Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.68867
Category:Mandrake Local Security Checks
Title:Mandriva Security Advisory MDVSA-2011:029 (kernel)
Summary:NOSUMMARY
Description:Description:
The remote host is missing an update to kernel
announced via advisory MDVSA-2011:029.

A vulnerability was discovered and corrected in the Linux 2.6 kernel:
The X.25 implementation does not properly parse facilities, which
allows remote attackers to cause a denial of service (heap memory
corruption and panic) or possibly have
unspecified other impact via malformed data, a different vulnerability
than CVE-2010-4164. (CVE-2010-3873)

The bcm_connect function Broadcast Manager in the Controller Area
Network (CAN) implementation in the Linux creates a publicly accessible
file with a filename containing a kernel memory address, which allows
local users to obtain potentially sensitive information about kernel
memory use by listing this filename. (CVE-2010-4565)

The install_special_mapping function in mm/mmap.c does not make an
expected security_file_mmap function call, which allows local users
to bypass intended mmap_min_addr restrictions and possibly conduct
NULL pointer dereference attacks via a crafted assembly-language
application. (CVE-2010-4346)

The sk_run_filter function does not check whether a certain memory
location has been initialized before executing a BPF_S_LD_MEM
or BPF_S_LDX_MEM instruction, which allows local users to obtain
potentially sensitive information from kernel stack memory via a
crafted socket filter. (CVE-2010-4158)

Heap-based buffer overflow in the bcm_connect function the Broadcast
Manager in the Controller Area Network (CAN)on 64-bit platforms might
allow local users to cause a denial of service (memory corruption)
via a connect operation. (CVE-2010-3874)

The blk_rq_map_user_iov function in block/blk-map.c allows local
users to cause a denial of service (panic) via a zero-length I/O
request in a device ioctl to a SCSI device. (CVE-2010-4163)

Multiple integer underflows in the x25_parse_facilities function in
allow remote attackers to cause a denial of service (system crash)
via malformed X.25 (1) X25_FAC_CLASS_A, (2) X25_FAC_CLASS_B, (3)
X25_FAC_CLASS_C, or (4) X25_FAC_CLASS_D facility data. (CVE-2010-4164)

Race condition in the do_setlk function allows local users to cause a
denial of service (crash) via vectors resulting in an interrupted RPC
call that leads to a stray FL_POSIX lock, related to improper handling
of a race between fcntl and close in the EINTR case. (CVE-2009-4307)

Multiple integer overflows in fs/bio.c allow local users to cause
a denial of service (system crash) via a crafted device ioctl to a
SCSI device. (CVE-2010-4162)

Integer overflow in the ext4_ext_get_blocks function in
fs/ext4/extents.c allows local users to cause a denial of service
(BUG and system crash) via a write operation on the last block of a
large file, followed by a sync operation. (CVE-2010-3015)

The do_exit function in kernel/exit.c does not properly handle a
KERNEL_DS get_fs value, which allows local users to bypass intended
access_ok restrictions, overwrite arbitrary kernel memory locations,
and gain privileges by leveraging a (1) BUG, (2) NULL pointer
dereference, or (3) page fault, as demonstrated by vectors involving
the clear_child_tid feature and the splice system call. (CVE-2010-4258)

The ax25_getname function in net/ax25/af_ax25.c does not initialize
a certain structure, which allows local users to obtain potentially
sensitive information from kernel stack memory by reading a copy of
this structure. (CVE-2010-3875)

Integer overflow in the do_io_submit function in fs/aio.c allows local
users to cause a denial of service or possibly have unspecified other
impact via crafted use of the io_submit system call. (CVE-2010-3067)

Race condition in the __exit_signal function in kernel/exit.c
allows local users to cause a denial of service via vectors
related to multithreaded exec, the use of a thread group leader in
kernel/posix-cpu-timers.c, and the selection of a new thread group
leader in the de_thread function in fs/exec.c. (CVE-2010-4248)

Integer signedness error in the pkt_find_dev_from_minor function
in drivers/block/pktcdvd.c allows local users to obtain sensitive
information from kernel memory or cause a denial of service (invalid
pointer dereference and system crash) via a crafted index value in
a PKT_CTRL_CMD_STATUS ioctl call. (CVE-2010-3437)

The get_name function in net/tipc/socket.c does not initialize a
certain structure, which allows local users to obtain potentially
sensitive information from kernel stack memory by reading a copy of
this structure. (CVE-2010-3877)

Stack-based buffer overflow in the parse_tag_11_packet function
in fs/ecryptfs/keystore.c in the eCryptfs subsystem allows local
users to cause a denial of service (system crash) or possibly gain
privileges via vectors involving a crafted eCryptfs file, related
to not ensuring that the key signature length in a Tag 11 packet is
compatible with the key signature buffer size. (CVE-2009-2406)

Multiple integer signedness errors in the TIPC implementation allow
local users to gain privileges via a crafted sendmsg call that
triggers a heap-based buffer overflow, related to the tipc_msg_build
function in net/tipc/msg.c and the verify_iovec function in
net/core/iovec.c. (CVE-2010-3859)

The ipc subsystem does not initialize certain structures, which allows
local users to obtain potentially sensitive information from kernel
stack memory via vectors related to the (1) compat_sys_semctl, (2)
compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c

and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr
functions in ipc/compat_mq.c. (CVE-2010-4073)

The copy_shmid_to_user function does not initialize a certain
structure, which allows local users to obtain potentially sensitive
information from kernel stack memory via vectors related to the shmctl
system call and the old shm interface. (CVE-2010-4072)

The sctp_auth_asoc_get_hmac function in net/sctp/auth.c does not
properly validate the hmac_ids array of an SCTP peer, which allows
remote attackers to cause a denial of service (memory corruption
and panic) via a crafted value in the last element of this
array. (CVE-2010-3705)

The do_tcp_setsockopt function in net/ipv4/tcp.c does not properly
restrict TCP_MAXSEG (aka MSS) values, which allows local users to
cause a denial of service (OOPS) via a setsockopt call that specifies
a small value, leading to a divide-by-zero error or incorrect use of
a signed integer. (CVE-2010-4165)

Multiple integer signedness errors in net/rose/af_rose.c allow local
users to cause a denial of service (heap memory corruption) or possibly
have unspecified other impact via a rose_getname function call,
related to the rose_bind and rose_connect functions. (CVE-2010-3310)

The KVM implementation does not properly reload the FS and GS segment
registers, which allows host OS users to cause a denial of service
(host OS crash) via a KVM_RUN ioctl call in conjunction with a modified
Local Descriptor Table (LDT). (CVE-2010-3698)

This update disable the iommu hardware in order to avoid crash with
some DELL servers (R510, R710,...)

To update your kernel, please follow the directions located at:

http://www.mandriva.com/en/security/kernelupdate

Affected: Enterprise Server 5.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2011:029

Risk factor : Critical

CVSS Score:
8.3

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-4164
42778
http://secunia.com/advisories/42778
42801
http://secunia.com/advisories/42801
42932
http://secunia.com/advisories/42932
43291
http://secunia.com/advisories/43291
45055
http://www.securityfocus.com/bid/45055
ADV-2011-0012
http://www.vupen.com/english/advisories/2011/0012
ADV-2011-0124
http://www.vupen.com/english/advisories/2011/0124
ADV-2011-0298
http://www.vupen.com/english/advisories/2011/0298
ADV-2011-0375
http://www.vupen.com/english/advisories/2011/0375
DSA-2126
http://www.debian.org/security/2010/dsa-2126
MDVSA-2011:029
http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
SUSE-SA:2010:060
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
SUSE-SA:2011:001
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
SUSE-SA:2011:002
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
SUSE-SA:2011:004
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
SUSE-SA:2011:007
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
SUSE-SA:2011:008
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
[netdev] 20101111 [SECURITY] [PATCH] Prevent crashing when parsing bad X.25
http://marc.info/?l=linux-netdev&m=128951543005554&w=2
[oss-security] 20101111 CVE request: kernel: remote DoS in X.25
http://openwall.com/lists/oss-security/2010/11/11/2
[oss-security] 20101112 Re: CVE request: kernel: remote DoS in X.25
http://openwall.com/lists/oss-security/2010/11/12/3
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5ef41308f94dcbb3b7afc56cdef1c2ba53fa5d2f
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
https://bugzilla.redhat.com/show_bug.cgi?id=652517
Common Vulnerability Exposure (CVE) ID: CVE-2010-3873
[netdev] 20101102 [SECURITY] memory corruption in X.25 facilities parsing
http://www.spinics.net/lists/netdev/msg145786.html
[netdev] 20101104 Re: [SECURITY] memory corruption in X.25 facilities parsing
http://www.spinics.net/lists/netdev/msg145873.html
[oss-security] 20101103 CVE request: X.25 remote DoS
http://openwall.com/lists/oss-security/2010/11/03/2
[oss-security] 20101104 Re: CVE request: X.25 remote DoS
http://openwall.com/lists/oss-security/2010/11/04/3
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a6331d6f9a4298173b413cf99a40cc86a9d92c37
https://bugzilla.redhat.com/show_bug.cgi?id=649693
openSUSE-SU-2013:0925
http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html
Common Vulnerability Exposure (CVE) ID: CVE-2010-4565
BugTraq ID: 44661
http://www.securityfocus.com/bid/44661
https://bugzilla.redhat.com/show_bug.cgi?id=664544
http://www.spinics.net/lists/netdev/msg145796.html
http://www.spinics.net/lists/netdev/msg145791.html
http://www.spinics.net/lists/netdev/msg146270.html
http://www.spinics.net/lists/netdev/msg146468.html
http://openwall.com/lists/oss-security/2010/11/03/3
http://openwall.com/lists/oss-security/2010/11/04/4
http://openwall.com/lists/oss-security/2010/12/20/2
http://openwall.com/lists/oss-security/2010/12/21/1
Common Vulnerability Exposure (CVE) ID: CVE-2010-4346
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
http://www.securityfocus.com/archive/1/520102/100/0/threaded
42570
http://secunia.com/advisories/42570
45323
http://www.securityfocus.com/bid/45323
46397
http://secunia.com/advisories/46397
[linux-kernel] 20101209 [PATCH] install_special_mapping skips security_file_mmap check.
https://lkml.org/lkml/2010/12/9/222
[oss-security] 20101209 Re: [taviso@cmpxchg8b.com: [PATCH] install_special_mapping skips security_file_mmap check.]
http://openwall.com/lists/oss-security/2010/12/09/13
[oss-security] 20101209 [taviso@cmpxchg8b.com: [PATCH] install_special_mapping skips security_file_mmap check.]
http://openwall.com/lists/oss-security/2010/12/09/12
[oss-security] 20101210 Re: Subject: CVE request: kernel: install_special_mapping skips security_file_mmap check
http://openwall.com/lists/oss-security/2010/12/10/3
[oss-security] 20101210 Subject: CVE request: kernel: install_special_mapping skips security_file_mmap check
http://openwall.com/lists/oss-security/2010/12/10/2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=462e635e5b73ba9a4c03913b77138cd57ce4b050
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc6
http://www.vmware.com/security/advisories/VMSA-2011-0012.html
https://bugzilla.redhat.com/show_bug.cgi?id=662189
Common Vulnerability Exposure (CVE) ID: CVE-2010-4158
20101109 Kernel 0-day
http://lists.grok.org.uk/pipermail/full-disclosure/2010-November/077321.html
http://www.securityfocus.com/archive/1/514705
20101118 Re: Kernel 0-day
http://www.securityfocus.com/archive/1/514845
42745
http://secunia.com/advisories/42745
42884
http://secunia.com/advisories/42884
42890
http://secunia.com/advisories/42890
42963
http://secunia.com/advisories/42963
44758
http://www.securityfocus.com/bid/44758
ADV-2010-3321
http://www.vupen.com/english/advisories/2010/3321
ADV-2011-0168
http://www.vupen.com/english/advisories/2011/0168
FEDORA-2010-18983
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
RHSA-2010:0958
http://www.redhat.com/support/errata/RHSA-2010-0958.html
RHSA-2011:0007
http://www.redhat.com/support/errata/RHSA-2011-0007.html
RHSA-2011:0017
http://www.redhat.com/support/errata/RHSA-2011-0017.html
RHSA-2011:0162
http://www.redhat.com/support/errata/RHSA-2011-0162.html
[netdev] 20101109 [PATCH] Prevent reading uninitialized memory with socket filters
http://www.spinics.net/lists/netdev/msg146361.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=57fe93b374a6b8711995c2d466c502af9f3a08bb
https://bugzilla.redhat.com/show_bug.cgi?id=651698
Common Vulnerability Exposure (CVE) ID: CVE-2010-3874
[netdev] 20101102 [SECURITY] CAN info leak/minor heap overflow
[netdev] 20101110 can-bcm: fix minor heap overflow
http://www.spinics.net/lists/netdev/msg146469.html
[oss-security] 20101103 CVE request: kernel: CAN information leak
[oss-security] 20101104 Re: CVE request: kernel: CAN information leak
[oss-security] 20101220 CVE request: kernel: CAN information leak, 2nd attempt
[oss-security] 20101220 Re: CVE request: kernel: CAN information leak, 2nd attempt
http://openwall.com/lists/oss-security/2010/12/20/3
http://openwall.com/lists/oss-security/2010/12/20/4
http://openwall.com/lists/oss-security/2010/12/20/5
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0597d1b99fcfc2c0eada09a698f85ed413d4ba84
https://bugzilla.redhat.com/show_bug.cgi?id=649695
Common Vulnerability Exposure (CVE) ID: CVE-2010-4163
44793
http://www.securityfocus.com/bid/44793
[oss-security] 20101110 CVE request: kernel: Multiple DoS issues in block layer
http://openwall.com/lists/oss-security/2010/11/10/18
[oss-security] 20101112 Re: CVE request: kernel: Multiple DoS issues in block layer
http://openwall.com/lists/oss-security/2010/11/12/2
[oss-security] 20101129 Re: CVE request: kernel: Multiple DoS issues in block layer
http://openwall.com/lists/oss-security/2010/11/29/1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9284bcf4e335e5f18a8bc7b26461c33ab60d0689
https://bugzilla.redhat.com/show_bug.cgi?id=652957
Common Vulnerability Exposure (CVE) ID: CVE-2009-4307
http://lkml.org/lkml/2009/12/9/255
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9874
http://www.redhat.com/support/errata/RHSA-2010-0380.html
http://secunia.com/advisories/37658
http://secunia.com/advisories/38017
http://secunia.com/advisories/38276
SuSE Security Announcement: SUSE-SA:2010:001 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html
SuSE Security Announcement: SUSE-SA:2010:005 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html
Common Vulnerability Exposure (CVE) ID: CVE-2010-4162
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cb4644cac4a2797afc847e6c92736664d4b0ea34
https://bugzilla.redhat.com/show_bug.cgi?id=652529
Common Vulnerability Exposure (CVE) ID: CVE-2010-3015
BugTraq ID: 42477
http://www.securityfocus.com/bid/42477
Bugtraq: 20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (Google Search)
Debian Security Information: DSA-2094 (Google Search)
http://www.debian.org/security/2010/dsa-2094
http://www.mandriva.com/security/advisories?name=MDVSA-2010:172
http://www.mandriva.com/security/advisories?name=MDVSA-2010:247
http://marc.info/?l=oss-security&m=128192548904503&w=2
http://marc.info/?l=oss-security&m=128197862004376&w=2
http://marc.info/?l=oss-security&m=128201627016896&w=2
http://www.redhat.com/support/errata/RHSA-2010-0723.html
SuSE Security Announcement: SUSE-SA:2010:040 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html
SuSE Security Announcement: SUSE-SA:2010:054 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html
SuSE Security Announcement: SUSE-SA:2011:007 (Google Search)
http://www.ubuntu.com/usn/USN-1000-1
http://www.vupen.com/english/advisories/2010/3117
XForce ISS Database: kernel-stacksize-dos(61156)
https://exchange.xforce.ibmcloud.com/vulnerabilities/61156
Common Vulnerability Exposure (CVE) ID: CVE-2010-4258
20101207 Linux kernel exploit
http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0086.html
43056
http://secunia.com/advisories/43056
ADV-2011-0213
http://www.vupen.com/english/advisories/2011/0213
SUSE-SA:2011:005
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html
[linux-kernel] 20101201 Re: [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS.
https://lkml.org/lkml/2010/12/1/543
[linux-kernel] 20101201 [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS.
http://marc.info/?l=linux-kernel&m=129117048916957&w=2
[oss-security] 20101202 CVE request: kernel: failure to revert address limit override in OOPS error path
http://openwall.com/lists/oss-security/2010/12/02/2
[oss-security] 20101202 Re: CVE request: kernel: failure to revert address limit override in OOPS error path
http://openwall.com/lists/oss-security/2010/12/02/7
[oss-security] 20101202 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses
http://openwall.com/lists/oss-security/2010/12/02/4
[oss-security] 20101202 kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses
http://openwall.com/lists/oss-security/2010/12/02/3
[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses
http://openwall.com/lists/oss-security/2010/12/08/4
http://openwall.com/lists/oss-security/2010/12/08/5
http://openwall.com/lists/oss-security/2010/12/08/9
[oss-security] 20101209 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses
http://openwall.com/lists/oss-security/2010/12/09/14
http://openwall.com/lists/oss-security/2010/12/09/4
http://blog.nelhage.com/2010/12/cve-2010-4258-from-dos-to-privesc/
http://code.google.com/p/chromium-os/issues/detail?id=10234
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177
http://googlechromereleases.blogspot.com/2011/01/chrome-os-beta-channel-update.html
https://bugzilla.redhat.com/show_bug.cgi?id=659567
Common Vulnerability Exposure (CVE) ID: CVE-2010-3875
44630
http://www.securityfocus.com/bid/44630
MDVSA-2011:051
http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
[netdev] 20101031 [PATCH 1/3] net: ax25: fix information leak to userland
http://marc.info/?l=linux-netdev&m=128854507120898&w=2
[oss-security] 20101102 CVE request: kernel stack infoleaks
http://openwall.com/lists/oss-security/2010/11/02/7
[oss-security] 20101104 Re: CVE request: kernel stack infoleaks
http://openwall.com/lists/oss-security/2010/11/04/5
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fe10ae53384e48c51996941b7720ee16995cbcb7
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
https://bugzilla.redhat.com/show_bug.cgi?id=649713
Common Vulnerability Exposure (CVE) ID: CVE-2010-3067
MDVSA-2010:257
http://www.mandriva.com/security/advisories?name=MDVSA-2010:257
RHSA-2010:0758
http://www.redhat.com/support/errata/RHSA-2010-0758.html
RHSA-2010:0779
http://www.redhat.com/support/errata/RHSA-2010-0779.html
RHSA-2010:0839
http://www.redhat.com/support/errata/RHSA-2010-0839.html
USN-1000-1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478
http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2
https://bugzilla.redhat.com/show_bug.cgi?id=629441
kernel-doiosubmit-dos(61884)
https://exchange.xforce.ibmcloud.com/vulnerabilities/61884
Common Vulnerability Exposure (CVE) ID: CVE-2010-4248
42789
http://secunia.com/advisories/42789
45028
http://www.securityfocus.com/bid/45028
ADV-2011-0024
http://www.vupen.com/english/advisories/2011/0024
RHSA-2011:0004
http://www.redhat.com/support/errata/RHSA-2011-0004.html
[oss-security] 20101123 CVE request: kernel: posix-cpu-timers: workaround to suppress the problems with mt exec
http://www.openwall.com/lists/oss-security/2010/11/23/2
[oss-security] 20101124 Re: CVE request: kernel: posix-cpu-timers: workaround to suppress the problems with mt exec
http://www.openwall.com/lists/oss-security/2010/11/24/9
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0a70217107e6f9844628120412cb27bb4cea194
https://bugzilla.redhat.com/show_bug.cgi?id=656264
Common Vulnerability Exposure (CVE) ID: CVE-2010-3437
15150
http://www.exploit-db.com/exploits/15150/
43551
http://www.securityfocus.com/bid/43551
RHSA-2010:0842
http://www.redhat.com/support/errata/RHSA-2010-0842.html
[oss-security] 20100928 CVE request - kernel: pktcdvd ioctl dev_minor missing range check
http://www.openwall.com/lists/oss-security/2010/09/28/2
[oss-security] 20100928 Re: CVE request - kernel: pktcdvd ioctl dev_minor missing range check
http://www.openwall.com/lists/oss-security/2010/09/28/6
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=252a52aa4fa22a668f019e55b3aac3ff71ec1c29
http://jon.oberheide.org/files/cve-2010-3437.c
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc6
https://bugzilla.redhat.com/show_bug.cgi?id=638085
Common Vulnerability Exposure (CVE) ID: CVE-2010-3877
[netdev] 20101031 [PATCH 3/3] net: tipc: fix information leak to userland
http://marc.info/?l=linux-netdev&m=128854507420917&w=2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=88f8a5e3e7defccd3925cabb1ee4d3994e5cdb52
https://bugzilla.redhat.com/show_bug.cgi?id=649717
kernel-getname-info-disc(64578)
https://exchange.xforce.ibmcloud.com/vulnerabilities/64578
Common Vulnerability Exposure (CVE) ID: CVE-2009-2406
1022663
http://www.securitytracker.com/id?1022663
20090728 [RISE-2009002] Linux eCryptfs parse_tag_11_packet Literal Data Buffer Overflow Vulnerability
http://www.securityfocus.com/archive/1/505334/100/0/threaded
20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
http://www.securityfocus.com/archive/1/507985/100/0/threaded
35851
http://www.securityfocus.com/bid/35851
35985
http://secunia.com/advisories/35985
36045
http://secunia.com/advisories/36045
36051
http://secunia.com/advisories/36051
36054
http://secunia.com/advisories/36054
36116
http://secunia.com/advisories/36116
36131
http://secunia.com/advisories/36131
37471
http://secunia.com/advisories/37471
ADV-2009-2041
http://www.vupen.com/english/advisories/2009/2041
ADV-2009-3316
http://www.vupen.com/english/advisories/2009/3316
DSA-1844
http://www.debian.org/security/2009/dsa-1844
DSA-1845
http://www.debian.org/security/2009/dsa-1845
FEDORA-2009-8144
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00223.html
FEDORA-2009-8264
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00166.html
RHSA-2009:1193
http://www.redhat.com/support/errata/RHSA-2009-1193.html
SUSE-SR:2009:015
http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html
USN-807-1
http://www.ubuntu.com/usn/usn-807-1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6352a29305373ae6196491e6d4669f301e26492e
http://risesecurity.org/advisories/RISE-2009002.txt
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
oval:org.mitre.oval:def:10072
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10072
oval:org.mitre.oval:def:8246
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8246
Common Vulnerability Exposure (CVE) ID: CVE-2010-3859
44354
http://www.securityfocus.com/bid/44354
[netdev] 20101021 TIPC security issues
http://marc.info/?l=linux-netdev&m=128770476511716&w=2
[netdev] 20101027 Re: [PATCH 1/4] tipc: Fix bugs in tipc_msg_calc_data_size()
http://www.spinics.net/lists/netdev/msg145248.html
[netdev] 20101027 [PATCH 0/4] RFC: tipc int vs size_t fixes
http://www.spinics.net/lists/netdev/msg145247.html
[netdev] 20101027 [PATCH 1/4] tipc: Fix bugs in tipc_msg_calc_data_size()
http://www.spinics.net/lists/netdev/msg145263.html
[netdev] 20101027 [PATCH 2/4] tipc: Fix bugs in tipc_msg_build()
http://www.spinics.net/lists/netdev/msg145265.html
[netdev] 20101027 [PATCH 3/4] tipc: Update arguments to use size_t for iovec array sizes
http://www.spinics.net/lists/netdev/msg145262.html
[netdev] 20101027 [PATCH 4/4] tipc: Fix bugs in sending of large amounts of byte-stream data
http://www.spinics.net/lists/netdev/msg145264.html
[netdev] 20101028 Re: [PATCH 2/4] tipc: Fix bugs in tipc_msg_build()
http://www.spinics.net/lists/netdev/msg145352.html
[oss-security] 20101022 CVE request: kernel: heap overflow in TIPC
http://www.openwall.com/lists/oss-security/2010/10/22/2
[oss-security] 20101022 Re: CVE request: kernel: heap overflow in TIPC
http://www.openwall.com/lists/oss-security/2010/10/22/5
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=253eacc070b114c2ec1f81b067d2fed7305467b0
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8acfe468b0384e834a303f08ebc4953d72fb690a
https://bugzilla.redhat.com/show_bug.cgi?id=645867
Common Vulnerability Exposure (CVE) ID: CVE-2010-4073
BugTraq ID: 45073
http://www.securityfocus.com/bid/45073
Debian Security Information: DSA-2126 (Google Search)
http://lkml.org/lkml/2010/10/6/492
http://www.openwall.com/lists/oss-security/2010/10/07/1
http://www.openwall.com/lists/oss-security/2010/10/25/3
http://securityreason.com/securityalert/8366
SuSE Security Announcement: SUSE-SA:2010:060 (Google Search)
SuSE Security Announcement: SUSE-SA:2011:001 (Google Search)
SuSE Security Announcement: SUSE-SA:2011:004 (Google Search)
SuSE Security Announcement: SUSE-SA:2011:008 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2010-4072
BugTraq ID: 45054
http://www.securityfocus.com/bid/45054
http://lkml.org/lkml/2010/10/6/454
http://secunia.com/advisories/42758
http://secunia.com/advisories/43161
http://www.ubuntu.com/usn/USN-1041-1
http://www.ubuntu.com/usn/USN-1057-1
http://www.vupen.com/english/advisories/2011/0070
http://www.vupen.com/english/advisories/2011/0280
Common Vulnerability Exposure (CVE) ID: CVE-2010-3705
[linux-kernel] 20101001 [PATCH] Fix out-of-bounds reading in sctp_asoc_get_hmac()
http://marc.info/?l=linux-kernel&m=128596992418814&w=2
[oss-security] 20101004 CVE request: kernel: SCTP memory corruption in HMAC handling
http://www.openwall.com/lists/oss-security/2010/10/04/2
[oss-security] 20101004 Re: CVE request: kernel: SCTP memory corruption in HMAC handling
http://www.openwall.com/lists/oss-security/2010/10/04/7
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=51e97a12bef19b7e43199fc153cf9bd5f2140362
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
https://bugzilla.redhat.com/show_bug.cgi?id=640036
Common Vulnerability Exposure (CVE) ID: CVE-2010-4165
44830
http://www.securityfocus.com/bid/44830
69241
http://www.osvdb.org/69241
8111
http://securityreason.com/securityalert/8111
8123
http://securityreason.com/securityalert/8123
[netdev] 20101110 Re: possible kernel oops from user MSS
http://www.spinics.net/lists/netdev/msg146495.html
[netdev] 20101110 possible kernel oops from user MSS
http://www.spinics.net/lists/netdev/msg146405.html
[oss-security] 20101112 CVE request: kernel: possible kernel oops from user MSS
http://www.openwall.com/lists/oss-security/2010/11/12/1
[oss-security] 20101112 Re: CVE request: kernel: possible kernel oops from user MSS
http://www.openwall.com/lists/oss-security/2010/11/12/4
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7a1abd08d52fdeddb3e9a5a33f2f15cc6a5674d2
https://bugzilla.redhat.com/show_bug.cgi?id=652508
Common Vulnerability Exposure (CVE) ID: CVE-2010-3310
41493
http://secunia.com/advisories/41493
43368
http://www.securityfocus.com/bid/43368
68163
http://www.osvdb.org/68163
SUSE-SA:2010:050
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html
SUSE-SA:2010:051
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00004.html
SUSE-SA:2010:054
[linux-netdev] 20100920 [PATCH] rose: Fix signedness issues wrt. digi count.
http://marc.info/?l=linux-netdev&m=128502238927086&w=2
[oss-security] 20100921 CVE request: kernel: Heap corruption in ROSE
http://www.openwall.com/lists/oss-security/2010/09/21/1
[oss-security] 20100921 Re: CVE request: kernel: Heap corruption in ROSE
http://www.openwall.com/lists/oss-security/2010/09/21/2
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=9828e6e6e3f19efcb476c567b9999891d051f52f
http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100923.bz2
kernel-rose-bind-dos(61953)
https://exchange.xforce.ibmcloud.com/vulnerabilities/61953
Common Vulnerability Exposure (CVE) ID: CVE-2010-3698
44500
http://www.securityfocus.com/bid/44500
ADV-2010-3123
http://www.vupen.com/english/advisories/2010/3123
RHSA-2010:0898
http://www.redhat.com/support/errata/RHSA-2010-0898.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9581d442b9058d3699b4be568b6e5eae38a41493
https://bugzilla.redhat.com/show_bug.cgi?id=639879
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.