Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.122244
Category:Oracle Linux Local Security Checks
Title:Oracle: Security Advisory (ELSA-2011-0007)
Summary:The remote host is missing an update for the 'kernel' package(s) announced via the ELSA-2011-0007 advisory.
Description:Summary:
The remote host is missing an update for the 'kernel' package(s) announced via the ELSA-2011-0007 advisory.

Vulnerability Insight:
[2.6.32-71.14.1.0.1.el6]
- replace Red Hat with Oracle in files genkey and kernel.spec

[2.6.32-71.14.1.el6]
- [kvm] x86: zero kvm_vcpu_events->interrupt.pad (Marcelo Tosatti) [665471 665409] {CVE-2010-4525}

[2.6.32-71.13.1.el6]
email_6.RHSA-2011-0007 178L, 11970C written
- [scsi] lpfc: Fixed crashes for NULL pnode dereference (Rob Evers) [660589 635733]

[2.6.32-71.12.1.el6]
- [netdrv] igb: only use vlan_gro_receive if vlans are registered (Stefan Assmann) [652804 660192] {CVE-2010-4263}
- [net] core: neighbour update Oops (Jiri Pirko) [660591 658518]
- [scsi] lpfc: Set heartbeat timer off by default (Rob Evers) [660244 655935]
- [scsi] lpfc: Fixed crashes for BUG_ONs hit in the lpfc_abort_handler (Rob Evers) [659611 645882]

[2.6.32-71.11.1.el6]
- [kernel] posix-cpu-timers: workaround to suppress the problems with mt exec (Oleg Nesterov) [656267 656268] {CVE-2010-4248}
- [fs] bio: take care not overflow page count when mapping/copying user data (Danny Feng) [652530 652531] {CVE-2010-4162}
- [net] can-bcm: fix minor heap overflow (Danny Feng) [651846 651847] {CVE-2010-3874}
- [net] filter: make sure filters don't read uninitialized memory (Jiri Pirko) [651704 651705] {CVE-2010-4158}
- [net] inet_diag: Make sure we actually run the same bytecode we audited (Jiri Pirko) [651268 651269] {CVE-2010-3880}
- [v4l] ivtvfb: prevent reading uninitialized stack memory (Mauro Carvalho Chehab) [648832 648833] {CVE-2010-4079}
- [drm] via/ioctl.c: prevent reading uninitialized stack memory (Dave Airlie) [648718 648719] {CVE-2010-4082}
- [char] nozomi: clear data before returning to userspace on TIOCGICOUNT (Mauro Carvalho Chehab) [648705 648706] {CVE-2010-4077}
- [serial] clean data before filling it on TIOCGICOUNT (Mauro Carvalho Chehab) [648702 648703] {CVE-2010-4075}
- [net] af_unix: limit unix_tot_inflight (Neil Horman) [656761 656762] {CVE-2010-4249}
- [block] check for proper length of iov entries in blk_rq_map_user_iov() (Danny Feng) [652958 652959] {CVE-2010-4163}
- [net] Limit sendto()/recvfrom()/iovec total length to INT_MAX (Jiri Pirko) [651894 651895] {CVE-2010-4160}
- [netdrv] mlx4: Add OFED-1.5.2 patch to increase log_mtts_per_seg (Jay Fenlason) [643815 637284]
- [kernel] kbuild: fix external module compiling (Aristeu Rozanski) [658879 655231]
- [net] bluetooth: Fix missing NULL check (Jarod Wilson) [655667 655668] {CVE-2010-4242}
- [kernel] ipc: initialize structure memory to zero for compat functions (Danny Feng) [648694 648695] {CVE-2010-4073}
- [kernel] shm: fix information leak to userland (Danny Feng) [648688 648689] {CVE-2010-4072}
- [md] dm: remove extra locking when changing device size (Mike Snitzer) [653900 644380]
- [block] read i_size with i_size_read() (Mike Snitzer) [653900 644380]
- [kbuild] don't sign out-of-tree modules (Aristeu Rozanski) [655122 653507]

[2.6.32-71.10.1.el6]
- [fs] xfs: prevent reading uninitialized stack memory (Dave Chinner) [630808 ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'kernel' package(s) on Oracle Linux 6.

Solution:
Please install the updated package(s).

CVSS Score:
8.3

CVSS Vector:
AV:A/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-2492
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
http://www.securityfocus.com/archive/1/520102/100/0/threaded
42890
http://secunia.com/advisories/42890
46397
http://secunia.com/advisories/46397
MDVSA-2010:172
http://www.mandriva.com/security/advisories?name=MDVSA-2010:172
MDVSA-2010:198
http://www.mandriva.com/security/advisories?name=MDVSA-2010:198
RHSA-2010:0723
http://www.redhat.com/support/errata/RHSA-2010-0723.html
RHSA-2011:0007
http://www.redhat.com/support/errata/RHSA-2011-0007.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a6f80fb7b5986fda663d94079d3bba0937a6b6ff
http://support.avaya.com/css/P8/documents/100113326
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35
http://www.vmware.com/security/advisories/VMSA-2011-0012.html
https://bugzilla.redhat.com/show_bug.cgi?id=611385
Common Vulnerability Exposure (CVE) ID: CVE-2010-2803
41512
http://secunia.com/advisories/41512
ADV-2010-2430
http://www.vupen.com/english/advisories/2010/2430
ADV-2011-0298
http://www.vupen.com/english/advisories/2011/0298
DSA-2094
http://www.debian.org/security/2010/dsa-2094
RHSA-2010:0842
http://www.redhat.com/support/errata/RHSA-2010-0842.html
SUSE-SA:2010:040
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html
SUSE-SA:2010:041
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html
SUSE-SA:2010:054
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html
SUSE-SA:2011:007
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git%3Ba=commit%3Bh=1b2f1489633888d4a06028315dc19d65768a1c05
http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git%3Ba=commit%3Bh=b9f0aee83335db1f3915f4e42a5e21b351740afd
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b9f0aee83335db1f3915f4e42a5e21b351740afd
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.53
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.21
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34.6
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.4
https://bugzilla.redhat.com/show_bug.cgi?id=621435
Common Vulnerability Exposure (CVE) ID: CVE-2010-2955
41245
http://secunia.com/advisories/41245
42885
http://www.securityfocus.com/bid/42885
RHSA-2010:0771
http://www.redhat.com/support/errata/RHSA-2010-0771.html
USN-1000-1
http://www.ubuntu.com/usn/USN-1000-1
[linux-kernel] 20100827 [PATCH] wireless: fix 64K kernel heap content leak via ioctl
http://lkml.org/lkml/2010/8/27/413
[linux-kernel] 20100830 Re: [PATCH] wireless extensions: fix kernel heap content leak
http://lkml.org/lkml/2010/8/30/351
[linux-kernel] 20100830 Re: [PATCH] wireless: fix 64K kernel heap content leak via ioctl
http://lkml.org/lkml/2010/8/30/127
[linux-kernel] 20100830 [PATCH] wireless extensions: fix kernel heap content leak
http://lkml.org/lkml/2010/8/30/146
[oss-security] 20100831 CVE-2010-2955 kernel: wireless: fix 64K kernel heap content leak via ioctl
http://www.openwall.com/lists/oss-security/2010/08/31/1
http://forums.grsecurity.net/viewtopic.php?f=3&t=2290
http://git.kernel.org/?p=linux/kernel/git/linville/wireless-2.6.git%3Ba=commit%3Bh=42da2f948d949efd0111309f5827bf0298bcc9a4
http://grsecurity.net/~spender/wireless-infoleak-fix2.patch
http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc3-next-20100831.bz2
https://bugzilla.redhat.com/show_bug.cgi?id=628434
Common Vulnerability Exposure (CVE) ID: CVE-2010-2962
BugTraq ID: 44067
http://www.securityfocus.com/bid/44067
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
http://www.redhat.com/support/errata/RHSA-2010-0958.html
http://secunia.com/advisories/42745
http://secunia.com/advisories/42758
SuSE Security Announcement: SUSE-SA:2010:050 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html
SuSE Security Announcement: SUSE-SA:2010:051 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00004.html
SuSE Security Announcement: SUSE-SA:2011:007 (Google Search)
http://www.ubuntu.com/usn/USN-1041-1
http://www.vupen.com/english/advisories/2010/3321
http://www.vupen.com/english/advisories/2011/0070
Common Vulnerability Exposure (CVE) ID: CVE-2010-3067
42778
http://secunia.com/advisories/42778
42801
http://secunia.com/advisories/42801
43291
http://secunia.com/advisories/43291
ADV-2011-0012
http://www.vupen.com/english/advisories/2011/0012
ADV-2011-0375
http://www.vupen.com/english/advisories/2011/0375
DSA-2126
http://www.debian.org/security/2010/dsa-2126
MDVSA-2010:257
http://www.mandriva.com/security/advisories?name=MDVSA-2010:257
MDVSA-2011:029
http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
MDVSA-2011:051
http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
RHSA-2010:0758
http://www.redhat.com/support/errata/RHSA-2010-0758.html
RHSA-2010:0779
http://www.redhat.com/support/errata/RHSA-2010-0779.html
RHSA-2010:0839
http://www.redhat.com/support/errata/RHSA-2010-0839.html
SUSE-SA:2010:060
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
SUSE-SA:2011:001
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
SUSE-SA:2011:002
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
SUSE-SA:2011:008
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478
http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2
https://bugzilla.redhat.com/show_bug.cgi?id=629441
kernel-doiosubmit-dos(61884)
https://exchange.xforce.ibmcloud.com/vulnerabilities/61884
Common Vulnerability Exposure (CVE) ID: CVE-2010-3078
1024418
http://securitytracker.com/id?1024418
41284
http://secunia.com/advisories/41284
43022
http://www.securityfocus.com/bid/43022
SUSE-SA:2010:050
[oss-security] 20100907 CVE request: kernel: xfs: XFS_IOC_FSGETXATTR ioctl memory leak
http://www.openwall.com/lists/oss-security/2010/09/07/1
[oss-security] 20100907 Re: CVE request: kernel: xfs: XFS_IOC_FSGETXATTR ioctl memory leak
http://www.openwall.com/lists/oss-security/2010/09/07/12
[xfs-masters] 20100906 [PATCH] xfs: prevent reading uninitialized stack memory
http://www.linux.sgi.com/archives/xfs-masters/2010-09/msg00002.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a122eb2fdfd78b58c6dd992d6f4b1aaef667eef9
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc4
https://bugzilla.redhat.com/show_bug.cgi?id=630804
Common Vulnerability Exposure (CVE) ID: CVE-2010-3079
42758
43684
http://www.securityfocus.com/bid/43684
ADV-2011-0070
USN-1041-1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9c55cb12c1c172e2d51e85fbb5a4796ca86b77e7
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.5
https://bugzilla.redhat.com/show_bug.cgi?id=631623
Common Vulnerability Exposure (CVE) ID: CVE-2010-3080
43062
http://www.securityfocus.com/bid/43062
[oss-security] 20100908 CVE-2010-3080 kernel: /dev/sequencer open failure is not handled correctly
http://www.openwall.com/lists/oss-security/2010/09/08/7
http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=c598337660c21c0afaa9df5a65bb4a7a0cf15be8
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=27f7ad53829f79e799a253285318bff79ece15bd
https://bugzilla.redhat.com/show_bug.cgi?id=630551
Common Vulnerability Exposure (CVE) ID: CVE-2010-3081
20100916 Ac1db1tch3z vs x86_64 Linux Kernel
http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0273.html
20100916 Workaround for Ac1db1tch3z exploit.
http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0278.html
20101130 VMSA-2010-0017 VMware ESX third party update for Service Console kerne
http://www.securityfocus.com/archive/1/514938/30/30/threaded
20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
http://www.securityfocus.com/archive/1/516397/100/0/threaded
42384
http://secunia.com/advisories/42384
43315
http://secunia.com/advisories/43315
ADV-2010-3083
http://www.vupen.com/english/advisories/2010/3083
ADV-2010-3117
http://www.vupen.com/english/advisories/2010/3117
MDVSA-2010:214
http://www.mandriva.com/security/advisories?name=MDVSA-2010:214
MDVSA-2010:247
http://www.mandriva.com/security/advisories?name=MDVSA-2010:247
RHSA-2010:0882
http://www.redhat.com/support/errata/RHSA-2010-0882.html
SUSE-SR:2010:017
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
[oss-security] 20100916 CVE-2010-3081 kernel: 64-bit Compatibility Mode Stack Pointer Underflow
http://marc.info/?l=oss-security&m=128461522230211&w=2
http://blog.ksplice.com/2010/09/cve-2010-3081/
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c41d68a513c71e35a14f66d71782d27a79a81ea6
http://isc.sans.edu/diary.html?storyid=9574
http://sota.gen.nz/compat1/
http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.36-rc4-git2.log
http://www.vmware.com/security/advisories/VMSA-2010-0017.html
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
https://access.redhat.com/kb/docs/DOC-40265
https://bugzilla.redhat.com/show_bug.cgi?id=634457
Common Vulnerability Exposure (CVE) ID: CVE-2010-3084
43098
http://www.securityfocus.com/bid/43098
[netdev] 20100907 [PATCH net-2.6] niu: Fix kernel buffer overflow for ETHTOOL_GRXCLSRLALL
http://www.spinics.net/lists/netdev/msg140133.html
[oss-security] 20100909 CVE request: kernel: niu buffer overflow for ETHTOOL_GRXCLSRLALL
http://www.openwall.com/lists/oss-security/2010/09/09/1
[oss-security] 20100910 Re: CVE request: kernel: niu buffer overflow for ETHTOOL_GRXCLSRLALL
http://www.openwall.com/lists/oss-security/2010/09/11/1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ee9c5cfad29c8a13199962614b9b16f1c4137ac9
https://bugzilla.redhat.com/show_bug.cgi?id=632069
Common Vulnerability Exposure (CVE) ID: CVE-2010-3298
41440
http://secunia.com/advisories/41440
43226
http://www.securityfocus.com/bid/43226
[linux-kernel] 20100911 [PATCH] drivers/net/usb/hso.c: prevent reading uninitialized memory
http://lkml.org/lkml/2010/9/11/167
[oss-security] 20100914 CVE request: kernel: numerous infoleaks
http://www.openwall.com/lists/oss-security/2010/09/14/2
[oss-security] 20100914 Re: CVE request: kernel: numerous infoleaks
http://www.openwall.com/lists/oss-security/2010/09/14/7
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=7011e660938fc44ed86319c18a5954e95a82ab3e
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc5
https://bugzilla.redhat.com/show_bug.cgi?id=633140
Common Vulnerability Exposure (CVE) ID: CVE-2010-3301
[oss-security] 20100916 CVE-2010-3301 kernel: IA32 System Call Entry Point Vulnerability
http://www.openwall.com/lists/oss-security/2010/09/16/1
[oss-security] 20100916 Re: CVE-2010-3301 kernel: IA32 System Call Entry Point Vulnerability
http://www.openwall.com/lists/oss-security/2010/09/16/3
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=36d001c70d8a0144ac1d038f6876c484849a74de
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=eefdca043e8391dcd719711716492063030b55ac
http://sota.gen.nz/compat2/
https://bugzilla.redhat.com/show_bug.cgi?id=634449
Common Vulnerability Exposure (CVE) ID: CVE-2010-3432
42400
http://secunia.com/advisories/42400
42789
http://secunia.com/advisories/42789
43480
http://www.securityfocus.com/bid/43480
ADV-2010-3113
http://www.vupen.com/english/advisories/2010/3113
ADV-2011-0024
http://www.vupen.com/english/advisories/2011/0024
RHSA-2010:0936
http://www.redhat.com/support/errata/RHSA-2010-0936.html
RHSA-2010:0958
RHSA-2011:0004
http://www.redhat.com/support/errata/RHSA-2011-0004.html
[netdev] 20100915 [PATCH] net: SCTP remote/local Denial of Service vulnerability description and fix
http://marc.info/?l=linux-netdev&m=128453869227715&w=3
[oss-security] 20100924 CVE Request -- Linux/SCTP DoS in sctp_packet_config()
http://marc.info/?l=oss-security&m=128534569803598&w=2
[oss-security] 20100925 Re: CVE Request -- Linux/SCTP DoS in sctp_packet_config()
http://marc.info/?l=oss-security&m=128537701808336&w=2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4bdab43323b459900578b200a4b8cf9713ac8fab
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.6
https://bugzilla.redhat.com/show_bug.cgi?id=637675
Common Vulnerability Exposure (CVE) ID: CVE-2010-3437
15150
http://www.exploit-db.com/exploits/15150/
42932
http://secunia.com/advisories/42932
43551
http://www.securityfocus.com/bid/43551
ADV-2011-0124
http://www.vupen.com/english/advisories/2011/0124
SUSE-SA:2011:004
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
[oss-security] 20100928 CVE request - kernel: pktcdvd ioctl dev_minor missing range check
http://www.openwall.com/lists/oss-security/2010/09/28/2
[oss-security] 20100928 Re: CVE request - kernel: pktcdvd ioctl dev_minor missing range check
http://www.openwall.com/lists/oss-security/2010/09/28/6
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=252a52aa4fa22a668f019e55b3aac3ff71ec1c29
http://jon.oberheide.org/files/cve-2010-3437.c
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc6
https://bugzilla.redhat.com/show_bug.cgi?id=638085
Common Vulnerability Exposure (CVE) ID: CVE-2010-3442
42745
43787
http://www.securityfocus.com/bid/43787
ADV-2010-3321
FEDORA-2010-18983
[oss-security] 20100929 CVE request - kernel: prevent heap corruption in snd_ctl_new()
http://www.openwall.com/lists/oss-security/2010/09/29/2
[oss-security] 20100929 Re: CVE request - kernel: prevent heap corruption in snd_ctl_new()
http://www.openwall.com/lists/oss-security/2010/09/29/3
http://www.openwall.com/lists/oss-security/2010/09/29/4
http://www.openwall.com/lists/oss-security/2010/09/29/9
http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779
http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2
https://bugzilla.redhat.com/show_bug.cgi?id=638478
Common Vulnerability Exposure (CVE) ID: CVE-2010-3477
Bugtraq: 20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (Google Search)
Debian Security Information: DSA-2126 (Google Search)
http://www.securitytracker.com/id?1024603
Common Vulnerability Exposure (CVE) ID: CVE-2010-3698
44500
http://www.securityfocus.com/bid/44500
ADV-2010-3123
http://www.vupen.com/english/advisories/2010/3123
RHSA-2010:0898
http://www.redhat.com/support/errata/RHSA-2010-0898.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9581d442b9058d3699b4be568b6e5eae38a41493
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
https://bugzilla.redhat.com/show_bug.cgi?id=639879
Common Vulnerability Exposure (CVE) ID: CVE-2010-3705
[linux-kernel] 20101001 [PATCH] Fix out-of-bounds reading in sctp_asoc_get_hmac()
http://marc.info/?l=linux-kernel&m=128596992418814&w=2
[oss-security] 20101004 CVE request: kernel: SCTP memory corruption in HMAC handling
http://www.openwall.com/lists/oss-security/2010/10/04/2
[oss-security] 20101004 Re: CVE request: kernel: SCTP memory corruption in HMAC handling
http://www.openwall.com/lists/oss-security/2010/10/04/7
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=51e97a12bef19b7e43199fc153cf9bd5f2140362
https://bugzilla.redhat.com/show_bug.cgi?id=640036
Common Vulnerability Exposure (CVE) ID: CVE-2010-3861
44427
http://www.securityfocus.com/bid/44427
[oss-security] 20101025 CVE request: kernel: heap contents leak from ETHTOOL_GRXCLSRLALL
http://openwall.com/lists/oss-security/2010/10/25/4
[oss-security] 20101026 Re: CVE request: kernel: heap contents leak from ETHTOOL_GRXCLSRLALL
http://openwall.com/lists/oss-security/2010/10/26/1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ae6df5f96a51818d6376da5307d773baeece4014
https://bugzilla.redhat.com/show_bug.cgi?id=646725
Common Vulnerability Exposure (CVE) ID: CVE-2010-3865
44549
http://www.securityfocus.com/bid/44549
SUSE-SA:2010:057
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00004.html
[netdev] 20101028 Re: [Security] TIPC security issues
http://www.spinics.net/lists/netdev/msg145359.html
http://www.spinics.net/lists/netdev/msg145397.html
[oss-security] 20101029 CVE request: kernel: iovec overflow in rds_rdma_pages()
http://www.openwall.com/lists/oss-security/2010/10/29/1
[oss-security] 20101101 Re: CVE request: kernel: iovec overflow in rds_rdma_pages()
http://www.openwall.com/lists/oss-security/2010/11/01/1
kernel-rdsrdmapages-overflow(62881)
https://exchange.xforce.ibmcloud.com/vulnerabilities/62881
Common Vulnerability Exposure (CVE) ID: CVE-2010-3874
[netdev] 20101102 [SECURITY] CAN info leak/minor heap overflow
http://www.spinics.net/lists/netdev/msg145791.html
[netdev] 20101110 can-bcm: fix minor heap overflow
http://www.spinics.net/lists/netdev/msg146469.html
[oss-security] 20101103 CVE request: kernel: CAN information leak
http://openwall.com/lists/oss-security/2010/11/03/3
[oss-security] 20101104 Re: CVE request: kernel: CAN information leak
http://openwall.com/lists/oss-security/2010/11/04/4
[oss-security] 20101220 CVE request: kernel: CAN information leak, 2nd attempt
http://openwall.com/lists/oss-security/2010/12/20/2
[oss-security] 20101220 Re: CVE request: kernel: CAN information leak, 2nd attempt
http://openwall.com/lists/oss-security/2010/12/20/3
http://openwall.com/lists/oss-security/2010/12/20/4
http://openwall.com/lists/oss-security/2010/12/20/5
http://openwall.com/lists/oss-security/2010/12/21/1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0597d1b99fcfc2c0eada09a698f85ed413d4ba84
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
https://bugzilla.redhat.com/show_bug.cgi?id=649695
Common Vulnerability Exposure (CVE) ID: CVE-2010-3876
42963
http://secunia.com/advisories/42963
44630
http://www.securityfocus.com/bid/44630
ADV-2011-0168
http://www.vupen.com/english/advisories/2011/0168
RHSA-2011:0162
http://www.redhat.com/support/errata/RHSA-2011-0162.html
[netdev] 20101031 [PATCH 2/3] net: packet: fix information leak to userland
http://marc.info/?l=linux-netdev&m=128854507220908&w=2
[oss-security] 20101102 CVE request: kernel stack infoleaks
http://openwall.com/lists/oss-security/2010/11/02/7
[oss-security] 20101102 Re: CVE request: kernel stack infoleaks
http://openwall.com/lists/oss-security/2010/11/02/10
http://openwall.com/lists/oss-security/2010/11/02/12
http://openwall.com/lists/oss-security/2010/11/02/9
[oss-security] 20101104 Re: CVE request: kernel stack infoleaks
http://openwall.com/lists/oss-security/2010/11/04/5
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=67286640f638f5ad41a946b9a3dc75327950248f
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
https://bugzilla.redhat.com/show_bug.cgi?id=649715
Common Vulnerability Exposure (CVE) ID: CVE-2010-3880
42126
http://secunia.com/advisories/42126
44665
http://www.securityfocus.com/bid/44665
[netdev] 20101103 [PATCH 2/2] inet_diag: Make sure we actually run the same bytecode we audited.
http://www.spinics.net/lists/netdev/msg145899.html
[oss-security] 20101104 CVE request: kernel: logic error in INET_DIAG bytecode auditing
http://openwall.com/lists/oss-security/2010/11/04/9
[oss-security] 20101105 Re: CVE request: kernel: logic error in INET_DIAG bytecode auditing
http://openwall.com/lists/oss-security/2010/11/05/3
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=22e76c849d505d87c5ecf3d3e6742a65f0ff4860
https://bugzilla.redhat.com/show_bug.cgi?id=651264
Common Vulnerability Exposure (CVE) ID: CVE-2010-3904
CERT/CC vulnerability note: VU#362983
http://www.kb.cert.org/vuls/id/362983
https://www.exploit-db.com/exploits/44677/
http://packetstormsecurity.com/files/155751/vReliable-Datagram-Sockets-RDS-rds_page_copy_user-Privilege-Escalation.html
http://www.vsecurity.com/download/tools/linux-rds-exploit.c
http://www.vsecurity.com/resources/advisory/20101019-1/
http://www.redhat.com/support/errata/RHSA-2010-0792.html
http://securitytracker.com/id?1024613
SuSE Security Announcement: SUSE-SA:2010:053 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00008.html
SuSE Security Announcement: SUSE-SA:2010:057 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2010-4072
BugTraq ID: 45054
http://www.securityfocus.com/bid/45054
http://lkml.org/lkml/2010/10/6/454
http://www.openwall.com/lists/oss-security/2010/10/07/1
http://www.openwall.com/lists/oss-security/2010/10/25/3
http://www.redhat.com/support/errata/RHSA-2011-0017.html
http://secunia.com/advisories/42884
http://secunia.com/advisories/43161
SuSE Security Announcement: SUSE-SA:2010:060 (Google Search)
SuSE Security Announcement: SUSE-SA:2011:001 (Google Search)
SuSE Security Announcement: SUSE-SA:2011:004 (Google Search)
SuSE Security Announcement: SUSE-SA:2011:008 (Google Search)
http://www.ubuntu.com/usn/USN-1057-1
http://www.vupen.com/english/advisories/2011/0280
Common Vulnerability Exposure (CVE) ID: CVE-2010-4073
BugTraq ID: 45073
http://www.securityfocus.com/bid/45073
http://lkml.org/lkml/2010/10/6/492
http://securityreason.com/securityalert/8366
Common Vulnerability Exposure (CVE) ID: CVE-2010-4074
BugTraq ID: 45074
http://www.securityfocus.com/bid/45074
http://lkml.org/lkml/2010/9/15/392
http://www.openwall.com/lists/oss-security/2010/09/25/2
http://www.openwall.com/lists/oss-security/2010/10/06/6
Common Vulnerability Exposure (CVE) ID: CVE-2010-4075
BugTraq ID: 43806
http://www.securityfocus.com/bid/43806
http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03388.html
Common Vulnerability Exposure (CVE) ID: CVE-2010-4077
BugTraq ID: 45059
http://www.securityfocus.com/bid/45059
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d281da7ff6f70efca0553c288bb883e8605b3862
http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03387.html
http://securityreason.com/securityalert/8129
Common Vulnerability Exposure (CVE) ID: CVE-2010-4079
BugTraq ID: 45062
http://www.securityfocus.com/bid/45062
http://lkml.org/lkml/2010/9/15/393
Common Vulnerability Exposure (CVE) ID: CVE-2010-4080
BugTraq ID: 45058
http://www.securityfocus.com/bid/45058
BugTraq ID: 45063
http://www.securityfocus.com/bid/45063
http://lkml.org/lkml/2010/9/25/41
SuSE Security Announcement: SUSE-SA:2011:002 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2010-4081
Common Vulnerability Exposure (CVE) ID: CVE-2010-4082
BugTraq ID: 43817
http://www.securityfocus.com/bid/43817
http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03392.html
Common Vulnerability Exposure (CVE) ID: CVE-2010-4083
BugTraq ID: 43809
http://www.securityfocus.com/bid/43809
http://www.spinics.net/lists/mm-commits/msg80234.html
Common Vulnerability Exposure (CVE) ID: CVE-2010-4158
20101109 Kernel 0-day
http://lists.grok.org.uk/pipermail/full-disclosure/2010-November/077321.html
http://www.securityfocus.com/archive/1/514705
20101118 Re: Kernel 0-day
http://www.securityfocus.com/archive/1/514845
42884
44758
http://www.securityfocus.com/bid/44758
RHSA-2011:0017
[netdev] 20101109 [PATCH] Prevent reading uninitialized memory with socket filters
http://www.spinics.net/lists/netdev/msg146361.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=57fe93b374a6b8711995c2d466c502af9f3a08bb
https://bugzilla.redhat.com/show_bug.cgi?id=651698
Common Vulnerability Exposure (CVE) ID: CVE-2010-4160
43056
http://secunia.com/advisories/43056
44762
http://www.securityfocus.com/bid/44762
ADV-2011-0213
http://www.vupen.com/english/advisories/2011/0213
SUSE-SA:2011:005
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html
[netdev] 20101027 Re: [PATCH 1/4] tipc: Fix bugs in tipc_msg_calc_data_size()
http://www.spinics.net/lists/netdev/msg145248.html
[netdev] 20101031 [SECURITY] L2TP send buffer allocation size overflows
http://www.spinics.net/lists/netdev/msg145673.html
[oss-security] 20101110 CVE request: kernel: L2TP send buffer allocation size overflows
http://openwall.com/lists/oss-security/2010/11/10/5
[oss-security] 20101110 Re: CVE request: kernel: L2TP send buffer allocation size overflows
http://openwall.com/lists/oss-security/2010/11/10/16
[oss-security] 20101124 Re: CVE request: kernel: L2TP send buffer allocation size overflows
http://openwall.com/lists/oss-security/2010/11/24/12
http://openwall.com/lists/oss-security/2010/11/24/4
http://openwall.com/lists/oss-security/2010/11/24/5
http://openwall.com/lists/oss-security/2010/11/24/6
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=253eacc070b114c2ec1f81b067d2fed7305467b0
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8acfe468b0384e834a303f08ebc4953d72fb690a
http://xorl.wordpress.com/2010/11/11/cve-2010-4160-linux-kernel-l2tp-integer-overflows/
https://bugzilla.redhat.com/show_bug.cgi?id=651892
Common Vulnerability Exposure (CVE) ID: CVE-2010-4162
44793
http://www.securityfocus.com/bid/44793
[oss-security] 20101110 CVE request: kernel: Multiple DoS issues in block layer
http://openwall.com/lists/oss-security/2010/11/10/18
[oss-security] 20101112 Re: CVE request: kernel: Multiple DoS issues in block layer
http://openwall.com/lists/oss-security/2010/11/12/2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cb4644cac4a2797afc847e6c92736664d4b0ea34
https://bugzilla.redhat.com/show_bug.cgi?id=652529
Common Vulnerability Exposure (CVE) ID: CVE-2010-4163
[oss-security] 20101129 Re: CVE request: kernel: Multiple DoS issues in block layer
http://openwall.com/lists/oss-security/2010/11/29/1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9284bcf4e335e5f18a8bc7b26461c33ab60d0689
https://bugzilla.redhat.com/show_bug.cgi?id=652957
Common Vulnerability Exposure (CVE) ID: CVE-2010-4242
45014
http://www.securityfocus.com/bid/45014
[linux-kernel] 20101007 Peculiar stuff in hci_ath3k/badness in hci_uart
https://lkml.org/lkml/2010/10/7/255
http://git.kernel.org/linus/c19483cc5e56ac5e22dd19cf25ba210ab1537773
http://xorl.wordpress.com/2010/12/01/cve-2010-4242-linux-kernel-bluetooth-hci-uart-invalid-pointer-access/
https://bugzilla.redhat.com/show_bug.cgi?id=641410
kernel-hciuartttyopen-dos(64617)
https://exchange.xforce.ibmcloud.com/vulnerabilities/64617
Common Vulnerability Exposure (CVE) ID: CVE-2010-4248
45028
http://www.securityfocus.com/bid/45028
[oss-security] 20101123 CVE request: kernel: posix-cpu-timers: workaround to suppress the problems with mt exec
http://www.openwall.com/lists/oss-security/2010/11/23/2
[oss-security] 20101124 Re: CVE request: kernel: posix-cpu-timers: workaround to suppress the problems with mt exec
http://www.openwall.com/lists/oss-security/2010/11/24/9
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0a70217107e6f9844628120412cb27bb4cea194
https://bugzilla.redhat.com/show_bug.cgi?id=656264
Common Vulnerability Exposure (CVE) ID: CVE-2010-4249
15622
http://www.exploit-db.com/exploits/15622/
42354
http://secunia.com/advisories/42354
45037
http://www.securityfocus.com/bid/45037
[linux-kernel] 20101123 Unix socket local DOS (OOM)
http://lkml.org/lkml/2010/11/23/395
[linux-kernel] 20101124 [PATCH net-next-2.6] scm: lower SCM_MAX_FD
http://lkml.org/lkml/2010/11/23/450
[linux-kernel] 20101125 Simple kernel attack using socketpair. easy, 100% reproductiblle, works under guest. no way to protect :(
http://lkml.org/lkml/2010/11/25/8
[netdev] 20101124 [PATCH] af_unix: limit unix_tot_inflight
http://marc.info/?l=linux-netdev&m=129059035929046&w=2
[oss-security] 20101124 CVE request: kernel: unix socket local dos
http://www.openwall.com/lists/oss-security/2010/11/24/2
[oss-security] 20101124 Re: CVE request: kernel: unix socket local dos
http://www.openwall.com/lists/oss-security/2010/11/24/10
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=9915672d41273f5b77f1b3c29b391ffb7732b84b
http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.37-rc3-next-20101125.bz2
https://bugzilla.redhat.com/show_bug.cgi?id=656756
Common Vulnerability Exposure (CVE) ID: CVE-2010-4263
45208
http://www.securityfocus.com/bid/45208
[oss-security] 20101206 CVE request: kernel: igb panics when receiving tag vlan packet
http://openwall.com/lists/oss-security/2010/12/06/3
[oss-security] 20101206 Re: CVE request: kernel: igb panics when receiving tag vlan packet
http://openwall.com/lists/oss-security/2010/12/06/9
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=31b24b955c3ebbb6f3008a6374e61cf7c05a193c
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34
https://bugzilla.kernel.org/show_bug.cgi?id=15582
https://bugzilla.redhat.com/show_bug.cgi?id=660188
Common Vulnerability Exposure (CVE) ID: CVE-2010-4525
45676
http://www.securityfocus.com/bid/45676
70377
http://osvdb.org/70377
ADV-2011-0123
http://www.vupen.com/english/advisories/2011/0123
RHSA-2011:0028
http://www.redhat.com/support/errata/RHSA-2011-0028.html
[oss-security] 20110105 CVE-2010-4525 kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak
http://www.openwall.com/lists/oss-security/2011/01/05/1
[oss-security] 20110105 Re: CVE-2010-4525 kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak
http://www.openwall.com/lists/oss-security/2011/01/05/9
[oss-security] 20110106 Re: CVE-2010-4525 kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak
http://www.openwall.com/lists/oss-security/2011/01/06/3
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4525
kernel-kvmvcpueventsinterrupt-info-disc(64519)
https://exchange.xforce.ibmcloud.com/vulnerabilities/64519
Common Vulnerability Exposure (CVE) ID: CVE-2010-4668
BugTraq ID: 45660
http://www.securityfocus.com/bid/45660
http://lkml.org/lkml/2010/11/29/70
http://lkml.org/lkml/2010/11/29/68
http://openwall.com/lists/oss-security/2010/11/30/4
http://openwall.com/lists/oss-security/2010/11/30/7
XForce ISS Database: linux-blkrqmapuseriov-dos(64496)
https://exchange.xforce.ibmcloud.com/vulnerabilities/64496
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.