(CVE-2010-4157)\n\nDan Rosenberg discovered that the Linux kernel L2TP implementation \ncontained multiple integer signedness errors. A local attacker could \nexploit this to to crash the kernel, or possibly gain root privileges. \n(CVE-2010-4160)\n\nIt was discovered that multithreaded exec did not handle CPU timers \ncorrectly. A local attacker could exploit this to crash the system, \nleading to a denial of service. (CVE-2010-4248)\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 8.1, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.2}, "published": "2011-02-25T00:00:00", "type": "ubuntu", "title": "Linux kernel vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.9, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-4248", "CVE-2010-4074", "CVE-2010-3448", "CVE-2010-0435", "CVE-2010-4072", "CVE-2010-3859", "CVE-2010-3873", "CVE-2010-3876", "CVE-2010-3698", "CVE-2010-3297", "CVE-2010-3877", "CVE-2010-4078", "CVE-2010-4079", "CVE-2010-4160", "CVE-2010-3699", "CVE-2010-3296", "CVE-2010-4081", "CVE-2010-3875", "CVE-2010-4083", "CVE-2010-3880", "CVE-2010-2943", "CVE-2010-4157", "CVE-2010-4080", "CVE-2010-3858"], "modified": "2011-02-25T00:00:00", "id": "USN-1072-1", "href": "https://ubuntu.com/security/notices/USN-1072-1", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-01-04T13:15:45", "description": "Gleb Napatov discovered that KVM did not correctly check certain privileged \noperations. A local attacker with access to a guest kernel could exploit \nthis to crash the host system, leading to a denial of service. \n(CVE-2010-0435)\n\nDan Jacobson discovered that ThinkPad video output was not correctly access \ncontrolled. A local attacker could exploit this to hang the system, leading \nto a denial of service. (CVE-2010-3448)\n\nIt was discovered that KVM did not correctly initialize certain CPU \nregisters. A local attacker could exploit this to crash the system, leading \nto a denial of service. (CVE-2010-3698)\n\nDan Rosenberg discovered that the Linux kernel TIPC implementation \ncontained multiple integer signedness errors. A local attacker could \nexploit this to gain root privileges. (CVE-2010-3859)\n\nThomas Pollet discovered that the RDS network protocol did not \ncheck certain iovec buffers. A local attacker could exploit this \nto crash the system or possibly execute arbitrary code as the root \nuser. (CVE-2010-3865)\n\nDan Rosenberg discovered that the Linux kernel X.25 implementation \nincorrectly parsed facilities. A remote attacker could exploit this to \ncrash the kernel, leading to a denial of service. (CVE-2010-3873)\n\nDan Rosenberg discovered that the CAN protocol on 64bit systems did not \ncorrectly calculate the size of certain buffers. A local attacker could \nexploit this to crash the system or possibly execute arbitrary code as \nthe root user. (CVE-2010-3874)\n\nVasiliy Kulikov discovered that the Linux kernel X.25 implementation did \nnot correctly clear kernel memory. A local attacker could exploit this to \nread kernel stack memory, leading to a loss of privacy. (CVE-2010-3875)\n\nVasiliy Kulikov discovered that the Linux kernel sockets implementation did \nnot properly initialize certain structures. A local attacker could exploit \nthis to read kernel stack memory, leading to a loss of privacy. \n(CVE-2010-3876)\n\nVasiliy Kulikov discovered that the TIPC interface did not correctly \ninitialize certain structures. A local attacker could exploit this to read \nkernel stack memory, leading to a loss of privacy. (CVE-2010-3877)\n\nNelson Elhage discovered that the Linux kernel IPv4 implementation did not \nproperly audit certain bytecodes in netlink messages. A local attacker \ncould exploit this to cause the kernel to hang, leading to a denial of \nservice. (CVE-2010-3880)\n\nDan Rosenberg discovered that IPC structures were not correctly initialized \non 64bit systems. A local attacker could exploit this to read kernel stack \nmemory, leading to a loss of privacy. (CVE-2010-4073)\n\nDan Rosenberg discovered that the USB subsystem did not correctly \ninitialize certian structures. A local attacker could exploit this to read \nkernel stack memory, leading to a loss of privacy. (CVE-2010-4074)\n\nDan Rosenberg discovered that the SiS video driver did not correctly clear \nkernel memory. A local attacker could exploit this to read kernel stack \nmemory, leading to a loss of privacy. (CVE-2010-4078)\n\nDan Rosenberg discovered that the ivtv V4L driver did not correctly \ninitialize certian structures. A local attacker could exploit this to read \nkernel stack memory, leading to a loss of privacy. (CVE-2010-4079)\n\nDan Rosenberg discovered that the RME Hammerfall DSP audio interface driver \ndid not correctly clear kernel memory. A local attacker could exploit this \nto read kernel stack memory, leading to a loss of privacy. (CVE-2010-4080, \nCVE-2010-4081)\n\nDan Rosenberg discovered that the VIA video driver did not correctly \nclear kernel memory. A local attacker could exploit this to read kernel \nstack memory, leading to a loss of privacy. (CVE-2010-4082)\n\nDan Rosenberg discovered that the semctl syscall did not correctly clear \nkernel memory. A local attacker could exploit this to read kernel stack \nmemory, leading to a loss of privacy. (CVE-2010-4083)\n\nJames Bottomley discovered that the ICP vortex storage array controller \ndriver did not validate certain sizes. A local attacker on a 64bit system \ncould exploit this to crash the kernel, leading to a denial of service. \n(CVE-2010-4157)\n\nDan Rosenberg discovered that the Linux kernel L2TP implementation \ncontained multiple integer signedness errors. A local attacker could \nexploit this to to crash the kernel, or possibly gain root privileges. \n(CVE-2010-4160)\n\nSteve Chen discovered that setsockopt did not correctly check MSS values. A \nlocal attacker could make a specially crafted socket call to crash the \nsystem, leading to a denial of service. (CVE-2010-4165)\n\nDave Jones discovered that the mprotect system call did not correctly \nhandle merged VMAs. A local attacker could exploit this to crash the \nsystem, leading to a denial of service. (CVE-2010-4169)\n\nIt was discovered that multithreaded exec did not handle CPU timers \ncorrectly. A local attacker could exploit this to crash the system, leading \nto a denial of service. (CVE-2010-4248)\n\nVegard Nossum discovered that memory garbage collection was not handled \ncorrectly for active sockets. A local attacker could exploit this to \nallocate all available kernel memory, leading to a denial of service. \n(CVE-2010-4249)\n", "cvss3": {}, "published": "2011-02-25T00:00:00", "type": "ubuntu", "title": "Linux kernel vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-4073", "CVE-2010-4082", "CVE-2010-4248", "CVE-2010-4074", "CVE-2010-3874", "CVE-2010-3448", "CVE-2010-0435", "CVE-2010-3859", "CVE-2010-3873", "CVE-2010-3876", "CVE-2010-3698", "CVE-2010-4165", "CVE-2010-3877", "CVE-2010-4078", "CVE-2010-4079", "CVE-2010-4160", "CVE-2010-3865", "CVE-2010-4081", "CVE-2010-3875", "CVE-2010-4083", "CVE-2010-4249", "CVE-2010-3880", "CVE-2010-4157", "CVE-2010-4169", "CVE-2010-4080"], "modified": "2011-02-25T00:00:00", "id": "USN-1073-1", "href": "https://ubuntu.com/security/notices/USN-1073-1", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-01-04T13:15:15", "description": "Dan Rosenberg discovered that the RDS network protocol did not correctly \ncheck certain parameters. A local attacker could exploit this gain root \nprivileges. (CVE-2010-3904)\n\nNelson Elhage discovered several problems with the Acorn Econet protocol \ndriver. A local user could cause a denial of service via a NULL pointer \ndereference, escalate privileges by overflowing the kernel stack, and \nassign Econet addresses to arbitrary interfaces. (CVE-2010-3848, \nCVE-2010-3849, CVE-2010-3850)\n\nBen Hawkes discovered that the Linux kernel did not correctly filter \nregisters on 64bit kernels when performing 32bit system calls. On a 64bit \nsystem, a local attacker could manipulate 32bit system calls to gain root \nprivileges. (CVE-2010-3301)\n\nAl Viro discovered a race condition in the TTY driver. A local attacker \ncould exploit this to crash the system, leading to a denial of service. \n(CVE-2009-4895)\n\nGleb Napatov discovered that KVM did not correctly check certain privileged \noperations. A local attacker with access to a guest kernel could exploit \nthis to crash the host system, leading to a denial of service. \n(CVE-2010-0435)\n\nDan Rosenberg discovered that the MOVE_EXT ext4 ioctl did not correctly \ncheck file permissions. A local attacker could overwrite append-only files, \nleading to potential data loss. (CVE-2010-2066)\n\nDan Rosenberg discovered that the swapexit xfs ioctl did not correctly \ncheck file permissions. A local attacker could exploit this to read from \nwrite-only files, leading to a loss of privacy. (CVE-2010-2226)\n\nSuresh Jayaraman discovered that CIFS did not correctly validate certain \nresponse packats. A remote attacker could send specially crafted traffic \nthat would crash the system, leading to a denial of service. \n(CVE-2010-2248)\n\nBen Hutchings discovered that the ethtool interface did not correctly check \ncertain sizes. A local attacker could perform malicious ioctl calls that \ncould crash the system, leading to a denial of service. (CVE-2010-2478, \nCVE-2010-3084)\n\nJames Chapman discovered that L2TP did not correctly evaluate checksum \ncapabilities. If an attacker could make malicious routing changes, they \ncould crash the system, leading to a denial of service. (CVE-2010-2495)\n\nNeil Brown discovered that NFSv4 did not correctly check certain write \nrequests. A remote attacker could send specially crafted traffic that could \ncrash the system or possibly gain root privileges. (CVE-2010-2521)\n\nDavid Howells discovered that DNS resolution in CIFS could be spoofed. A \nlocal attacker could exploit this to control DNS replies, leading to a loss \nof privacy and possible privilege escalation. (CVE-2010-2524)\n\nDan Rosenberg discovered that the btrfs filesystem did not correctly \nvalidate permissions when using the clone function. A local attacker could \noverwrite the contents of file handles that were opened for append-only, or \npotentially read arbitrary contents, leading to a loss of privacy. \n(CVE-2010-2537, CVE-2010-2538)\n\nBob Peterson discovered that GFS2 rename operations did not correctly \nvalidate certain sizes. A local attacker could exploit this to crash the \nsystem, leading to a denial of service. (CVE-2010-2798)\n\nEric Dumazet discovered that many network functions could leak kernel stack \ncontents. A local attacker could exploit this to read portions of kernel \nmemory, leading to a loss of privacy. (CVE-2010-2942, CVE-2010-3477)\n\nDave Chinner discovered that the XFS filesystem did not correctly order \ninode lookups when exported by NFS. A remote attacker could exploit this to \nread or write disk blocks that had changed file assignment or had become \nunlinked, leading to a loss of privacy. (CVE-2010-2943)\n\nSergey Vlasov discovered that JFS did not correctly handle certain extended \nattributes. A local attacker could bypass namespace access rules, leading \nto a loss of privacy. (CVE-2010-2946)\n\nTavis Ormandy discovered that the IRDA subsystem did not correctly shut \ndown. A local attacker could exploit this to cause the system to crash or \npossibly gain root privileges. (CVE-2010-2954)\n\nBrad Spengler discovered that the wireless extensions did not correctly \nvalidate certain request sizes. A local attacker could exploit this to read \nportions of kernel memory, leading to a loss of privacy. (CVE-2010-2955)\n\nTavis Ormandy discovered that the session keyring did not correctly check \nfor its parent. On systems without a default session keyring, a local \nattacker could exploit this to crash the system, leading to a denial of \nservice. (CVE-2010-2960)\n\nKees Cook discovered that the Intel i915 graphics driver did not correctly \nvalidate memory regions. A local attacker with access to the video card \ncould read and write arbitrary kernel memory to gain root privileges. \n(CVE-2010-2962)\n\nKees Cook discovered that the V4L1 32bit compat interface did not correctly \nvalidate certain parameters. A local attacker on a 64bit system with access \nto a video device could exploit this to gain root privileges. \n(CVE-2010-2963)\n\nToshiyuki Okajima discovered that ext4 did not correctly check certain \nparameters. A local attacker could exploit this to crash the system or \noverwrite the last block of large files. (CVE-2010-3015)\n\nTavis Ormandy discovered that the AIO subsystem did not correctly validate \ncertain parameters. A local attacker could exploit this to crash the system \nor possibly gain root privileges. (CVE-2010-3067)\n\nDan Rosenberg discovered that certain XFS ioctls leaked kernel stack \ncontents. A local attacker could exploit this to read portions of kernel \nmemory, leading to a loss of privacy. (CVE-2010-3078)\n\nRobert Swiecki discovered that ftrace did not correctly handle mutexes. A \nlocal attacker could exploit this to crash the kernel, leading to a denial \nof service. (CVE-2010-3079)\n\nTavis Ormandy discovered that the OSS sequencer device did not correctly \nshut down. A local attacker could exploit this to crash the system or \npossibly gain root privileges. (CVE-2010-3080)\n\nDan Rosenberg discovered that several network ioctls did not clear kernel \nmemory correctly. A local user could exploit this to read kernel stack \nmemory, leading to a loss of privacy. (CVE-2010-3296, CVE-2010-3297, \nCVE-2010-3298)\n\nDan Rosenberg discovered that the ROSE driver did not correctly check \nparameters. A local attacker with access to a ROSE network device could \nexploit this to crash the system or possibly gain root privileges. \n(CVE-2010-3310)\n\nThomas Dreibholz discovered that SCTP did not correctly handle appending \npacket chunks. A remote attacker could send specially crafted traffic to \ncrash the system, leading to a denial of service. (CVE-2010-3432)\n\nDan Rosenberg discovered that the CD driver did not correctly check \nparameters. A local attacker could exploit this to read arbitrary kernel \nmemory, leading to a loss of privacy. (CVE-2010-3437)\n\nDan Rosenberg discovered that the Sound subsystem did not correctly \nvalidate parameters. A local attacker could exploit this to crash the \nsystem, leading to a denial of service. (CVE-2010-3442)\n\nDan Rosenberg discovered that SCTP did not correctly handle HMAC \ncalculations. A remote attacker could send specially crafted traffic that \nwould crash the system, leading to a denial of service. (CVE-2010-3705)\n\nBrad Spengler discovered that stack memory for new a process was not \ncorrectly calculated. A local attacker could exploit this to crash the \nsystem, leading to a denial of service. (CVE-2010-3858)\n\nDan Rosenberg discovered that the Linux kernel TIPC implementation \ncontained multiple integer signedness errors. A local attacker could \nexploit this to gain root privileges. (CVE-2010-3859)\n\nKees Cook discovered that the ethtool interface did not correctly clear \nkernel memory. A local attacker could read kernel heap memory, leading to a \nloss of privacy. (CVE-2010-3861)\n\nDan Rosenberg discovered that the CAN protocol on 64bit systems did not \ncorrectly calculate the size of certain buffers. A local attacker could \nexploit this to crash the system or possibly execute arbitrary code as the \nroot user. (CVE-2010-3874)\n\nKees Cook and Vasiliy Kulikov discovered that the shm interface did not \nclear kernel memory correctly. A local attacker could exploit this to read \nkernel stack memory, leading to a loss of privacy. (CVE-2010-4072)\n\nDan Rosenberg discovered that IPC structures were not correctly initialized \non 64bit systems. A local attacker could exploit this to read kernel stack \nmemory, leading to a loss of privacy. (CVE-2010-4073)\n\nDan Rosenberg discovered that the RME Hammerfall DSP audio interface driver \ndid not correctly clear kernel memory. A local attacker could exploit this \nto read kernel stack memory, leading to a loss of privacy. (CVE-2010-4080, \nCVE-2010-4081)\n\nDan Rosenberg discovered that the VIA video driver did not correctly clear \nkernel memory. A local attacker could exploit this to read kernel stack \nmemory, leading to a loss of privacy. (CVE-2010-4082)\n\nJames Bottomley discovered that the ICP vortex storage array controller \ndriver did not validate certain sizes. A local attacker on a 64bit system \ncould exploit this to crash the kernel, leading to a denial of service. \n(CVE-2010-4157)\n\nDan Rosenberg discovered that the socket filters did not correctly \ninitialize structure memory. A local attacker could create malicious \nfilters to read portions of kernel stack memory, leading to a loss of \nprivacy. (CVE-2010-4158)\n\nDan Rosenberg discovered that the Linux kernel L2TP implementation \ncontained multiple integer signedness errors. A local attacker could \nexploit this to to crash the kernel, or possibly gain root privileges. \n(CVE-2010-4160)\n\nDan Rosenberg discovered that certain iovec operations did not calculate \npage counts correctly. A local attacker could exploit this to crash the \nsystem, leading to a denial of service. (CVE-2010-4162)\n\nDan Rosenberg discovered multiple flaws in the X.25 facilities parsing. If \na system was using X.25, a remote attacker could exploit this to crash the \nsystem, leading to a denial of service. (CVE-2010-4164)\n\nSteve Chen discovered that setsockopt did not correctly check MSS values. A \nlocal attacker could make a specially crafted socket call to crash the \nsystem, leading to a denial of service. (CVE-2010-4165)\n\nDave Jones discovered that the mprotect system call did not correctly \nhandle merged VMAs. A local attacker could exploit this to crash the \nsystem, leading to a denial of service. (CVE-2010-4169)\n\nDan Rosenberg discovered that the RDS protocol did not correctly check \nioctl arguments. A local attacker could exploit this to crash the system, \nleading to a denial of service. (CVE-2010-4175)\n\nAlan Cox discovered that the HCI UART driver did not correctly check if a \nwrite operation was available. If the mmap_min-addr sysctl was changed from \nthe Ubuntu default to a value of 0, a local attacker could exploit this \nflaw to gain root privileges. (CVE-2010-4242)\n\nBrad Spengler discovered that the kernel did not correctly account for \nuserspace memory allocations during exec() calls. A local attacker could \nexploit this to consume all system memory, leading to a denial of service. \n(CVE-2010-4243)\n\nVegard Nossum discovered that memory garbage collection was not handled \ncorrectly for active sockets. A local attacker could exploit this to \nallocate all available kernel memory, leading to a denial of service. \n(CVE-2010-4249)\n\nIt was discovered that named pipes did not correctly handle certain fcntl \ncalls. A local attacker could exploit this to crash the system, leading to \na denial of service. (CVE-2010-4256)\n\nNelson Elhage discovered that the kernel did not correctly handle process \ncleanup after triggering a recoverable kernel bug. If a local attacker were \nable to trigger certain kinds of kernel bugs, they could create a specially \ncrafted process to gain root privileges. (CVE-2010-4258)\n\nKees Cook discovered that some ethtool functions did not correctly clear \nheap memory. A local attacker with CAP_NET_ADMIN privileges could exploit \nthis to read portions of kernel heap memory, leading to a loss of privacy. \n(CVE-2010-4655)\n\nFrank Arnold discovered that the IGMP protocol did not correctly parse \ncertain packets. A remote attacker could send specially crafted traffic to \ncrash the system, leading to a denial of service. (CVE-2011-0709)\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 8.1, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.2}, "published": "2011-03-03T00:00:00", "type": "ubuntu", "title": "Linux kernel vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3080", "CVE-2010-3705", "CVE-2010-4258", "CVE-2010-4256", "CVE-2010-4242", "CVE-2010-3084", "CVE-2010-3442", "CVE-2010-4073", "CVE-2010-4082", "CVE-2010-4243", "CVE-2009-4895", "CVE-2010-3067", "CVE-2010-3861", "CVE-2010-3437", "CVE-2010-3874", "CVE-2010-2478", "CVE-2010-3310", "CVE-2010-4655", "CVE-2010-2521", "CVE-2010-2495", "CVE-2010-0435", "CVE-2010-3849", "CVE-2010-4072", "CVE-2010-2537", "CVE-2010-3432", "CVE-2010-3859", "CVE-2010-2226", "CVE-2010-4164", "CVE-2010-3477", "CVE-2010-4175", "CVE-2010-3079", "CVE-2011-0709", "CVE-2010-3015", "CVE-2010-2960", "CVE-2010-2066", "CVE-2010-2962", "CVE-2010-2798", "CVE-2010-4165", "CVE-2010-3298", "CVE-2010-2954", "CVE-2010-3297", "CVE-2010-2955", "CVE-2010-2538", "CVE-2010-2963", "CVE-2010-4162", "CVE-2010-2942", "CVE-2010-3301", "CVE-2010-3848", "CVE-2010-2248", "CVE-2010-3850", "CVE-2010-4160", "CVE-2010-2946", "CVE-2010-3296", "CVE-2010-4081", "CVE-2010-4158", "CVE-2010-4249", "CVE-2010-3904", "CVE-2010-2524", "CVE-2010-2943", "CVE-2010-4157", "CVE-2010-4169", "CVE-2010-3078", "CVE-2010-4080", "CVE-2010-3858"], "modified": "2011-03-03T00:00:00", "id": "USN-1083-1", "href": "https://ubuntu.com/security/notices/USN-1083-1", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "osv": [{"lastseen": "2022-08-10T07:09:00", "description": "\nSeveral vulnerabilities have been discovered in the Linux kernel that may lead\nto a privilege escalation, denial of service or information leak. The Common\nVulnerabilities and Exposures project identifies the following problems:\n\n\n* [CVE-2010-0435](https://security-tracker.debian.org/tracker/CVE-2010-0435)\nGleb Napatov reported an issue in the KVM subsystem that allows virtual\n machines to cause a denial of service of the host machine by executing mov\n to/from DR instructions.\n* [CVE-2010-3699](https://security-tracker.debian.org/tracker/CVE-2010-3699)\nKeir Fraser provided a fix for an issue in the Xen subsystem. A guest can\n cause a denial of service on the host by retaining a leaked reference to a\n device. This can result in a zombie domain, xenwatch process hangs, and xm\n command failures.\n* [CVE-2010-4158](https://security-tracker.debian.org/tracker/CVE-2010-4158)\nDan Rosenberg discovered an issue in the socket filters subsystem, allowing\n local unprivileged users to obtain the contents of sensitive kernel memory.\n* [CVE-2010-4162](https://security-tracker.debian.org/tracker/CVE-2010-4162)\nDan Rosenberg discovered an overflow issue in the block I/O subsystem that\n allows local users to map large numbers of pages, resulting in a denial of\n service due to invocation of the out of memory killer.\n* [CVE-2010-4163](https://security-tracker.debian.org/tracker/CVE-2010-4163)\nDan Rosenberg discovered an issue in the block I/O subsystem. Due to\n improper validation of iov segments, local users can trigger a kernel panic\n resulting in a denial of service.\n* [CVE-2010-4242](https://security-tracker.debian.org/tracker/CVE-2010-4242)\nAlan Cox reported an issue in the Bluetooth subsystem. Local users with\n sufficient permission to access HCI UART devices can cause a denial of\n service (NULL pointer dereference) due to a missing check for an existing\n tty write operation.\n* [CVE-2010-4243](https://security-tracker.debian.org/tracker/CVE-2010-4243)\nBrad Spengler reported a denial-of-service issue in the kernel memory\n accounting system. By passing large argv/envp values to exec, local users\n can cause the out of memory killer to kill processes owned by other users.\n* [CVE-2010-4248](https://security-tracker.debian.org/tracker/CVE-2010-4248)\nOleg Nesterov reported an issue in the POSIX CPU timers subsystem. Local\n users can cause a denial of service (Oops) due to incorrect assumptions\n about thread group leader behavior.\n* [CVE-2010-4249](https://security-tracker.debian.org/tracker/CVE-2010-4249)\nVegard Nossum reported an issue with the UNIX socket garbage collector.\n Local users can consume all of LOWMEM and decrease system performance by\n overloading the system with inflight sockets.\n* [CVE-2010-4258](https://security-tracker.debian.org/tracker/CVE-2010-4258)\nNelson Elhage reported an issue in Linux oops handling. Local users may be\n able to obtain elevated privileges if they are able to trigger an oops with\n a process' fs set to KERNEL\\_DS.\n* [CVE-2010-4342](https://security-tracker.debian.org/tracker/CVE-2010-4342)\nNelson Elhage reported an issue in the Econet protocol. Remote attackers can\n cause a denial of service by sending an Acorn Universal Networking packet\n over UDP.\n* [CVE-2010-4346](https://security-tracker.debian.org/tracker/CVE-2010-4346)\nTavis Ormandy discovered an issue in the install\\_special\\_mapping routine\n which allows local users to bypass the mmap\\_min\\_addr security restriction.\n Combined with an otherwise low severity local denial of service\n vulnerability (NULL pointer dereference), a local user could obtain elevated\n privileges.\n* [CVE-2010-4526](https://security-tracker.debian.org/tracker/CVE-2010-4526)\nEugene Teo reported a race condition in the Linux SCTP implementation.\n Remote users can cause a denial of service (kernel memory corruption) by\n transmitting an ICMP unreachable message to a locked socket.\n* [CVE-2010-4527](https://security-tracker.debian.org/tracker/CVE-2010-4527)\nDan Rosenberg reported two issues in the OSS soundcard driver. Local users\n with access to the device (members of group 'audio' on default Debian\n installations) may access to sensitive kernel memory or cause a\n buffer overflow, potentially leading to an escalation of privileges.\n* [CVE-2010-4529](https://security-tracker.debian.org/tracker/CVE-2010-4529)\nDan Rosenberg reported an issue in the Linux kernel IrDA socket\n implementation on non-x86 architectures. Local users may be able to gain\n access to sensitive kernel memory via a specially crafted IRLMP\\_ENUMDEVICES\n getsockopt call.\n* [CVE-2010-4565](https://security-tracker.debian.org/tracker/CVE-2010-4565)\nDan Rosenberg reported an issue in the Linux CAN protocol implementation.\n Local users can obtain the address of a kernel heap object which might help\n facilitate system exploitation.\n* [CVE-2010-4649](https://security-tracker.debian.org/tracker/CVE-2010-4649)\nDan Carpenter reported an issue in the uverb handling of the InfiniBand\n subsystem. A potential buffer overflow may allow local users to cause a\n denial of service (memory corruption) by passing in a large cmd.ne value.\n* [CVE-2010-4656](https://security-tracker.debian.org/tracker/CVE-2010-4656)\nKees Cook reported an issue in the driver for I/O-Warrior USB devices.\n Local users with access to these devices may be able to overrun kernel\n buffers, resulting in a denial of service or privilege escalation.\n* [CVE-2010-4668](https://security-tracker.debian.org/tracker/CVE-2010-4668)\nDan Rosenberg reported an issue in the block subsystem. A local user can\n cause a denial of service (kernel panic) by submitting certain 0-length I/O\n requests.\n* [CVE-2011-0521](https://security-tracker.debian.org/tracker/CVE-2011-0521)\nDan Carpenter reported an issue in the DVB driver for AV7110 cards. Local\n users can pass a negative info->num value, corrupting kernel memory and\n causing a denial of service.\n\n\nFor the stable distribution (lenny), this problem has been fixed in\nversion 2.6.26-26lenny2.\n\n\nThe following matrix lists additional source packages that were rebuilt for\ncompatibility with or to take advantage of this update:\n\n\n\n\n| | Debian 5.0 (lenny) |\n| --- | --- |\n| user-mode-linux | 2.6.26-1um-2+26lenny2 |\n\n\nWe recommend that you upgrade your linux-2.6 and user-mode-linux packages.\n\n\nNote that these updates will not become active until after your system is\nrebooted.\n\n\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2011-01-30T00:00:00", "type": "osv", "title": "linux-2.6 - several issues", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-0435", "CVE-2010-3699", "CVE-2010-4158", "CVE-2010-4162", "CVE-2010-4163", "CVE-2010-4242", "CVE-2010-4243", "CVE-2010-4248", "CVE-2010-4249", "CVE-2010-4258", "CVE-2010-4342", "CVE-2010-4346", "CVE-2010-4526", "CVE-2010-4527", "CVE-2010-4529", "CVE-2010-4565", "CVE-2010-4649", "CVE-2010-4656", "CVE-2010-4668", "CVE-2011-0521"], "modified": "2022-08-10T07:08:41", "id": "OSV:DSA-2153-1", "href": "https://osv.dev/vulnerability/DSA-2153-1", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "suse": [{"lastseen": "2016-09-04T12:46:49", "description": "The openSUSE 11.3 kernel was updated to fix various bugs and security issues. Following security issues have been fixed: CVE-2010-4347: A local user could inject ACPI code into the kernel via the world-writable \"custom_debug\" file, allowing local privilege escalation.\n#### Solution\nThere is no known workaround, please install the update packages.", "cvss3": {}, "published": "2011-01-03T15:33:10", "type": "suse", "title": "local privilege escalation, remote denial of in kernel", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2010-4163", "CVE-2010-4081", "CVE-2010-3865", "CVE-2010-4073", "CVE-2010-4165", "CVE-2010-4072", "CVE-2010-3437", "CVE-2010-4083", "CVE-2010-4082", "CVE-2010-0435", "CVE-2010-4080", "CVE-2010-4169", "CVE-2010-4158", "CVE-2010-4162", "CVE-2010-4258", "CVE-2010-3442", "CVE-2010-3874", "CVE-2010-4157", "CVE-2010-4347", "CVE-2010-3067", "CVE-2010-4164", "CVE-2010-3432", "CVE-2010-4078", "CVE-2010-4175", "CVE-2010-3861"], "modified": "2011-01-03T15:33:10", "id": "SUSE-SA:2011:001", "href": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}]}