English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 72151 CVE descriptions
and 38907 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.69134
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-1074-2 (linux-fsl-imx51)
Summary:Ubuntu USN-1074-2 (linux-fsl-imx51)
Description:The remote host is missing an update to linux-fsl-imx51
announced via advisory USN-1074-2.

Details follow:

USN-1074-1 fixed vulnerabilities in linux-fsl-imx51 in Ubuntu 9.10. This
update provides the corresponding updates for Ubuntu 10.04.

Original advisory details:

Al Viro discovered a race condition in the TTY driver. A local attacker
could exploit this to crash the system, leading to a denial of service.
(CVE-2009-4895)

Dan Rosenberg discovered that the MOVE_EXT ext4 ioctl did not correctly
check file permissions. A local attacker could overwrite append-only files,
leading to potential data loss. (CVE-2010-2066)

Dan Rosenberg discovered that the swapexit xfs ioctl did not correctly
check file permissions. A local attacker could exploit this to read from
write-only files, leading to a loss of privacy. (CVE-2010-2226)

Gael Delalleu, Rafal Wojtczuk, and Brad Spengler discovered that the memory
manager did not properly handle when applications grow stacks into adjacent
memory regions. A local attacker could exploit this to gain control of
certain applications, potentially leading to privilege escalation, as
demonstrated in attacks against the X server. (CVE-2010-2240)

Suresh Jayaraman discovered that CIFS did not correctly validate certain
response packats. A remote attacker could send specially crafted traffic
that would crash the system, leading to a denial of service.
(CVE-2010-2248)

Ben Hutchings discovered that the ethtool interface did not correctly check
certain sizes. A local attacker could perform malicious ioctl calls that
could crash the system, leading to a denial of service. (CVE-2010-2478,
CVE-2010-3084)

James Chapman discovered that L2TP did not correctly evaluate checksum
capabilities. If an attacker could make malicious routing changes, they
could crash the system, leading to a denial of service. (CVE-2010-2495)

Neil Brown discovered that NFSv4 did not correctly check certain write
requests. A remote attacker could send specially crafted traffic that could
crash the system or possibly gain root privileges. (CVE-2010-2521)

David Howells discovered that DNS resolution in CIFS could be spoofed. A
local attacker could exploit this to control DNS replies, leading to a loss
of privacy and possible privilege escalation. (CVE-2010-2524)

Dan Rosenberg discovered that the btrfs filesystem did not correctly
validate permissions when using the clone function. A local attacker could
overwrite the contents of file handles that were opened for append-only, or
potentially read arbitrary contents, leading to a loss of privacy. Only
Ubuntu 9.10 was affected. (CVE-2010-2538)

Bob Peterson discovered that GFS2 rename operations did not correctly
validate certain sizes. A local attacker could exploit this to crash the
system, leading to a denial of service. (CVE-2010-2798)

Kees Cook discovered that under certain situations the ioctl subsystem for
DRM did not properly sanitize its arguments. A local attacker could exploit
this to read previously freed kernel memory, leading to a loss of privacy.
(CVE-2010-2803)

Eric Dumazet discovered that many network functions could leak kernel stack
contents. A local attacker could exploit this to read portions of kernel
memory, leading to a loss of privacy. (CVE-2010-2942, CVE-2010-3477)

Dave Chinner discovered that the XFS filesystem did not correctly order
inode lookups when exported by NFS. A remote attacker could exploit this to
read or write disk blocks that had changed file assignment or had become
unlinked, leading to a loss of privacy. (CVE-2010-2943)

Sergey Vlasov discovered that JFS did not correctly handle certain extended
attributes. A local attacker could bypass namespace access rules, leading
to a loss of privacy. (CVE-2010-2946)

Tavis Ormandy discovered that the IRDA subsystem did not correctly shut
down. A local attacker could exploit this to cause the system to crash or
possibly gain root privileges. (CVE-2010-2954)

Brad Spengler discovered that the wireless extensions did not correctly
validate certain request sizes. A local attacker could exploit this to read
portions of kernel memory, leading to a loss of privacy. (CVE-2010-2955)

Ben Hawkes discovered an integer overflow in the Controller Area Network
(CVE-2010-2959)

Kees Cook discovered that the Intel i915 graphics driver did not correctly
validate memory regions. A local attacker with access to the video card
could read and write arbitrary kernel memory to gain root privileges.
Ubuntu 10.10 was not affected. (CVE-2010-2962)

Kees Cook discovered that the V4L1 32bit compat interface did not correctly
validate certain parameters. A local attacker on a 64bit system with access
to a video device could exploit this to gain root privileges.
(CVE-2010-2963)

Toshiyuki Okajima discovered that ext4 did not correctly check certain
parameters. A local attacker could exploit this to crash the system or
overwrite the last block of large files. (CVE-2010-3015)

Tavis Ormandy discovered that the AIO subsystem did not correctly validate
certain parameters. A local attacker could exploit this to crash the system
or possibly gain root privileges. (CVE-2010-3067)

Dan Rosenberg discovered that certain XFS ioctls leaked kernel stack
contents. A local attacker could exploit this to read portions of kernel
memory, leading to a loss of privacy. (CVE-2010-3078)

Robert Swiecki discovered that ftrace did not correctly handle mutexes. A
local attacker could exploit this to crash the kernel, leading to a denial
of service. (CVE-2010-3079)

Tavis Ormandy discovered that the OSS sequencer device did not correctly
shut down. A local attacker could exploit this to crash the system or
possibly gain root privileges. (CVE-2010-3080)

Ben Hawkes discovered that the Linux kernel did not correctly validate
memory ranges on 64bit kernels when allocating memory on behalf of 32bit
system calls. On a 64bit system, a local attacker could perform malicious
multicast getsockopt calls to gain root privileges. (CVE-2010-3081)

Dan Rosenberg discovered that several network ioctls did not clear kernel
memory correctly. A local user could exploit this to read kernel stack
memory, leading to a loss of privacy. (CVE-2010-3296, CVE-2010-3297,
CVE-2010-3298)

Ben Hawkes discovered that the Linux kernel did not correctly filter
registers on 64bit kernels when performing 32bit system calls. On a 64bit
system, a local attacker could manipulate 32bit system calls to gain root
privileges. (CVE-2010-3301)

Dan Rosenberg discovered that the ROSE driver did not correctly check
parameters. A local attacker with access to a ROSE network device could
exploit this to crash the system or possibly gain root privileges.
(CVE-2010-3310)

Thomas Dreibholz discovered that SCTP did not correctly handle appending
packet chunks. A remote attacker could send specially crafted traffic to
crash the system, leading to a denial of service. (CVE-2010-3432)

Dan Rosenberg discovered that the CD driver did not correctly check
parameters. A local attacker could exploit this to read arbitrary kernel
memory, leading to a loss of privacy. (CVE-2010-3437)

Dan Rosenberg discovered that the Sound subsystem did not correctly
validate parameters. A local attacker could exploit this to crash the
system, leading to a denial of service. (CVE-2010-3442)

Dan Jacobson discovered that ThinkPad video output was not correctly access
controlled. A local attacker could exploit this to hang the system, leading
to a denial of service. (CVE-2010-3448)

It was discovered that KVM did not correctly initialize certain CPU
registers. A local attacker could exploit this to crash the system, leading
to a denial of service. (CVE-2010-3698)

Dan Rosenberg discovered that SCTP did not correctly handle HMAC
calculations. A remote attacker could send specially crafted traffic that
would crash the system, leading to a denial of service. (CVE-2010-3705)

Nelson Elhage discovered several problems with the Acorn Econet protocol
driver. A local user could cause a denial of service via a NULL pointer
dereference, escalate privileges by overflowing the kernel stack, and
assign Econet addresses to arbitrary interfaces. (CVE-2010-3848,
CVE-2010-3849, CVE-2010-3850)

Brad Spengler discovered that stack memory for new a process was not
correctly calculated. A local attacker could exploit this to crash the
system, leading to a denial of service. (CVE-2010-3858)

Kees Cook discovered that the ethtool interface did not correctly clear
kernel memory. A local attacker could read kernel heap memory, leading to a
loss of privacy. (CVE-2010-3861)

Dan Rosenberg discovered that the RDS network protocol did not correctly
check certain parameters. A local attacker could exploit this gain root
privileges. (CVE-2010-3904)

Kees Cook and Vasiliy Kulikov discovered that the shm interface did not
clear kernel memory correctly. A local attacker could exploit this to read
kernel stack memory, leading to a loss of privacy. (CVE-2010-4072)

Dan Rosenberg discovered that IPC structures were not correctly initialized
on 64bit systems. A local attacker could exploit this to read kernel stack
memory, leading to a loss of privacy. (CVE-2010-4073)

Dan Rosenberg discovered that the USB subsystem did not correctly
initialize certian structures. A local attacker could exploit this to read
kernel stack memory, leading to a loss of privacy. (CVE-2010-4074)

Dan Rosenberg discovered that the SiS video driver did not correctly clear
kernel memory. A local attacker could exploit this to read kernel stack
memory, leading to a loss of privacy. (CVE-2010-4078)

Dan Rosenberg discovered that the ivtv V4L driver did not correctly
initialize certian structures. A local attacker could exploit this to read
kernel stack memory, leading to a loss of privacy. (CVE-2010-4079)

Steve Chen discovered that setsockopt did not correctly check MSS values. A
local attacker could make a specially crafted socket call to crash the
system, leading to a denial of service. (CVE-2010-4165)

Dave Jones discovered that the mprotect system call did not correctly
handle merged VMAs. A local attacker could exploit this to crash the
system, leading to a denial of service. (CVE-2010-4169)

Vegard Nossum discovered that memory garbage collection was not handled
correctly for active sockets. A local attacker could exploit this to
allocate all available kernel memory, leading to a denial of service.
(CVE-2010-4249)

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 10.04 LTS:
linux-image-2.6.31-608-imx51 2.6.31-608.22

After a standard system update you need to reboot your computer to make
all the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-1074-2

Risk factor : Critical
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-4895
http://www.openwall.com/lists/oss-security/2010/06/15/2
http://www.openwall.com/lists/oss-security/2010/06/15/3
http://www.openwall.com/lists/oss-security/2010/06/15/4
http://www.openwall.com/lists/oss-security/2010/06/15/5
Debian Security Information: DSA-2094 (Google Search)
http://www.debian.org/security/2010/dsa-2094
http://www.ubuntu.com/usn/USN-1000-1
Common Vulnerability Exposure (CVE) ID: CVE-2010-2066
Bugtraq: 20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX (Google Search)
http://www.securityfocus.com/archive/1/archive/1/516397/100/0/threaded
http://www.openwall.com/lists/oss-security/2010/06/07/1
http://www.openwall.com/lists/oss-security/2010/06/09/1
http://www.redhat.com/support/errata/RHSA-2010-0610.html
SuSE Security Announcement: SUSE-SA:2010:033 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00000.html
http://secunia.com/advisories/43315
Common Vulnerability Exposure (CVE) ID: CVE-2010-2226
http://marc.info/?l=oss-security&m=127677135609357&w=2
http://marc.info/?l=oss-security&m=127687486331790&w=2
http://archives.free.net.ph/message/20100616.130710.301704aa.en.html
http://archives.free.net.ph/message/20100616.135735.40f53a32.en.html
http://www.mandriva.com/security/advisories?name=MDVSA-2010:198
SuSE Security Announcement: SUSE-SA:2010:060 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
SuSE Security Announcement: SUSE-SA:2011:007 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
BugTraq ID: 40920
http://www.securityfocus.com/bid/40920
http://www.vupen.com/english/advisories/2011/0298
Common Vulnerability Exposure (CVE) ID: CVE-2010-2248
http://www.openwall.com/lists/oss-security/2010/06/28/1
http://www.openwall.com/lists/oss-security/2010/06/28/6
http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
RedHat Security Advisories: RHSA-2010:0606
https://rhn.redhat.com/errata/RHSA-2010-0606.html
BugTraq ID: 42242
http://www.securityfocus.com/bid/42242
http://securitytracker.com/id?1024285
Common Vulnerability Exposure (CVE) ID: CVE-2010-2478
http://article.gmane.org/gmane.linux.network/164869
http://www.openwall.com/lists/oss-security/2010/06/29/3
http://www.openwall.com/lists/oss-security/2010/06/29/1
http://www.openwall.com/lists/oss-security/2010/06/30/17
SuSE Security Announcement: SUSE-SA:2010:040 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html
BugTraq ID: 41223
http://www.securityfocus.com/bid/41223
Common Vulnerability Exposure (CVE) ID: CVE-2010-2495
http://www.openwall.com/lists/oss-security/2010/06/23/3
http://www.openwall.com/lists/oss-security/2010/07/04/3
http://www.openwall.com/lists/oss-security/2010/07/04/2
http://www.openwall.com/lists/oss-security/2010/07/06/11
Common Vulnerability Exposure (CVE) ID: CVE-2010-2521
http://www.openwall.com/lists/oss-security/2010/07/07/1
http://www.openwall.com/lists/oss-security/2010/07/09/2
http://www.redhat.com/support/errata/RHSA-2010-0893.html
http://www.redhat.com/support/errata/RHSA-2010-0907.html
BugTraq ID: 42249
http://www.securityfocus.com/bid/42249
http://securitytracker.com/id?1024286
http://www.vupen.com/english/advisories/2010/3050
Common Vulnerability Exposure (CVE) ID: CVE-2010-2524
http://marc.info/?l=oss-security&m=128072090331700&w=2
http://marc.info/?l=oss-security&m=128078387328921&w=2
http://marc.info/?l=oss-security&m=128080755321157&w=2
http://www.mandriva.com/security/advisories?name=MDVSA-2010:172
Common Vulnerability Exposure (CVE) ID: CVE-2010-2538
http://www.openwall.com/lists/oss-security/2010/07/21/4
http://www.openwall.com/lists/oss-security/2010/07/21/10
http://www.ubuntu.com/usn/USN-1041-1
BugTraq ID: 41854
http://www.securityfocus.com/bid/41854
http://secunia.com/advisories/42758
http://www.vupen.com/english/advisories/2011/0070
Common Vulnerability Exposure (CVE) ID: CVE-2010-2798
Bugtraq: 20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (Google Search)
http://www.securityfocus.com/archive/1/archive/1/520102/100/0/threaded
http://www.openwall.com/lists/oss-security/2010/08/02/1
http://www.openwall.com/lists/oss-security/2010/08/02/10
http://www.redhat.com/support/errata/RHSA-2010-0723.html
http://www.redhat.com/support/errata/RHSA-2010-0660.html
http://www.redhat.com/support/errata/RHSA-2010-0670.html
SuSE Security Announcement: SUSE-SA:2010:052 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html
SuSE Security Announcement: SUSE-SA:2010:054 (Google Search)
BugTraq ID: 42124
http://www.securityfocus.com/bid/42124
http://securitytracker.com/id?1024386
http://secunia.com/advisories/46397
Common Vulnerability Exposure (CVE) ID: CVE-2010-2942
http://www.openwall.com/lists/oss-security/2010/08/18/1
http://www.openwall.com/lists/oss-security/2010/08/19/4
http://www.redhat.com/support/errata/RHSA-2010-0771.html
http://www.redhat.com/support/errata/RHSA-2010-0779.html
SuSE Security Announcement: SUSE-SA:2010:041 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html
BugTraq ID: 42529
http://www.securityfocus.com/bid/42529
http://secunia.com/advisories/41512
http://www.vupen.com/english/advisories/2010/2430
Common Vulnerability Exposure (CVE) ID: CVE-2010-2943
http://article.gmane.org/gmane.comp.file-systems.xfs.general/33767
http://article.gmane.org/gmane.comp.file-systems.xfs.general/33771
http://article.gmane.org/gmane.comp.file-systems.xfs.general/33768
http://article.gmane.org/gmane.comp.file-systems.xfs.general/33769
http://www.openwall.com/lists/oss-security/2010/08/18/2
http://www.openwall.com/lists/oss-security/2010/08/19/5
http://oss.sgi.com/archives/xfs/2010-06/msg00191.html
http://oss.sgi.com/archives/xfs/2010-06/msg00198.html
http://www.ubuntu.com/usn/USN-1057-1
BugTraq ID: 42527
http://www.securityfocus.com/bid/42527
http://secunia.com/advisories/43161
http://www.vupen.com/english/advisories/2011/0280
Common Vulnerability Exposure (CVE) ID: CVE-2010-2946
http://www.openwall.com/lists/oss-security/2010/08/20/1
http://www.openwall.com/lists/oss-security/2010/08/20/11
SuSE Security Announcement: SUSE-SA:2011:008 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
BugTraq ID: 42589
http://www.securityfocus.com/bid/42589
http://secunia.com/advisories/41321
http://secunia.com/advisories/43291
http://www.vupen.com/english/advisories/2011/0375
Common Vulnerability Exposure (CVE) ID: CVE-2010-2954
http://www.spinics.net/lists/netdev/msg139404.html
http://marc.info/?l=oss-security&m=128331787923285&w=2
http://twitter.com/taviso/statuses/22635752128
SuSE Security Announcement: SUSE-SA:2010:050 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html
http://secunia.com/advisories/41234
http://www.vupen.com/english/advisories/2010/2266
XForce ISS Database: kernel-irdabind-dos(61522)
http://xforce.iss.net/xforce/xfdb/61522
Common Vulnerability Exposure (CVE) ID: CVE-2010-2955
http://lkml.org/lkml/2010/8/27/413
http://lkml.org/lkml/2010/8/30/351
http://lkml.org/lkml/2010/8/30/127
http://lkml.org/lkml/2010/8/30/146
http://www.openwall.com/lists/oss-security/2010/08/31/1
http://forums.grsecurity.net/viewtopic.php?f=3&t=2290
http://grsecurity.net/~spender/wireless-infoleak-fix2.patch
http://www.redhat.com/support/errata/RHSA-2010-0842.html
BugTraq ID: 42885
http://www.securityfocus.com/bid/42885
http://secunia.com/advisories/41245
Common Vulnerability Exposure (CVE) ID: CVE-2010-2962
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
http://www.redhat.com/support/errata/RHSA-2010-0958.html
SuSE Security Announcement: SUSE-SA:2010:051 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00004.html
BugTraq ID: 44067
http://www.securityfocus.com/bid/44067
http://secunia.com/advisories/42745
http://www.vupen.com/english/advisories/2010/3321
Common Vulnerability Exposure (CVE) ID: CVE-2010-2963
http://www.outflux.net/blog/archives/2010/10/19/cve-2010-2963-v4l-compat-exploit/
Debian Security Information: DSA-2126 (Google Search)
http://www.debian.org/security/2010/dsa-2126
http://www.mandriva.com/security/advisories?name=MDVSA-2010:257
SuSE Security Announcement: SUSE-SA:2010:053 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00008.html
SuSE Security Announcement: SUSE-SA:2010:057 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00004.html
BugTraq ID: 44242
http://www.securityfocus.com/bid/44242
http://www.securitytracker.com/id?1024710
Common Vulnerability Exposure (CVE) ID: CVE-2010-3015
http://marc.info/?l=oss-security&m=128192548904503&w=2
http://marc.info/?l=oss-security&m=128197862004376&w=2
http://marc.info/?l=oss-security&m=128201627016896&w=2
http://www.mandriva.com/security/advisories?name=MDVSA-2010:247
http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
BugTraq ID: 42477
http://www.securityfocus.com/bid/42477
http://www.vupen.com/english/advisories/2010/3117
XForce ISS Database: kernel-stacksize-dos(61156)
http://xforce.iss.net/xforce/xfdb/61156
Common Vulnerability Exposure (CVE) ID: CVE-2010-3067
http://www.redhat.com/support/errata/RHSA-2010-0758.html
http://www.redhat.com/support/errata/RHSA-2010-0839.html
http://www.redhat.com/support/errata/RHSA-2011-0007.html
SuSE Security Announcement: SUSE-SA:2011:001 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
SuSE Security Announcement: SUSE-SA:2011:002 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
http://secunia.com/advisories/42778
http://secunia.com/advisories/42801
http://secunia.com/advisories/42890
http://www.vupen.com/english/advisories/2011/0012
XForce ISS Database: kernel-doiosubmit-dos(61884)
http://xforce.iss.net/xforce/xfdb/61884
Common Vulnerability Exposure (CVE) ID: CVE-2010-3078
http://www.openwall.com/lists/oss-security/2010/09/07/1
http://www.openwall.com/lists/oss-security/2010/09/07/12
http://www.linux.sgi.com/archives/xfs-masters/2010-09/msg00002.html
BugTraq ID: 43022
http://www.securityfocus.com/bid/43022
http://securitytracker.com/id?1024418
http://secunia.com/advisories/41284
Common Vulnerability Exposure (CVE) ID: CVE-2010-3079
BugTraq ID: 43684
http://www.securityfocus.com/bid/43684
Common Vulnerability Exposure (CVE) ID: CVE-2010-3080
http://www.openwall.com/lists/oss-security/2010/09/08/7
BugTraq ID: 43062
http://www.securityfocus.com/bid/43062
Common Vulnerability Exposure (CVE) ID: CVE-2010-3081
Bugtraq: 20101130 VMSA-2010-0017 VMware ESX third party update for Service Console kerne (Google Search)
http://www.securityfocus.com/archive/1/514938/30/30/threaded
http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0273.html
http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0278.html
http://marc.info/?l=oss-security&m=128461522230211&w=2
http://blog.ksplice.com/2010/09/cve-2010-3081/
http://isc.sans.edu/diary.html?storyid=9574
http://sota.gen.nz/compat1/
http://www.mandriva.com/security/advisories?name=MDVSA-2010:214
http://www.redhat.com/support/errata/RHSA-2010-0882.html
SuSE Security Announcement: SUSE-SR:2010:017 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
http://secunia.com/advisories/42384
http://www.vupen.com/english/advisories/2010/3083
Common Vulnerability Exposure (CVE) ID: CVE-2010-3084
http://www.spinics.net/lists/netdev/msg140133.html
http://www.openwall.com/lists/oss-security/2010/09/09/1
http://www.openwall.com/lists/oss-security/2010/09/11/1
BugTraq ID: 43098
http://www.securityfocus.com/bid/43098
Common Vulnerability Exposure (CVE) ID: CVE-2010-3296
http://lkml.org/lkml/2010/9/11/170
http://www.openwall.com/lists/oss-security/2010/09/14/2
http://www.openwall.com/lists/oss-security/2010/09/14/7
http://www.redhat.com/support/errata/RHSA-2011-0017.html
BugTraq ID: 43221
http://www.securityfocus.com/bid/43221
http://secunia.com/advisories/41440
http://secunia.com/advisories/42884
Common Vulnerability Exposure (CVE) ID: CVE-2010-3297
http://lkml.org/lkml/2010/9/11/168
BugTraq ID: 43229
http://www.securityfocus.com/bid/43229
Common Vulnerability Exposure (CVE) ID: CVE-2010-3298
http://lkml.org/lkml/2010/9/11/167
BugTraq ID: 43226
http://www.securityfocus.com/bid/43226
Common Vulnerability Exposure (CVE) ID: CVE-2010-3301
http://www.openwall.com/lists/oss-security/2010/09/16/1
http://www.openwall.com/lists/oss-security/2010/09/16/3
http://sota.gen.nz/compat2/
Common Vulnerability Exposure (CVE) ID: CVE-2010-3310
http://marc.info/?l=linux-netdev&m=128502238927086&w=2
http://www.openwall.com/lists/oss-security/2010/09/21/1
http://www.openwall.com/lists/oss-security/2010/09/21/2
BugTraq ID: 43368
http://www.securityfocus.com/bid/43368
http://www.osvdb.org/68163
http://secunia.com/advisories/41493
XForce ISS Database: kernel-rose-bind-dos(61953)
http://xforce.iss.net/xforce/xfdb/61953
Common Vulnerability Exposure (CVE) ID: CVE-2010-3432
http://marc.info/?l=linux-netdev&m=128453869227715&w=3
http://marc.info/?l=oss-security&m=128534569803598&w=2
http://marc.info/?l=oss-security&m=128537701808336&w=2
http://www.redhat.com/support/errata/RHSA-2010-0936.html
http://www.redhat.com/support/errata/RHSA-2011-0004.html
BugTraq ID: 43480
http://www.securityfocus.com/bid/43480
http://secunia.com/advisories/42400
http://secunia.com/advisories/42789
http://www.vupen.com/english/advisories/2010/3113
http://www.vupen.com/english/advisories/2011/0024
Common Vulnerability Exposure (CVE) ID: CVE-2010-3437
http://www.exploit-db.com/exploits/15150/
http://www.openwall.com/lists/oss-security/2010/09/28/2
http://www.openwall.com/lists/oss-security/2010/09/28/6
http://jon.oberheide.org/files/cve-2010-3437.c
SuSE Security Announcement: SUSE-SA:2011:004 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
BugTraq ID: 43551
http://www.securityfocus.com/bid/43551
http://secunia.com/advisories/42932
http://www.vupen.com/english/advisories/2011/0124
Common Vulnerability Exposure (CVE) ID: CVE-2010-3442
http://www.openwall.com/lists/oss-security/2010/09/29/2
http://www.openwall.com/lists/oss-security/2010/09/29/3
http://www.openwall.com/lists/oss-security/2010/09/29/4
http://www.openwall.com/lists/oss-security/2010/09/29/9
BugTraq ID: 43787
http://www.securityfocus.com/bid/43787
Common Vulnerability Exposure (CVE) ID: CVE-2010-3448
http://openwall.com/lists/oss-security/2010/06/23/2
http://openwall.com/lists/oss-security/2010/09/28/1
http://openwall.com/lists/oss-security/2010/09/29/7
http://openwall.com/lists/oss-security/2010/09/30/6
http://openwall.com/lists/oss-security/2010/09/30/1
XForce ISS Database: kernel-thinkpad-dos(64580)
http://xforce.iss.net/xforce/xfdb/64580
Common Vulnerability Exposure (CVE) ID: CVE-2010-3477
http://www.securitytracker.com/id?1024603
Common Vulnerability Exposure (CVE) ID: CVE-2010-3698
http://www.redhat.com/support/errata/RHSA-2010-0898.html
BugTraq ID: 44500
http://www.securityfocus.com/bid/44500
http://www.vupen.com/english/advisories/2010/3123
Common Vulnerability Exposure (CVE) ID: CVE-2010-3705
http://marc.info/?l=linux-kernel&m=128596992418814&w=2
http://www.openwall.com/lists/oss-security/2010/10/04/2
http://www.openwall.com/lists/oss-security/2010/10/04/7
Common Vulnerability Exposure (CVE) ID: CVE-2010-3848
http://openwall.com/lists/oss-security/2010/11/30/1
SuSE Security Announcement: SUSE-SA:2011:005 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html
http://www.ubuntu.com/usn/USN-1023-1
http://secunia.com/advisories/43056
http://www.vupen.com/english/advisories/2011/0213
Common Vulnerability Exposure (CVE) ID: CVE-2010-3849
http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0086.html
Common Vulnerability Exposure (CVE) ID: CVE-2010-3850
Common Vulnerability Exposure (CVE) ID: CVE-2010-3858
http://www.exploit-db.com/exploits/15619
http://www.openwall.com/lists/oss-security/2010/10/21/1
http://www.openwall.com/lists/oss-security/2010/10/22/4
http://grsecurity.net/~spender/64bit_dos.c
BugTraq ID: 44301
http://www.securityfocus.com/bid/44301
Common Vulnerability Exposure (CVE) ID: CVE-2010-3861
http://openwall.com/lists/oss-security/2010/10/25/4
http://openwall.com/lists/oss-security/2010/10/26/1
BugTraq ID: 44427
http://www.securityfocus.com/bid/44427
Common Vulnerability Exposure (CVE) ID: CVE-2010-3904
http://www.vsecurity.com/download/tools/linux-rds-exploit.c
http://www.vsecurity.com/resources/advisory/20101019-1/
http://www.redhat.com/support/errata/RHSA-2010-0792.html
CERT/CC vulnerability note: VU#362983
http://www.kb.cert.org/vuls/id/362983
http://securitytracker.com/id?1024613
Common Vulnerability Exposure (CVE) ID: CVE-2010-4072
http://lkml.org/lkml/2010/10/6/454
http://www.openwall.com/lists/oss-security/2010/10/07/1
http://www.openwall.com/lists/oss-security/2010/10/25/3
http://www.redhat.com/support/errata/RHSA-2011-0162.html
BugTraq ID: 45054
http://www.securityfocus.com/bid/45054
http://secunia.com/advisories/42963
http://www.vupen.com/english/advisories/2011/0168
Common Vulnerability Exposure (CVE) ID: CVE-2010-4073
http://lkml.org/lkml/2010/10/6/492
BugTraq ID: 45073
http://www.securityfocus.com/bid/45073
http://securityreason.com/securityalert/8366
Common Vulnerability Exposure (CVE) ID: CVE-2010-4074
http://lkml.org/lkml/2010/9/15/392
http://www.openwall.com/lists/oss-security/2010/09/25/2
http://www.openwall.com/lists/oss-security/2010/10/06/6
BugTraq ID: 45074
http://www.securityfocus.com/bid/45074
Common Vulnerability Exposure (CVE) ID: CVE-2010-4078
BugTraq ID: 43810
http://www.securityfocus.com/bid/43810
Common Vulnerability Exposure (CVE) ID: CVE-2010-4079
http://lkml.org/lkml/2010/9/15/393
BugTraq ID: 45062
http://www.securityfocus.com/bid/45062
Common Vulnerability Exposure (CVE) ID: CVE-2010-4165
http://www.spinics.net/lists/netdev/msg146495.html
http://www.spinics.net/lists/netdev/msg146405.html
http://www.openwall.com/lists/oss-security/2010/11/12/1
http://www.openwall.com/lists/oss-security/2010/11/12/4
BugTraq ID: 44830
http://www.securityfocus.com/bid/44830
http://www.osvdb.org/69241
http://securityreason.com/securityalert/8111
http://securityreason.com/securityalert/8123
Common Vulnerability Exposure (CVE) ID: CVE-2010-4169
http://marc.info/?l=oss-security&m=128979684911295&w=2
http://marc.info/?l=oss-security&m=128984344103497&w=2
BugTraq ID: 44861
http://www.securityfocus.com/bid/44861
XForce ISS Database: kernel-perfeventmmap-dos(63316)
http://xforce.iss.net/xforce/xfdb/63316
Common Vulnerability Exposure (CVE) ID: CVE-2010-4249
http://www.exploit-db.com/exploits/15622/
http://lkml.org/lkml/2010/11/23/395
http://lkml.org/lkml/2010/11/23/450
http://lkml.org/lkml/2010/11/25/8
http://marc.info/?l=linux-netdev&m=129059035929046&w=2
http://www.openwall.com/lists/oss-security/2010/11/24/2
http://www.openwall.com/lists/oss-security/2010/11/24/10
BugTraq ID: 45037
http://www.securityfocus.com/bid/45037
http://secunia.com/advisories/42354
Common Vulnerability Exposure (CVE) ID: CVE-2010-2240
Bugtraq: 20110428 VMSA-2011-0007 VMware ESXi and ESX Denial of Service and third party updates for Likewise components and ESX Service Console (Google Search)
http://www.securityfocus.com/archive/1/archive/1/517739/100/0/threaded
http://lists.vmware.com/pipermail/security-announce/2011/000133.html
http://www.invisiblethingslab.com/resources/misc-2010/xorg-large-memory-attacks.pdf
RedHat Security Advisories: RHSA-2010:0661
https://rhn.redhat.com/errata/RHSA-2010-0661.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:13247
http://securitytracker.com/id?1024344
Common Vulnerability Exposure (CVE) ID: CVE-2010-2803
Common Vulnerability Exposure (CVE) ID: CVE-2010-2959
http://www.openwall.com/lists/oss-security/2010/08/20/2
http://jon.oberheide.org/files/i-can-haz-modharden.c
http://lists.fedoraproject.org/pipermail/package-announce/2010-September/046947.html
BugTraq ID: 42585
http://www.securityfocus.com/bid/42585
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

This is only one of 38907 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.