English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 72452 CVE descriptions
and 39087 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.69357
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-1093-1 (linux-mvl-dove)
Summary:Ubuntu USN-1093-1 (linux-mvl-dove)
Description:The remote host is missing an update to linux-mvl-dove
announced via advisory USN-1093-1.

Details follow:

Joel Becker discovered that OCFS2 did not correctly validate on-disk
symlink structures. If an attacker were able to trick a user or automated
system into mounting a specially crafted filesystem, it could crash the
system or exposde kernel memory, leading to a loss of privacy.

Ben Hutchings discovered that the ethtool interface did not correctly
check certain sizes. A local attacker could perform malicious ioctl calls
that could crash the system, leading to a denial of service. (Only Ubuntu
10.04 LTS was affected.) (CVE-2010-2478, CVE-2010-3084)

Eric Dumazet discovered that many network functions could leak kernel
stack contents. A local attacker could exploit this to read portions
of kernel memory, leading to a loss of privacy. (Ubuntu 10.10 was not
affected.) (CVE-2010-2942, CVE-2010-3477)

Dave Chinner discovered that the XFS filesystem did not correctly order
inode lookups when exported by NFS. A remote attacker could exploit this to
read or write disk blocks that had changed file assignment or had become
unlinked, leading to a loss of privacy. (CVE-2010-2943)

Tavis Ormandy discovered that the IRDA subsystem did not correctly shut
down. A local attacker could exploit this to cause the system to crash
or possibly gain root privileges. (Ubuntu 10.10 was not affected.)
(CVE-2010-2954)

Brad Spengler discovered that the wireless extensions did not correctly
validate certain request sizes. A local attacker could exploit this
to read portions of kernel memory, leading to a loss of privacy. (Only
Ubuntu 10.04 LTS was affected.) (CVE-2010-2955)

Tavis Ormandy discovered that the session keyring did not correctly
check for its parent. On systems without a default session keyring,
a local attacker could exploit this to crash the system, leading to a
denial of service. (Only Ubuntu 10.04 LTS was affected.) (CVE-2010-2960)

Kees Cook discovered that the Intel i915 graphics driver did not correctly
validate memory regions. A local attacker with access to the video card
could read and write arbitrary kernel memory to gain root privileges.
(CVE-2010-2962)

Kees Cook discovered that the V4L1 32bit compat interface did not correctly
validate certain parameters. A local attacker on a 64bit system with access
to a video device could exploit this to gain root privileges.
(CVE-2010-2963)

Tavis Ormandy discovered that the AIO subsystem did not correctly
validate certain parameters. A local attacker could exploit this to
crash the system or possibly gain root privileges. (Ubuntu 10.10 was
not affected.) (CVE-2010-3067)

Dan Rosenberg discovered that certain XFS ioctls leaked kernel stack
contents. A local attacker could exploit this to read portions of kernel
memory, leading to a loss of privacy. (10.10 was not affected.)
(CVE-2010-3078)

Robert Swiecki discovered that ftrace did not correctly handle mutexes. A
local attacker could exploit this to crash the kernel, leading to a denial
of service. (CVE-2010-3079)

Tavis Ormandy discovered that the OSS sequencer device did not
correctly shut down. A local attacker could exploit this to crash
the system or possibly gain root privileges. (Ubuntu 10.10 was not
affected.) (CVE-2010-3080)

Dan Rosenberg discovered that several network ioctls did not clear kernel
memory correctly. A local user could exploit this to read kernel stack
memory, leading to a loss of privacy. (CVE-2010-3296, CVE-2010-3297,
CVE-2010-3298)

Dan Rosenberg discovered that the ROSE driver did not correctly check
parameters. A local attacker with access to a ROSE network device could
exploit this to crash the system or possibly gain root privileges. (Ubuntu
10.10 was not affected.) (CVE-2010-3310)

Thomas Dreibholz discovered that SCTP did not correctly handle appending
packet chunks. A remote attacker could send specially crafted traffic
to crash the system, leading to a denial of service. (Ubuntu 10.10 was
not affected.) (CVE-2010-3432)

Dan Rosenberg discovered that the CD driver did not correctly check
parameters. A local attacker could exploit this to read arbitrary kernel
memory, leading to a loss of privacy. (CVE-2010-3437)

Dan Rosenberg discovered that the Sound subsystem did not correctly
validate parameters. A local attacker could exploit this to crash
the system, leading to a denial of service. (Ubuntu 10.10 was not
affected.) (CVE-2010-3442)

Dan Rosenberg discovered that SCTP did not correctly handle HMAC
calculations. A remote attacker could send specially crafted traffic
that would crash the system, leading to a denial of service.
(CVE-2010-3705)

Nelson Elhage discovered several problems with the Acorn Econet protocol
driver. A local user could cause a denial of service via a NULL pointer
dereference, escalate privileges by overflowing the kernel stack, and
assign Econet addresses to arbitrary interfaces. (CVE-2010-3848,
CVE-2010-3849, CVE-2010-3850)

Brad Spengler discovered that stack memory for new a process was not
correctly calculated. A local attacker could exploit this to crash the
system, leading to a denial of service. (CVE-2010-3858)

Dan Rosenberg discovered that the Linux kernel TIPC implementation
contained multiple integer signedness errors. A local attacker could
exploit this to gain root privileges. (CVE-2010-3859)

Kees Cook discovered that the ethtool interface did not correctly clear
kernel memory. A local attacker could read kernel heap memory, leading to a
loss of privacy. (CVE-2010-3861)

Thomas Pollet discovered that the RDS network protocol did not check
certain iovec buffers. A local attacker could exploit this to crash the
system or possibly execute arbitrary code as the root user. (CVE-2010-3865)

Dan Rosenberg discovered that the Linux kernel X.25 implementation
incorrectly parsed facilities. A remote attacker could exploit this to
crash the kernel, leading to a denial of service. (CVE-2010-3873)

Dan Rosenberg discovered that the CAN protocol on 64bit systems did not
correctly calculate the size of certain buffers. A local attacker could
exploit this to crash the system or possibly execute arbitrary code as the
root user. (CVE-2010-3874)

Vasiliy Kulikov discovered that the Linux kernel X.25 implementation did
not correctly clear kernel memory. A local attacker could exploit this to
read kernel stack memory, leading to a loss of privacy. (CVE-2010-3875)

Vasiliy Kulikov discovered that the Linux kernel sockets implementation did
not properly initialize certain structures. A local attacker could exploit
this to read kernel stack memory, leading to a loss of privacy.
(CVE-2010-3876)

Vasiliy Kulikov discovered that the TIPC interface did not correctly
initialize certain structures. A local attacker could exploit this to read
kernel stack memory, leading to a loss of privacy. (CVE-2010-3877)

Nelson Elhage discovered that the Linux kernel IPv4 implementation did not
properly audit certain bytecodes in netlink messages. A local attacker
could exploit this to cause the kernel to hang, leading to a denial of
service. (CVE-2010-3880)

Dan Rosenberg discovered that the RDS network protocol did not
correctly check certain parameters. A local attacker could exploit
this gain root privileges. (CVE-2010-3904)

Kees Cook and Vasiliy Kulikov discovered that the shm interface did not
clear kernel memory correctly. A local attacker could exploit this to read
kernel stack memory, leading to a loss of privacy. (CVE-2010-4072)

Dan Rosenberg discovered that multiple terminal ioctls did not correctly
initialize structure memory. A local attacker could exploit this to read
portions of kernel stack memory, leading to a loss of privacy.
(CVE-2010-4075, CVE-2010-4076, CVE-2010-4077)

Dan Rosenberg discovered that the socket filters did not correctly
initialize structure memory. A local attacker could create malicious
filters to read portions of kernel stack memory, leading to a loss of
privacy. (CVE-2010-4158)

Dan Rosenberg discovered that the SCSI subsystem did not correctly validate
iov segments. A local attacker with access to a SCSI device could send
specially crafted requests to crash the system, leading to a denial of
service. (CVE-2010-4163)

Steve Chen discovered that setsockopt did not correctly check MSS values. A
local attacker could make a specially crafted socket call to crash the
system, leading to a denial of service. (CVE-2010-4165)

Dave Jones discovered that the mprotect system call did not correctly
handle merged VMAs. A local attacker could exploit this to crash the
system, leading to a denial of service. (CVE-2010-4169)

Dan Rosenberg discovered that the RDS protocol did not correctly check
ioctl arguments. A local attacker could exploit this to crash the system,
leading to a denial of service. (CVE-2010-4175)

Vegard Nossum discovered that memory garbage collection was not handled
correctly for active sockets. A local attacker could exploit this to
allocate all available kernel memory, leading to a denial of service.
(CVE-2010-4249)

It was discovered that multithreaded exec did not handle CPU timers
correctly. A local attacker could exploit this to crash the system, leading
to a denial of service. (CVE-2010-4248)

Krishna Gudipati discovered that the bfa adapter driver did not correctly
initialize certain structures. A local attacker could read files in /sys to
crash the system, leading to a denial of service. (CVE-2010-4343)

Tavis Ormandy discovered that the install_special_mapping function could
bypass the mmap_min_addr restriction. A local attacker could exploit this
to mmap 4096 bytes below the mmap_min_addr area, possibly improving the
chances of performing NULL pointer dereference attacks. (CVE-2010-4346)

It was discovered that the ICMP stack did not correctly handle certain
unreachable messages. If a remote attacker were able to acquire a socket
lock, they could send specially crafted traffic that would crash the
system, leading to a denial of service. (CVE-2010-4526)

Dan Rosenberg discovered that the OSS subsystem did not handle name
termination correctly. A local attacker could exploit this crash the system
or gain root privileges. (CVE-2010-4527)

Dan Carpenter discovered that the Infiniband driver did not correctly
handle certain requests. A local user could exploit this to crash the
system or potentially gain root privileges. (CVE-2010-4649, CVE-2011-1044)

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 10.04 LTS:
linux-image-2.6.32-216-dove 2.6.32-216.33

Ubuntu 10.10:
linux-image-2.6.32-416-dove 2.6.32-416.33

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

http://www.securityspace.com/smysecure/catid.html?in=USN-1093-1

Risk factor : Critical
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-2478
http://article.gmane.org/gmane.linux.network/164869
http://www.openwall.com/lists/oss-security/2010/06/29/3
http://www.openwall.com/lists/oss-security/2010/06/29/1
http://www.openwall.com/lists/oss-security/2010/06/30/17
SuSE Security Announcement: SUSE-SA:2010:040 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html
http://www.ubuntu.com/usn/USN-1000-1
BugTraq ID: 41223
http://www.securityfocus.com/bid/41223
Common Vulnerability Exposure (CVE) ID: CVE-2010-2942
Bugtraq: 20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (Google Search)
http://www.securityfocus.com/archive/1/archive/1/520102/100/0/threaded
http://www.openwall.com/lists/oss-security/2010/08/18/1
http://www.openwall.com/lists/oss-security/2010/08/19/4
http://www.redhat.com/support/errata/RHSA-2010-0723.html
http://www.redhat.com/support/errata/RHSA-2010-0771.html
http://www.redhat.com/support/errata/RHSA-2010-0779.html
SuSE Security Announcement: SUSE-SA:2010:041 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html
SuSE Security Announcement: SUSE-SA:2010:052 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html
SuSE Security Announcement: SUSE-SA:2010:060 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
SuSE Security Announcement: SUSE-SA:2010:054 (Google Search)
SuSE Security Announcement: SUSE-SA:2011:007 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
BugTraq ID: 42529
http://www.securityfocus.com/bid/42529
http://secunia.com/advisories/41512
http://secunia.com/advisories/46397
http://www.vupen.com/english/advisories/2010/2430
http://www.vupen.com/english/advisories/2011/0298
Common Vulnerability Exposure (CVE) ID: CVE-2010-2943
http://article.gmane.org/gmane.comp.file-systems.xfs.general/33767
http://article.gmane.org/gmane.comp.file-systems.xfs.general/33771
http://article.gmane.org/gmane.comp.file-systems.xfs.general/33768
http://article.gmane.org/gmane.comp.file-systems.xfs.general/33769
http://www.openwall.com/lists/oss-security/2010/08/18/2
http://www.openwall.com/lists/oss-security/2010/08/19/5
http://oss.sgi.com/archives/xfs/2010-06/msg00191.html
http://oss.sgi.com/archives/xfs/2010-06/msg00198.html
http://www.ubuntu.com/usn/USN-1041-1
http://www.ubuntu.com/usn/USN-1057-1
BugTraq ID: 42527
http://www.securityfocus.com/bid/42527
http://secunia.com/advisories/42758
http://secunia.com/advisories/43161
http://www.vupen.com/english/advisories/2011/0070
http://www.vupen.com/english/advisories/2011/0280
Common Vulnerability Exposure (CVE) ID: CVE-2010-2954
http://www.spinics.net/lists/netdev/msg139404.html
http://marc.info/?l=oss-security&m=128331787923285&w=2
http://twitter.com/taviso/statuses/22635752128
SuSE Security Announcement: SUSE-SA:2010:050 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html
http://secunia.com/advisories/41234
http://www.vupen.com/english/advisories/2010/2266
XForce ISS Database: kernel-irdabind-dos(61522)
http://xforce.iss.net/xforce/xfdb/61522
Common Vulnerability Exposure (CVE) ID: CVE-2010-2955
http://lkml.org/lkml/2010/8/27/413
http://lkml.org/lkml/2010/8/30/351
http://lkml.org/lkml/2010/8/30/127
http://lkml.org/lkml/2010/8/30/146
http://www.openwall.com/lists/oss-security/2010/08/31/1
http://forums.grsecurity.net/viewtopic.php?f=3&t=2290
http://grsecurity.net/~spender/wireless-infoleak-fix2.patch
http://www.redhat.com/support/errata/RHSA-2010-0842.html
BugTraq ID: 42885
http://www.securityfocus.com/bid/42885
http://secunia.com/advisories/41245
Common Vulnerability Exposure (CVE) ID: CVE-2010-2960
http://www.openwall.com/lists/oss-security/2010/09/02/1
http://twitter.com/taviso/statuses/22777866582
BugTraq ID: 42932
http://www.securityfocus.com/bid/42932
http://securitytracker.com/id?1024384
http://secunia.com/advisories/41263
XForce ISS Database: linux-kernel-keyctl-dos(61557)
http://xforce.iss.net/xforce/xfdb/61557
Common Vulnerability Exposure (CVE) ID: CVE-2010-2962
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
http://www.redhat.com/support/errata/RHSA-2010-0958.html
SuSE Security Announcement: SUSE-SA:2010:051 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00004.html
BugTraq ID: 44067
http://www.securityfocus.com/bid/44067
http://secunia.com/advisories/42745
http://www.vupen.com/english/advisories/2010/3321
Common Vulnerability Exposure (CVE) ID: CVE-2010-2963
http://www.outflux.net/blog/archives/2010/10/19/cve-2010-2963-v4l-compat-exploit/
Debian Security Information: DSA-2126 (Google Search)
http://www.debian.org/security/2010/dsa-2126
http://www.mandriva.com/security/advisories?name=MDVSA-2010:257
SuSE Security Announcement: SUSE-SA:2010:053 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00008.html
SuSE Security Announcement: SUSE-SA:2010:057 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00004.html
BugTraq ID: 44242
http://www.securityfocus.com/bid/44242
http://www.securitytracker.com/id?1024710
Common Vulnerability Exposure (CVE) ID: CVE-2010-3067
http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
http://www.redhat.com/support/errata/RHSA-2010-0758.html
http://www.redhat.com/support/errata/RHSA-2010-0839.html
http://www.redhat.com/support/errata/RHSA-2011-0007.html
SuSE Security Announcement: SUSE-SA:2011:001 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
SuSE Security Announcement: SUSE-SA:2011:002 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
SuSE Security Announcement: SUSE-SA:2011:008 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
http://secunia.com/advisories/42778
http://secunia.com/advisories/42801
http://secunia.com/advisories/42890
http://secunia.com/advisories/43291
http://www.vupen.com/english/advisories/2011/0012
http://www.vupen.com/english/advisories/2011/0375
XForce ISS Database: kernel-doiosubmit-dos(61884)
http://xforce.iss.net/xforce/xfdb/61884
Common Vulnerability Exposure (CVE) ID: CVE-2010-3078
http://www.openwall.com/lists/oss-security/2010/09/07/1
http://www.openwall.com/lists/oss-security/2010/09/07/12
http://www.linux.sgi.com/archives/xfs-masters/2010-09/msg00002.html
BugTraq ID: 43022
http://www.securityfocus.com/bid/43022
http://securitytracker.com/id?1024418
http://secunia.com/advisories/41284
Common Vulnerability Exposure (CVE) ID: CVE-2010-3079
BugTraq ID: 43684
http://www.securityfocus.com/bid/43684
Common Vulnerability Exposure (CVE) ID: CVE-2010-3080
http://www.openwall.com/lists/oss-security/2010/09/08/7
http://www.mandriva.com/security/advisories?name=MDVSA-2010:198
BugTraq ID: 43062
http://www.securityfocus.com/bid/43062
Common Vulnerability Exposure (CVE) ID: CVE-2010-3084
http://www.spinics.net/lists/netdev/msg140133.html
http://www.openwall.com/lists/oss-security/2010/09/09/1
http://www.openwall.com/lists/oss-security/2010/09/11/1
BugTraq ID: 43098
http://www.securityfocus.com/bid/43098
Common Vulnerability Exposure (CVE) ID: CVE-2010-3296
http://lkml.org/lkml/2010/9/11/170
http://www.openwall.com/lists/oss-security/2010/09/14/2
http://www.openwall.com/lists/oss-security/2010/09/14/7
http://www.redhat.com/support/errata/RHSA-2011-0017.html
BugTraq ID: 43221
http://www.securityfocus.com/bid/43221
http://secunia.com/advisories/41440
http://secunia.com/advisories/42884
Common Vulnerability Exposure (CVE) ID: CVE-2010-3297
http://lkml.org/lkml/2010/9/11/168
BugTraq ID: 43229
http://www.securityfocus.com/bid/43229
Common Vulnerability Exposure (CVE) ID: CVE-2010-3298
http://lkml.org/lkml/2010/9/11/167
BugTraq ID: 43226
http://www.securityfocus.com/bid/43226
Common Vulnerability Exposure (CVE) ID: CVE-2010-3310
http://marc.info/?l=linux-netdev&m=128502238927086&w=2
http://www.openwall.com/lists/oss-security/2010/09/21/1
http://www.openwall.com/lists/oss-security/2010/09/21/2
BugTraq ID: 43368
http://www.securityfocus.com/bid/43368
http://www.osvdb.org/68163
http://secunia.com/advisories/41493
XForce ISS Database: kernel-rose-bind-dos(61953)
http://xforce.iss.net/xforce/xfdb/61953
Common Vulnerability Exposure (CVE) ID: CVE-2010-3432
http://marc.info/?l=linux-netdev&m=128453869227715&w=3
http://marc.info/?l=oss-security&m=128534569803598&w=2
http://marc.info/?l=oss-security&m=128537701808336&w=2
http://www.redhat.com/support/errata/RHSA-2010-0936.html
http://www.redhat.com/support/errata/RHSA-2011-0004.html
BugTraq ID: 43480
http://www.securityfocus.com/bid/43480
http://secunia.com/advisories/42400
http://secunia.com/advisories/42789
http://www.vupen.com/english/advisories/2010/3113
http://www.vupen.com/english/advisories/2011/0024
Common Vulnerability Exposure (CVE) ID: CVE-2010-3437
http://www.exploit-db.com/exploits/15150/
http://www.openwall.com/lists/oss-security/2010/09/28/2
http://www.openwall.com/lists/oss-security/2010/09/28/6
http://jon.oberheide.org/files/cve-2010-3437.c
SuSE Security Announcement: SUSE-SA:2011:004 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
BugTraq ID: 43551
http://www.securityfocus.com/bid/43551
http://secunia.com/advisories/42932
http://www.vupen.com/english/advisories/2011/0124
Common Vulnerability Exposure (CVE) ID: CVE-2010-3442
http://www.openwall.com/lists/oss-security/2010/09/29/2
http://www.openwall.com/lists/oss-security/2010/09/29/3
http://www.openwall.com/lists/oss-security/2010/09/29/4
http://www.openwall.com/lists/oss-security/2010/09/29/9
BugTraq ID: 43787
http://www.securityfocus.com/bid/43787
Common Vulnerability Exposure (CVE) ID: CVE-2010-3477
http://www.securitytracker.com/id?1024603
Common Vulnerability Exposure (CVE) ID: CVE-2010-3705
http://marc.info/?l=linux-kernel&m=128596992418814&w=2
http://www.openwall.com/lists/oss-security/2010/10/04/2
http://www.openwall.com/lists/oss-security/2010/10/04/7
Common Vulnerability Exposure (CVE) ID: CVE-2010-3848
http://openwall.com/lists/oss-security/2010/11/30/1
SuSE Security Announcement: SUSE-SA:2011:005 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html
http://www.ubuntu.com/usn/USN-1023-1
http://secunia.com/advisories/43056
http://www.vupen.com/english/advisories/2011/0213
Common Vulnerability Exposure (CVE) ID: CVE-2010-3849
http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0086.html
Common Vulnerability Exposure (CVE) ID: CVE-2010-3850
Common Vulnerability Exposure (CVE) ID: CVE-2010-3858
http://www.exploit-db.com/exploits/15619
http://www.openwall.com/lists/oss-security/2010/10/21/1
http://www.openwall.com/lists/oss-security/2010/10/22/4
http://grsecurity.net/~spender/64bit_dos.c
BugTraq ID: 44301
http://www.securityfocus.com/bid/44301
Common Vulnerability Exposure (CVE) ID: CVE-2010-3859
http://marc.info/?l=linux-netdev&m=128770476511716&w=2
http://www.spinics.net/lists/netdev/msg145248.html
http://www.spinics.net/lists/netdev/msg145247.html
http://www.spinics.net/lists/netdev/msg145263.html
http://www.spinics.net/lists/netdev/msg145265.html
http://www.spinics.net/lists/netdev/msg145262.html
http://www.spinics.net/lists/netdev/msg145264.html
http://www.spinics.net/lists/netdev/msg145352.html
http://www.openwall.com/lists/oss-security/2010/10/22/2
http://www.openwall.com/lists/oss-security/2010/10/22/5
http://www.redhat.com/support/errata/RHSA-2011-0162.html
BugTraq ID: 44354
http://www.securityfocus.com/bid/44354
http://secunia.com/advisories/42963
http://www.vupen.com/english/advisories/2011/0168
Common Vulnerability Exposure (CVE) ID: CVE-2010-3861
http://openwall.com/lists/oss-security/2010/10/25/4
http://openwall.com/lists/oss-security/2010/10/26/1
BugTraq ID: 44427
http://www.securityfocus.com/bid/44427
Common Vulnerability Exposure (CVE) ID: CVE-2010-3865
http://www.spinics.net/lists/netdev/msg145359.html
http://www.spinics.net/lists/netdev/msg145397.html
http://www.openwall.com/lists/oss-security/2010/10/29/1
http://www.openwall.com/lists/oss-security/2010/11/01/1
BugTraq ID: 44549
http://www.securityfocus.com/bid/44549
XForce ISS Database: kernel-rdsrdmapages-overflow(62881)
http://xforce.iss.net/xforce/xfdb/62881
Common Vulnerability Exposure (CVE) ID: CVE-2010-3873
http://www.spinics.net/lists/netdev/msg145786.html
http://www.spinics.net/lists/netdev/msg145873.html
http://openwall.com/lists/oss-security/2010/11/03/2
http://openwall.com/lists/oss-security/2010/11/04/3
SuSE Security Announcement: openSUSE-SU-2013:0925 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html
Common Vulnerability Exposure (CVE) ID: CVE-2010-3874
http://www.spinics.net/lists/netdev/msg145791.html
http://www.spinics.net/lists/netdev/msg146469.html
http://openwall.com/lists/oss-security/2010/11/03/3
http://openwall.com/lists/oss-security/2010/11/04/4
http://openwall.com/lists/oss-security/2010/12/20/2
http://openwall.com/lists/oss-security/2010/12/20/3
http://openwall.com/lists/oss-security/2010/12/20/4
http://openwall.com/lists/oss-security/2010/12/21/1
http://openwall.com/lists/oss-security/2010/12/20/5
Common Vulnerability Exposure (CVE) ID: CVE-2010-3875
http://marc.info/?l=linux-netdev&m=128854507120898&w=2
http://openwall.com/lists/oss-security/2010/11/02/7
http://openwall.com/lists/oss-security/2010/11/04/5
BugTraq ID: 44630
http://www.securityfocus.com/bid/44630
Common Vulnerability Exposure (CVE) ID: CVE-2010-3876
http://marc.info/?l=linux-netdev&m=128854507220908&w=2
http://openwall.com/lists/oss-security/2010/11/02/12
http://openwall.com/lists/oss-security/2010/11/02/10
http://openwall.com/lists/oss-security/2010/11/02/9
Common Vulnerability Exposure (CVE) ID: CVE-2010-3877
http://marc.info/?l=linux-netdev&m=128854507420917&w=2
XForce ISS Database: kernel-getname-info-disc(64578)
http://xforce.iss.net/xforce/xfdb/64578
Common Vulnerability Exposure (CVE) ID: CVE-2010-3880
http://www.spinics.net/lists/netdev/msg145899.html
http://openwall.com/lists/oss-security/2010/11/04/9
http://openwall.com/lists/oss-security/2010/11/05/3
BugTraq ID: 44665
http://www.securityfocus.com/bid/44665
http://secunia.com/advisories/42126
Common Vulnerability Exposure (CVE) ID: CVE-2010-3904
http://www.vsecurity.com/download/tools/linux-rds-exploit.c
http://www.vsecurity.com/resources/advisory/20101019-1/
http://www.redhat.com/support/errata/RHSA-2010-0792.html
CERT/CC vulnerability note: VU#362983
http://www.kb.cert.org/vuls/id/362983
http://securitytracker.com/id?1024613
Common Vulnerability Exposure (CVE) ID: CVE-2010-4072
http://lkml.org/lkml/2010/10/6/454
http://www.openwall.com/lists/oss-security/2010/10/07/1
http://www.openwall.com/lists/oss-security/2010/10/25/3
BugTraq ID: 45054
http://www.securityfocus.com/bid/45054
Common Vulnerability Exposure (CVE) ID: CVE-2010-4075
http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03388.html
http://www.openwall.com/lists/oss-security/2010/09/25/2
http://www.openwall.com/lists/oss-security/2010/10/06/6
BugTraq ID: 43806
http://www.securityfocus.com/bid/43806
Common Vulnerability Exposure (CVE) ID: CVE-2010-4076
http://lkml.org/lkml/2010/9/15/389
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d281da7ff6f70efca0553c288bb883e8605b3862
Common Vulnerability Exposure (CVE) ID: CVE-2010-4077
http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03387.html
BugTraq ID: 45059
http://www.securityfocus.com/bid/45059
http://securityreason.com/securityalert/8129
Common Vulnerability Exposure (CVE) ID: CVE-2010-4158
Bugtraq: 20101109 Kernel 0-day (Google Search)
http://www.securityfocus.com/archive/1/514705
Bugtraq: 20101118 Re: Kernel 0-day (Google Search)
http://www.securityfocus.com/archive/1/514845
http://lists.grok.org.uk/pipermail/full-disclosure/2010-November/077321.html
http://www.spinics.net/lists/netdev/msg146361.html
BugTraq ID: 44758
http://www.securityfocus.com/bid/44758
Common Vulnerability Exposure (CVE) ID: CVE-2010-4163
http://openwall.com/lists/oss-security/2010/11/10/18
http://openwall.com/lists/oss-security/2010/11/12/2
http://openwall.com/lists/oss-security/2010/11/29/1
BugTraq ID: 44793
http://www.securityfocus.com/bid/44793
Common Vulnerability Exposure (CVE) ID: CVE-2010-4165
http://www.spinics.net/lists/netdev/msg146495.html
http://www.spinics.net/lists/netdev/msg146405.html
http://www.openwall.com/lists/oss-security/2010/11/12/1
http://www.openwall.com/lists/oss-security/2010/11/12/4
BugTraq ID: 44830
http://www.securityfocus.com/bid/44830
http://www.osvdb.org/69241
http://securityreason.com/securityalert/8111
http://securityreason.com/securityalert/8123
Common Vulnerability Exposure (CVE) ID: CVE-2010-4169
http://marc.info/?l=oss-security&m=128979684911295&w=2
http://marc.info/?l=oss-security&m=128984344103497&w=2
BugTraq ID: 44861
http://www.securityfocus.com/bid/44861
XForce ISS Database: kernel-perfeventmmap-dos(63316)
http://xforce.iss.net/xforce/xfdb/63316
Common Vulnerability Exposure (CVE) ID: CVE-2010-4175
http://marc.info/?l=linux-netdev&m=129001184803080&w=2
http://www.openwall.com/lists/oss-security/2010/11/17/8
http://www.openwall.com/lists/oss-security/2010/11/18/1
BugTraq ID: 44921
http://www.securityfocus.com/bid/44921
XForce ISS Database: kernel-rdscmsgrdmaargs-dos(64618)
http://xforce.iss.net/xforce/xfdb/64618
Common Vulnerability Exposure (CVE) ID: CVE-2010-4248
http://www.openwall.com/lists/oss-security/2010/11/23/2
http://www.openwall.com/lists/oss-security/2010/11/24/9
BugTraq ID: 45028
http://www.securityfocus.com/bid/45028
Common Vulnerability Exposure (CVE) ID: CVE-2010-4249
http://www.exploit-db.com/exploits/15622/
http://lkml.org/lkml/2010/11/23/395
http://lkml.org/lkml/2010/11/23/450
http://lkml.org/lkml/2010/11/25/8
http://marc.info/?l=linux-netdev&m=129059035929046&w=2
http://www.openwall.com/lists/oss-security/2010/11/24/2
http://www.openwall.com/lists/oss-security/2010/11/24/10
BugTraq ID: 45037
http://www.securityfocus.com/bid/45037
http://secunia.com/advisories/42354
Common Vulnerability Exposure (CVE) ID: CVE-2010-4343
http://www.spinics.net/lists/linux-scsi/msg43772.html
http://www.openwall.com/lists/oss-security/2010/12/08/3
http://www.openwall.com/lists/oss-security/2010/12/09/15
BugTraq ID: 45262
http://www.securityfocus.com/bid/45262
Common Vulnerability Exposure (CVE) ID: CVE-2010-4346
https://lkml.org/lkml/2010/12/9/222
http://openwall.com/lists/oss-security/2010/12/09/13
http://openwall.com/lists/oss-security/2010/12/09/12
http://openwall.com/lists/oss-security/2010/12/10/3
http://openwall.com/lists/oss-security/2010/12/10/2
BugTraq ID: 45323
http://www.securityfocus.com/bid/45323
http://secunia.com/advisories/42570
Common Vulnerability Exposure (CVE) ID: CVE-2010-4526
http://www.openwall.com/lists/oss-security/2011/01/04/3
http://www.openwall.com/lists/oss-security/2011/01/04/13
http://www.redhat.com/support/errata/RHSA-2011-0163.html
BugTraq ID: 45661
http://www.securityfocus.com/bid/45661
http://secunia.com/advisories/42964
http://www.vupen.com/english/advisories/2011/0169
XForce ISS Database: kernel-icmp-message-dos(64616)
http://xforce.iss.net/xforce/xfdb/64616
Common Vulnerability Exposure (CVE) ID: CVE-2010-4527
http://openwall.com/lists/oss-security/2010/12/31/1
http://openwall.com/lists/oss-security/2010/12/31/4
http://xorl.wordpress.com/2011/01/09/cve-2010-4527-linux-kernel-oss-sound-card-driver-buffer-overflow/
BugTraq ID: 45629
http://www.securityfocus.com/bid/45629
http://secunia.com/advisories/42765
Common Vulnerability Exposure (CVE) ID: CVE-2010-4649
RedHat Security Advisories: RHSA-2011:0927
http://rhn.redhat.com/errata/RHSA-2011-0927.html
BugTraq ID: 46073
http://www.securityfocus.com/bid/46073
Common Vulnerability Exposure (CVE) ID: CVE-2011-1044
BugTraq ID: 46488
http://www.securityfocus.com/bid/46488
XForce ISS Database: kernel-ibuverbspollcq-info-disclosure(65563)
http://xforce.iss.net/xforce/xfdb/65563
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

This is only one of 39087 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.