ID

VAR-201205-0016


CVE

CVE-2011-3188


TITLE

Linux Kernel of IPv4 When IPv6 Service disruption in implementations ( Network failure ) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2012-002543

DESCRIPTION

The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified MD4 algorithm to generate sequence numbers and Fragment Identification values, which makes it easier for remote attackers to cause a denial of service (disrupted networking) or hijack network sessions by predicting these values and sending crafted packets. ( Network failure ) May be left in a state or network sessions may be taken away. The NFSv4 implementation is one of the distributed file system protocols. (CVE-2009-4067) It was discovered that the Stream Control Transmission Protocol (SCTP) implementation incorrectly calculated lengths. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security, bug fix, and enhancement update Advisory ID: RHSA-2011:1386-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1386.html Issue date: 2011-10-20 CVE Names: CVE-2009-4067 CVE-2011-1160 CVE-2011-1585 CVE-2011-1833 CVE-2011-2484 CVE-2011-2496 CVE-2011-2695 CVE-2011-2699 CVE-2011-2723 CVE-2011-2942 CVE-2011-3131 CVE-2011-3188 CVE-2011-3191 CVE-2011-3209 CVE-2011-3347 ===================================================================== 1. Summary: Updated kernel packages that fix multiple security issues, several bugs, and add one enhancement are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, noarch, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security fixes: * The maximum file offset handling for ext4 file systems could allow a local, unprivileged user to cause a denial of service. (CVE-2011-2695, Important) * IPv6 fragment identification value generation could allow a remote attacker to disrupt a target system's networking, preventing legitimate users from accessing its services. (CVE-2011-2699, Important) * A malicious CIFS (Common Internet File System) server could send a specially-crafted response to a directory read request that would result in a denial of service or privilege escalation on a system that has a CIFS share mounted. (CVE-2011-3191, Important) * A local attacker could use mount.ecryptfs_private to mount (and then access) a directory they would otherwise not have access to. Note: To correct this issue, the RHSA-2011:1241 ecryptfs-utils update must also be installed. (CVE-2011-1833, Moderate) * A flaw in the taskstats subsystem could allow a local, unprivileged user to cause excessive CPU time and memory use. (CVE-2011-2484, Moderate) * Mapping expansion handling could allow a local, unprivileged user to cause a denial of service. (CVE-2011-2496, Moderate) * GRO (Generic Receive Offload) fields could be left in an inconsistent state. An attacker on the local network could use this flaw to cause a denial of service. GRO is enabled by default in all network drivers that support it. (CVE-2011-2723, Moderate) * RHSA-2011:1065 introduced a regression in the Ethernet bridge implementation. If a system had an interface in a bridge, and an attacker on the local network could send packets to that interface, they could cause a denial of service on that system. Xen hypervisor and KVM (Kernel-based Virtual Machine) hosts often deploy bridge interfaces. (CVE-2011-2942, Moderate) * A flaw in the Xen hypervisor IOMMU error handling implementation could allow a privileged guest user, within a guest operating system that has direct control of a PCI device, to cause performance degradation on the host and possibly cause it to hang. (CVE-2011-3131, Moderate) * IPv4 and IPv6 protocol sequence number and fragment ID generation could allow a man-in-the-middle attacker to inject packets and possibly hijack connections. Protocol sequence number and fragment IDs are now more random. (CVE-2011-3188, Moderate) * A flaw in the kernel's clock implementation could allow a local, unprivileged user to cause a denial of service. (CVE-2011-3209, Moderate) * Non-member VLAN (virtual LAN) packet handling for interfaces in promiscuous mode and also using the be2net driver could allow an attacker on the local network to cause a denial of service. (CVE-2011-3347, Moderate) * A flaw in the auerswald USB driver could allow a local, unprivileged user to cause a denial of service or escalate their privileges by inserting a specially-crafted USB device. (CVE-2009-4067, Low) * A flaw in the Trusted Platform Module (TPM) implementation could allow a local, unprivileged user to leak information to user space. (CVE-2011-1160, Low) * A local, unprivileged user could possibly mount a CIFS share that requires authentication without knowing the correct password if the mount was already mounted by another local user. (CVE-2011-1585, Low) Red Hat would like to thank Fernando Gont for reporting CVE-2011-2699; Darren Lavender for reporting CVE-2011-3191; the Ubuntu Security Team for reporting CVE-2011-1833; Vasiliy Kulikov of Openwall for reporting CVE-2011-2484; Robert Swiecki for reporting CVE-2011-2496; Brent Meshier for reporting CVE-2011-2723; Dan Kaminsky for reporting CVE-2011-3188; Yasuaki Ishimatsu for reporting CVE-2011-3209; Somnath Kotur for reporting CVE-2011-3347; Rafael Dominguez Vega for reporting CVE-2009-4067; and Peter Huewe for reporting CVE-2011-1160. The Ubuntu Security Team acknowledges Vasiliy Kulikov of Openwall and Dan Rosenberg as the original reporters of CVE-2011-1833. 4. Solution: This update also fixes several bugs and adds one enhancement. Documentation for these changes will be available shortly from the Technical Notes document linked to in the References section. Users should upgrade to these updated packages, which contain backported patches to correct these issues, and fix the bugs and add the enhancement noted in the Technical Notes. The system must be rebooted for this update to take effect. Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system. 5. Bugs fixed (http://bugzilla.redhat.com/): 684671 - CVE-2011-1160 kernel: tpm infoleaks 697394 - CVE-2011-1585 kernel: cifs session reuse 715436 - CVE-2011-2484 kernel: taskstats: duplicate entries in listener mode can lead to DoS 716538 - CVE-2011-2496 kernel: mm: avoid wrapping vm_pgoff in mremap() and stack expansions 722393 - CVE-2009-4067 kernel: usb: buffer overflow in auerswald_probe() 722557 - CVE-2011-2695 kernel: ext4: kernel panic when writing data to the last block of sparse file 723429 - CVE-2011-2699 kernel: ipv6: make fragment identifications less predictable 726552 - CVE-2011-2723 kernel: gro: only reset frag0 when skb can be pulled 728518 - win2003 i386 guest BSOD when created with e1000 nic [rhel-5.7.z] 730341 - CVE-2011-3131 kernel: xen: IOMMU fault livelock 730682 - [EL5.7] igb: failed to activate WOL on 2nd LAN port on i350 [rhel-5.7.z] 730686 - Huge performance regression in NFS client [rhel-5.7.z] 730917 - CVE-2011-2942 kernel: bridge: null pointer dereference in __br_deliver 731172 - CVE-2011-1833 kernel: ecryptfs: mount source TOCTOU race 732658 - CVE-2011-3188 kernel: net: improve sequence number generation 732869 - CVE-2011-3191 kernel: cifs: signedness issue in CIFSFindNext() 732878 - CVE-2011-3209 kernel: panic occurs when clock_gettime() is called 733665 - Incorrect values in /proc/sys/vm/dirty_writeback_centises and dirty_expire_centisecs [rhel-5.7.z] 736425 - CVE-2011-3347 kernel: be2net: promiscuous mode and non-member VLAN packets DoS 738389 - Patch needed to allow MTU >1500 on vif prior to connecting to bridge [rhel-5.7.z] 738392 - netfront MTU drops to 1500 after domain migration [rhel-5.7.z] 739823 - 2.6.18-238.1.1.el5 or newer won't boot under Xen HVM due to linux-2.6-virt-nmi-don-t-print-nmi-stuck-messages-on-guests.patch [rhel-5.7.z] 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/kernel-2.6.18-274.7.1.el5.src.rpm i386: kernel-2.6.18-274.7.1.el5.i686.rpm kernel-PAE-2.6.18-274.7.1.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-274.7.1.el5.i686.rpm kernel-PAE-devel-2.6.18-274.7.1.el5.i686.rpm kernel-debug-2.6.18-274.7.1.el5.i686.rpm kernel-debug-debuginfo-2.6.18-274.7.1.el5.i686.rpm kernel-debug-devel-2.6.18-274.7.1.el5.i686.rpm kernel-debuginfo-2.6.18-274.7.1.el5.i686.rpm kernel-debuginfo-common-2.6.18-274.7.1.el5.i686.rpm kernel-devel-2.6.18-274.7.1.el5.i686.rpm kernel-headers-2.6.18-274.7.1.el5.i386.rpm kernel-xen-2.6.18-274.7.1.el5.i686.rpm kernel-xen-debuginfo-2.6.18-274.7.1.el5.i686.rpm kernel-xen-devel-2.6.18-274.7.1.el5.i686.rpm noarch: kernel-doc-2.6.18-274.7.1.el5.noarch.rpm x86_64: kernel-2.6.18-274.7.1.el5.x86_64.rpm kernel-debug-2.6.18-274.7.1.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-274.7.1.el5.x86_64.rpm kernel-debug-devel-2.6.18-274.7.1.el5.x86_64.rpm kernel-debuginfo-2.6.18-274.7.1.el5.x86_64.rpm kernel-debuginfo-2.6.18-274.7.1.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-274.7.1.el5.x86_64.rpm kernel-devel-2.6.18-274.7.1.el5.x86_64.rpm kernel-headers-2.6.18-274.7.1.el5.x86_64.rpm kernel-xen-2.6.18-274.7.1.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-274.7.1.el5.x86_64.rpm kernel-xen-devel-2.6.18-274.7.1.el5.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/kernel-2.6.18-274.7.1.el5.src.rpm i386: kernel-2.6.18-274.7.1.el5.i686.rpm kernel-PAE-2.6.18-274.7.1.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-274.7.1.el5.i686.rpm kernel-PAE-devel-2.6.18-274.7.1.el5.i686.rpm kernel-debug-2.6.18-274.7.1.el5.i686.rpm kernel-debug-debuginfo-2.6.18-274.7.1.el5.i686.rpm kernel-debug-devel-2.6.18-274.7.1.el5.i686.rpm kernel-debuginfo-2.6.18-274.7.1.el5.i686.rpm kernel-debuginfo-common-2.6.18-274.7.1.el5.i686.rpm kernel-devel-2.6.18-274.7.1.el5.i686.rpm kernel-headers-2.6.18-274.7.1.el5.i386.rpm kernel-xen-2.6.18-274.7.1.el5.i686.rpm kernel-xen-debuginfo-2.6.18-274.7.1.el5.i686.rpm kernel-xen-devel-2.6.18-274.7.1.el5.i686.rpm ia64: kernel-2.6.18-274.7.1.el5.ia64.rpm kernel-debug-2.6.18-274.7.1.el5.ia64.rpm kernel-debug-debuginfo-2.6.18-274.7.1.el5.ia64.rpm kernel-debug-devel-2.6.18-274.7.1.el5.ia64.rpm kernel-debuginfo-2.6.18-274.7.1.el5.ia64.rpm kernel-debuginfo-common-2.6.18-274.7.1.el5.ia64.rpm kernel-devel-2.6.18-274.7.1.el5.ia64.rpm kernel-headers-2.6.18-274.7.1.el5.ia64.rpm kernel-xen-2.6.18-274.7.1.el5.ia64.rpm kernel-xen-debuginfo-2.6.18-274.7.1.el5.ia64.rpm kernel-xen-devel-2.6.18-274.7.1.el5.ia64.rpm noarch: kernel-doc-2.6.18-274.7.1.el5.noarch.rpm ppc: kernel-2.6.18-274.7.1.el5.ppc64.rpm kernel-debug-2.6.18-274.7.1.el5.ppc64.rpm kernel-debug-debuginfo-2.6.18-274.7.1.el5.ppc64.rpm kernel-debug-devel-2.6.18-274.7.1.el5.ppc64.rpm kernel-debuginfo-2.6.18-274.7.1.el5.ppc64.rpm kernel-debuginfo-common-2.6.18-274.7.1.el5.ppc64.rpm kernel-devel-2.6.18-274.7.1.el5.ppc64.rpm kernel-headers-2.6.18-274.7.1.el5.ppc.rpm kernel-headers-2.6.18-274.7.1.el5.ppc64.rpm kernel-kdump-2.6.18-274.7.1.el5.ppc64.rpm kernel-kdump-debuginfo-2.6.18-274.7.1.el5.ppc64.rpm kernel-kdump-devel-2.6.18-274.7.1.el5.ppc64.rpm s390x: kernel-2.6.18-274.7.1.el5.s390x.rpm kernel-debug-2.6.18-274.7.1.el5.s390x.rpm kernel-debug-debuginfo-2.6.18-274.7.1.el5.s390x.rpm kernel-debug-devel-2.6.18-274.7.1.el5.s390x.rpm kernel-debuginfo-2.6.18-274.7.1.el5.s390x.rpm kernel-debuginfo-common-2.6.18-274.7.1.el5.s390x.rpm kernel-devel-2.6.18-274.7.1.el5.s390x.rpm kernel-headers-2.6.18-274.7.1.el5.s390x.rpm kernel-kdump-2.6.18-274.7.1.el5.s390x.rpm kernel-kdump-debuginfo-2.6.18-274.7.1.el5.s390x.rpm kernel-kdump-devel-2.6.18-274.7.1.el5.s390x.rpm x86_64: kernel-2.6.18-274.7.1.el5.x86_64.rpm kernel-debug-2.6.18-274.7.1.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-274.7.1.el5.x86_64.rpm kernel-debug-devel-2.6.18-274.7.1.el5.x86_64.rpm kernel-debuginfo-2.6.18-274.7.1.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-274.7.1.el5.x86_64.rpm kernel-devel-2.6.18-274.7.1.el5.x86_64.rpm kernel-headers-2.6.18-274.7.1.el5.x86_64.rpm kernel-xen-2.6.18-274.7.1.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-274.7.1.el5.x86_64.rpm kernel-xen-devel-2.6.18-274.7.1.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2009-4067.html https://www.redhat.com/security/data/cve/CVE-2011-1160.html https://www.redhat.com/security/data/cve/CVE-2011-1585.html https://www.redhat.com/security/data/cve/CVE-2011-1833.html https://www.redhat.com/security/data/cve/CVE-2011-2484.html https://www.redhat.com/security/data/cve/CVE-2011-2496.html https://www.redhat.com/security/data/cve/CVE-2011-2695.html https://www.redhat.com/security/data/cve/CVE-2011-2699.html https://www.redhat.com/security/data/cve/CVE-2011-2723.html https://www.redhat.com/security/data/cve/CVE-2011-2942.html https://www.redhat.com/security/data/cve/CVE-2011-3131.html https://www.redhat.com/security/data/cve/CVE-2011-3188.html https://www.redhat.com/security/data/cve/CVE-2011-3191.html https://www.redhat.com/security/data/cve/CVE-2011-3209.html https://www.redhat.com/security/data/cve/CVE-2011-3347.html https://access.redhat.com/security/updates/classification/#important https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.7_Technical_Notes/kernel.html#RHSA-2011-1386 https://rhn.redhat.com/errata/RHSA-2011-1241.html https://rhn.redhat.com/errata/RHSA-2011-1065.html 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOoFwHXlSAg2UNWIIRAjeRAJ96y38FGmEtyTMBRZFSXh0DzC5ryQCgqSPG /bUSsPcuZoEItpFWsA7sg0o= =SPIP -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04135307 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04135307 Version: 1 HPSBGN02970 rev.1 - HP Rapid Deployment Pack (RDP) or HP Insight Control Server Deployment, Multiple Remote Vulnerabilities affecting Confidentiality, Integrity and Availability NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2014-03-10 Last Updated: 2014-03-10 Potential Security Impact: Multiple remote vulnerabilities affecting confidentiality, integrity and availability Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential vulnerabilities have been identified with HP Rapid Deployment Pack (RDP) or HP Insight Control Server Deployment. The vulnerabilities could be exploited remotely affecting confidentiality, integrity and availability. References: CVE-2010-4008 CVE-2010-4494 CVE-2011-2182 CVE-2011-2213 CVE-2011-2492 CVE-2011-2518 CVE-2011-2689 CVE-2011-2723 CVE-2011-3188 CVE-2011-4077 CVE-2011-4110 CVE-2012-0058 CVE-2012-0879 CVE-2012-1088 CVE-2012-1179 CVE-2012-2137 CVE-2012-2313 CVE-2012-2372 CVE-2012-2373 CVE-2012-2375 CVE-2012-2383 CVE-2012-2384 CVE-2013-6205 CVE-2013-6206 SSRT101443 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Rapid Deployment Pack (RDP) -- All versions HP Insight Control Server Deployment -- All versions BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2013-6205 (AV:L/AC:M/Au:S/C:P/I:P/A:P) 4.1 CVE-2013-6206 (AV:N/AC:L/Au:N/C:C/I:P/A:P) 9.0 CVE-2010-4008 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2010-4494 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2011-2182 (AV:L/AC:L/Au:N/C:C/I:C/A:C) 7.2 CVE-2011-2213 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9 CVE-2011-2492 (AV:L/AC:M/Au:N/C:P/I:N/A:N) 1.9 CVE-2011-2518 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9 CVE-2011-2689 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9 CVE-2011-2723 (AV:A/AC:M/Au:N/C:N/I:N/A:C) 5.7 CVE-2011-3188 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2011-4077 (AV:L/AC:M/Au:N/C:C/I:C/A:C) 6.9 CVE-2011-4110 (AV:L/AC:L/Au:N/C:N/I:N/A:P) 2.1 CVE-2012-0058 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9 CVE-2012-0879 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9 CVE-2012-1088 (AV:L/AC:M/Au:N/C:N/I:P/A:P) 3.3 CVE-2012-1179 (AV:A/AC:M/Au:S/C:N/I:N/A:C) 5.2 CVE-2012-2137 (AV:L/AC:M/Au:N/C:C/I:C/A:C) 6.9 CVE-2012-2313 (AV:L/AC:H/Au:N/C:N/I:N/A:P) 1.2 CVE-2012-2372 (AV:L/AC:M/Au:S/C:N/I:N/A:C) 4.4 CVE-2012-2373 (AV:L/AC:H/Au:N/C:N/I:N/A:C) 4.0 CVE-2012-2375 (AV:A/AC:H/Au:N/C:N/I:N/A:C) 4.6 CVE-2012-2383 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9 CVE-2012-2384 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP recommends that HP Rapid Deployment Pack (RDP) or HP Insight Control Server Deployment should only be run on private secure networks to prevent the risk of security compromise. HISTORY Version:1 (rev.1) - 10 March 2014 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. Relevant releases/architectures: MRG Realtime for RHEL 6 Server v.2 - noarch, x86_64 3. (CVE-2011-3191, Important) * The way fragmented IPv6 UDP datagrams over the bridge with UDP Fragmentation Offload (UFO) functionality on were handled could allow a remote attacker to cause a denial of service. (CVE-2011-3353, Moderate) * A flaw in the b43 driver. (CVE-2011-3359, Moderate) * A flaw in the way CIFS shares with DFS referrals at their root were handled could allow an attacker on the local network, who is able to deploy a malicious CIFS server, to create a CIFS network share that, when mounted, would cause the client system to crash. This update also fixes the following bugs: * Previously, a mismatch in the build-id of the kernel-rt and the one in the related debuginfo package caused failures in SystemTap and perf. (BZ#768413) * IBM x3650m3 systems were not able to boot the MRG Realtime kernel because they require a pmcraid driver that was not available. ========================================================================== Ubuntu Security Notice USN-1240-1 October 25, 2011 linux-mvl-dove vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 10.04 LTS Summary: Several security issues were fixed in the kernel. Software Description: - linux-mvl-dove: Linux kernel for DOVE Details: Ryan Sweat discovered that the kernel incorrectly handled certain VLAN packets. (CVE-2011-1576) Vasiliy Kulikov and Dan Rosenberg discovered that ecryptfs did not correctly check the origin of mount points. (CVE-2011-1833) Vasiliy Kulikov discovered that taskstats did not enforce access restrictions. A local attacker could exploit this to read certain information, leading to a loss of privacy. (CVE-2011-2494) Vasiliy Kulikov discovered that /proc/PID/io did not enforce access restrictions. A local attacker could exploit this to read certain information, leading to a loss of privacy. (CVE-2011-2495) Dan Rosenberg discovered that the Bluetooth stack incorrectly handled certain L2CAP requests. If a system was using Bluetooth, a remote attacker could send specially crafted traffic to crash the system or gain root privileges. (CVE-2011-2497) It was discovered that the EXT4 filesystem contained multiple off-by-one flaws. (CVE-2011-2695) Fernando Gont discovered that the IPv6 stack used predictable fragment identification numbers. (CVE-2011-2699) Christian Ohm discovered that the perf command looks for configuration files in the current directory. If a privileged user were tricked into running perf in a directory containing a malicious configuration file, an attacker could run arbitrary commands and possibly gain privileges. (CVE-2011-2905) Time Warns discovered that long symlinks were incorrectly handled on Be filesystems. (CVE-2011-2928) Dan Kaminsky discovered that the kernel incorrectly handled random sequence number generation. (CVE-2011-3188) Darren Lavender discovered that the CIFS client incorrectly handled certain large values. A remote attacker with a malicious server could exploit this to crash the system or possibly execute arbitrary code as the root user. (CVE-2011-3191) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 10.04 LTS: linux-image-2.6.32-219-dove 2.6.32-219.37 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well. (CVE-2011-2905) Vasiliy Kulikov discovered that the Comedi driver did not correctly clear memory. (CVE-2011-3188) Yogesh Sharma discovered that CIFS did not correctly handle UNCs that had no prefixpaths

Trust: 2.52

sources: NVD: CVE-2011-3188 // JVNDB: JVNDB-2012-002543 // VULHUB: VHN-51133 // VULMON: CVE-2011-3188 // PACKETSTORM: 106036 // PACKETSTORM: 106032 // PACKETSTORM: 106774 // PACKETSTORM: 125636 // PACKETSTORM: 108557 // PACKETSTORM: 106206 // PACKETSTORM: 106201 // PACKETSTORM: 106204

AFFECTED PRODUCTS

vendor:linuxmodel:kernelscope:ltversion:3.1

Trust: 1.8

vendor:f5model:big-ip application security managerscope:lteversion:11.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:10.0.0

Trust: 1.0

vendor:f5model:big-ip protocol security modulescope:gteversion:10.0.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:11.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:firepassscope:gteversion:6.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:10.0.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:11.1.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:11.1.0

Trust: 1.0

vendor:f5model:enterprise managerscope:lteversion:2.3.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:11.1.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:10.1.0

Trust: 1.0

vendor:f5model:big-ip protocol security modulescope:lteversion:11.1.0

Trust: 1.0

vendor:f5model:big-ip wan optimization managerscope:lteversion:10.2.4

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:10.2.4

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:11.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:10.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:10.2.4

Trust: 1.0

vendor:f5model:firepassscope:eqversion:7.0.0

Trust: 1.0

vendor:f5model:arxscope:gteversion:6.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:4.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:10.2.4

Trust: 1.0

vendor:f5model:enterprise managerscope:eqversion:3.0.0

Trust: 1.0

vendor:f5model:arxscope:lteversion:6.4.0

Trust: 1.0

vendor:f5model:big-ip wan optimization managerscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:10.2.4

Trust: 1.0

vendor:f5model:enterprise managerscope:gteversion:2.1.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:10.2.4

Trust: 1.0

vendor:f5model:big-ip wan optimization managerscope:lteversion:11.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip wan optimization managerscope:gteversion:10.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:10.2.4

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:10.0.0

Trust: 1.0

vendor:f5model:firepassscope:lteversion:6.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:10.0.0

Trust: 1.0

vendor:f5model:big-ip protocol security modulescope:lteversion:10.2.4

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:11.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:10.2.4

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:10.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:11.0.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:11.1.0

Trust: 1.0

vendor:f5model:big-ip protocol security modulescope:gteversion:11.0.0

Trust: 1.0

vendor:vmwaremodel:esxscope:eqversion:3.5

Trust: 0.8

vendor:vmwaremodel:esxscope:eqversion:4.0

Trust: 0.8

vendor:vmwaremodel:esxscope:eqversion:4.1

Trust: 0.8

vendor:vmwaremodel:esxiscope: - version: -

Trust: 0.8

vendor:linuxmodel:kernelscope:eqversion:1.2.0

Trust: 0.7

vendor:linuxmodel:kernelscope:eqversion:1.3.0

Trust: 0.7

vendor:linuxmodel:kernelscope:eqversion:2.2.4

Trust: 0.7

vendor:linuxmodel:kernelscope:eqversion:2.2.5

Trust: 0.7

vendor:linuxmodel:kernelscope:eqversion:2.2.6

Trust: 0.7

vendor:linuxmodel:kernelscope:eqversion:2.3.1

Trust: 0.7

vendor:linuxmodel:kernelscope:eqversion:2.3.10

Trust: 0.7

vendor:linuxmodel:kernelscope:eqversion:2.3.11

Trust: 0.7

vendor:linuxmodel:kernelscope:eqversion:2.3.12

Trust: 0.7

vendor:linuxmodel:kernelscope:eqversion:3.0

Trust: 0.7

vendor:linuxmodel:kernelscope:eqversion:2.0.1

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.3

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.4

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.5

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.6

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.7

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.8

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.9

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.10

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.11

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.12

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.13

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.14

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.15

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.16

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.17

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.18

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.19

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.20

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.21

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.22

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.23

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.24

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.25

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.26

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.27

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.28

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.29

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.30

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.31

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.32

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.33

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.34

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.35

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.36

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.37

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.38

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.0.39

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.1.89

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.1.132

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.0

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.1

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.3

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.7

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.8

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.9

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.10

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.11

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.12

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.13

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.14

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.15

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.16

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.17

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.18

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.19

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.20

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.21

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.22

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.23

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.24

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.25

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.26

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.2.27

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.0

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.3

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.4

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.5

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.6

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.7

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.8

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.9

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.13

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.14

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.15

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.16

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.17

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.18

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.19

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.20

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.21

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.22

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.23

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.24

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.25

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.26

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.27

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.28

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.29

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.30

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.31

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.32

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.33

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.34

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.35

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.36

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.37

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.38

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.39

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.40

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.41

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.42

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.43

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.44

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.45

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.46

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.47

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.48

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.49

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.50

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.51

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.3.99

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.0

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.1

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.3

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.4

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.5

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.6

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.7

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.8

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.9

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.10

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.11

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.12

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.13

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.14

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.15

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.16

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.17

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.18

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.19

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.20

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.21

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.22

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.23

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.24

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.25

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.26

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.27

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.28

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.29

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.30

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.31

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.32

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.33

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.33.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.33.3

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.33.4

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.33.5

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.34

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.34.1

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.34.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.35

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.4.35.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.0

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.1

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.3

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.4

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.5

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.6

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.7

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.8

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.9

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.10

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.11

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.12

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.13

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.14

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.15

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.16

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.17

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.18

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.19

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.20

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.21

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.22

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.23

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.24

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.25

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.26

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.27

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.28

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.29

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.30

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.31

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.32

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.33

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.34

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.35

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.36

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.37

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.38

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.39

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.40

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.41

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.42

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.43

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.44

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.45

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.46

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.47

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.48

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.49

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.50

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.51

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.52

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.53

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.54

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.55

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.56

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.57

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.58

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.59

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.60

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.61

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.62

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.63

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.64

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.65

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.66

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.67

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.68

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.5.69

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.0

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.1

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.3

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.4

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.5

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.6

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.7

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.8

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.8.1

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.9

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.10

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.11

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.11.1

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.11.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.11.3

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.11.4

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.11.5

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.11.6

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.11.7

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.11.8

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.11.9

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.11.10

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.11.11

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.11.12

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.12

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.12.1

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.12.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.12.3

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.12.4

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.12.5

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.12.6

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.13

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.13.1

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.13.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.13.3

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.13.4

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.13.5

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.14

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.14.1

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.14.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.14.3

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.14.4

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.14.5

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.14.6

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.14.7

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.15

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.15.1

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.15.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.15.3

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.15.4

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.15.5

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.15.6

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.15.7

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.15.8

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.15.9

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.15.10

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.15.11

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.1

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.3

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.4

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.5

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.6

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.7

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.8

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.9

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.10

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.11

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.12

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.13

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.14

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.15

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.16

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.17

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.18

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.19

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.20

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.21

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.22

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.23

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.24

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.25

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.26

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.27

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.28

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.29

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.30

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.31

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.32

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.33

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.34

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.35

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.36

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.37

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.38

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.39

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.40

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.41

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.42

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.43

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.44

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.45

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.46

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.47

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.48

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.49

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.50

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.51

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.52

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.53

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.54

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.55

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.56

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.57

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.58

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.59

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.60

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.61

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.16.62

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.17

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.17.1

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.17.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.17.3

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.17.4

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.17.5

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.17.6

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.17.7

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.17.8

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.17.9

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.17.10

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.17.11

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.17.12

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.17.13

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.17.14

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.18

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.18.1

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.18.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.18.3

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.18.4

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.18.5

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.18.6

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.18.7

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.18.8

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.19

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.19.1

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.19.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.19.3

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.19.4

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.19.5

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.19.6

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.19.7

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.20

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.20.1

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.20.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.20.3

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.20.4

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.20.5

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.20.6

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.20.7

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.20.8

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.20.9

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.20.10

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.20.11

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.20.12

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.20.13

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.20.14

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.20.15

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.20.16

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.20.17

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.20.18

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.20.19

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.20.20

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.20.21

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.21

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.21.1

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.21.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.21.3

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.21.4

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.21.5

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.21.6

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.21.7

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.22

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.22.1

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.22.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.22.3

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.22.4

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.22.5

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.22.6

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.22.7

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.22.8

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.22.10

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.22.11

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.22.12

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.22.13

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.22.14

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.22.15

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.22.16

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.22.17

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.22.18

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.22.19

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.22.20

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.5

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.6

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.7

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.8

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.9

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.41

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.42

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.43

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.44

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.45

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.46

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.47

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.48

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.49

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.50

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.51

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.52

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.53

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.54

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.55

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.56

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.57

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.58

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.59

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.60

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.61

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.27.62

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.28

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.28.1

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.28.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.28.3

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.28.4

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.28.5

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.28.6

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.28.7

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.28.8

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.28.9

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.28.10

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.29

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.29.1

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.29.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.29.3

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.29.4

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.29.5

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.29.6

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.1

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.3

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.4

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.5

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.6

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.7

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.8

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.9

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.10

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.11

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.12

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.13

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.14

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.15

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.16

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.17

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.18

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.28

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.29

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.30

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.31

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.32

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.33

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.34

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.35

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.36

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.37

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.38

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.39

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.40

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.41

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.42

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.43

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.44

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.45

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.46

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.47

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.48

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.49

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.50

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.51

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.52

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.53

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.54

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.55

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.56

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.57

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.32.58

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.33.8

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.33.9

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.33.10

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.33.11

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.33.12

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.33.13

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.33.14

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.33.15

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.33.16

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.33.17

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.33.18

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.33.19

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.33.20

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.34.1

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.34.2

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.34.3

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.34.8

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.34.9

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.34.10

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.35.1

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.35.10

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.35.11

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.35.12

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.35.13

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.37

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.38

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:2.6.39

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:3.0.5

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:3.0.6

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:3.0.7

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:3.0.8

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:3.0.9

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:3.0.10

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:3.0.11

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:3.0.12

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:3.0.13

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:3.0.14

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:3.0.15

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:3.0.16

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:3.0.17

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:3.0.18

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:3.0.19

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:3.0.20

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:3.0.21

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:3.0.22

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:3.0.23

Trust: 0.1

vendor:linuxmodel:kernelscope:eqversion:3.0.24

Trust: 0.1

sources: VULMON: CVE-2011-3188 // JVNDB: JVNDB-2012-002543 // CNNVD: CNNVD-201108-429 // NVD: CVE-2011-3188

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-3188
value: CRITICAL

Trust: 1.0

NVD: CVE-2011-3188
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201108-429
value: CRITICAL

Trust: 0.6

VULHUB: VHN-51133
value: MEDIUM

Trust: 0.1

VULMON: CVE-2011-3188
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2011-3188
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2011-3188
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-51133
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

VULMON: CVE-2011-3188
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2011-3188
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.2
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-51133 // VULMON: CVE-2011-3188 // JVNDB: JVNDB-2012-002543 // CNNVD: CNNVD-201108-429 // NVD: CVE-2011-3188

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-DesignError

Trust: 0.8

sources: JVNDB: JVNDB-2012-002543 // NVD: CVE-2011-3188

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 108557 // CNNVD: CNNVD-201108-429

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-201108-429

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-002543

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-51133

PATCH

title:ChangeLog-3.1url:http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1

Trust: 0.8

title:crypto: Move md5_transform to lib/md5.curl:https://github.com/torvalds/linux/commit/bc0b96b54a21246e377122d54569eef71cec535f

Trust: 0.8

title:net: Compute protocol sequence numbers and fragment IDs using MD5.url:https://github.com/torvalds/linux/commit/6e5714eaf77d79ae1c8b47e3e040ff5411b717ec

Trust: 0.8

title:linux/kernel/git/torvalds/linux-2.6.git / commit (crypto: Move md5_transform to lib/md5.c)url:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bc0b96b54a21246e377122d54569eef71cec535f

Trust: 0.8

title:linux/kernel/git/torvalds/linux-2.6.git / commit (net: Compute protocol sequence numbers and fragment IDs using MD5)url:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6e5714eaf77d79ae1c8b47e3e040ff5411b717ec

Trust: 0.8

title:Linux Kernel Archivesurl:http://www.kernel.org

Trust: 0.8

title:Bug 732658url:https://bugzilla.redhat.com/show_bug.cgi?id=732658

Trust: 0.8

title:VMSA-2012-0013url:http://www.vmware.com/jp/support/support-resources/advisories/VMSA-2012-0013.html

Trust: 0.8

title:linux-3.3.7url:http://123.124.177.30/web/xxk/bdxqById.tag?id=43221

Trust: 0.6

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20111465 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel-rt security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20120010 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1236-1

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1246-1

Trust: 0.1

title:Amazon Linux AMI: ALAS-2011-016url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2011-016

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-backport-maverick vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1242-1

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1243-1

Trust: 0.1

title:Ubuntu Security Notice: linux-ti-omap4 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1228-1

Trust: 0.1

title:Ubuntu Security Notice: linux-ti-omap4 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1220-1

Trust: 0.1

title:Ubuntu Security Notice: linux-mvl-dove vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1245-1

Trust: 0.1

title:Ubuntu Security Notice: linux-ec2 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1239-1

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1253-1

Trust: 0.1

title:Ubuntu Security Notice: linux-mvl-dove vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1240-1

Trust: 0.1

title:Ubuntu Security Notice: linux-fsl-imx51 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1241-1

Trust: 0.1

title:Debian Security Advisories: DSA-2310-1 linux-2.6 -- privilege escalation/denial of service/information leakurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=32718749d125111cbdd89954674b3eef

Trust: 0.1

title:Amazon Linux AMI: ALAS-2011-026url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2011-026

Trust: 0.1

title:Debian Security Advisories: DSA-2303-2 linux-2.6 -- privilege escalation/denial of service/information leakurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=2a2d240162691a031ffdb625c608418b

Trust: 0.1

title:VMware Security Advisories: VMware vSphere and vCOps updates to third party librariesurl:https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories&qid=ebfa7ecfec1f973ff975279d7fce2976

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-backport-natty vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1256-1

Trust: 0.1

title:function_level_granularityurl:https://github.com/znd15/function_level_granularity

Trust: 0.1

title:kernel_cveurl:https://github.com/Parkhomets/kernel_cve

Trust: 0.1

sources: VULMON: CVE-2011-3188 // JVNDB: JVNDB-2012-002543 // CNNVD: CNNVD-201108-429

EXTERNAL IDS

db:NVDid:CVE-2011-3188

Trust: 3.5

db:OPENWALLid:OSS-SECURITY/2011/08/23/2

Trust: 1.8

db:JVNDBid:JVNDB-2012-002543

Trust: 0.8

db:CNNVDid:CNNVD-201108-429

Trust: 0.7

db:AUSCERTid:ESB-2019.4751

Trust: 0.6

db:BIDid:49289

Trust: 0.1

db:PACKETSTORMid:106496

Trust: 0.1

db:VULHUBid:VHN-51133

Trust: 0.1

db:VULMONid:CVE-2011-3188

Trust: 0.1

db:PACKETSTORMid:106036

Trust: 0.1

db:PACKETSTORMid:116124

Trust: 0.1

db:PACKETSTORMid:106032

Trust: 0.1

db:PACKETSTORMid:106774

Trust: 0.1

db:PACKETSTORMid:125636

Trust: 0.1

db:PACKETSTORMid:108557

Trust: 0.1

db:PACKETSTORMid:106206

Trust: 0.1

db:PACKETSTORMid:106201

Trust: 0.1

db:PACKETSTORMid:106204

Trust: 0.1

sources: VULHUB: VHN-51133 // VULMON: CVE-2011-3188 // PACKETSTORM: 106036 // PACKETSTORM: 116124 // PACKETSTORM: 106032 // PACKETSTORM: 106774 // PACKETSTORM: 125636 // PACKETSTORM: 108557 // PACKETSTORM: 106206 // PACKETSTORM: 106201 // PACKETSTORM: 106204 // JVNDB: JVNDB-2012-002543 // CNNVD: CNNVD-201108-429 // NVD: CVE-2011-3188

REFERENCES

url:http://www.openwall.com/lists/oss-security/2011/08/23/2

Trust: 1.8

url:http://www.kernel.org/pub/linux/kernel/v3.x/changelog-3.1

Trust: 1.8

url:https://bugzilla.redhat.com/show_bug.cgi?id=732658

Trust: 1.8

url:https://github.com/torvalds/linux/commit/6e5714eaf77d79ae1c8b47e3e040ff5411b717ec

Trust: 1.8

url:https://github.com/torvalds/linux/commit/bc0b96b54a21246e377122d54569eef71cec535f

Trust: 1.8

url:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=6e5714eaf77d79ae1c8b47e3e040ff5411b717ec

Trust: 1.7

url:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=bc0b96b54a21246e377122d54569eef71cec535f

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=139447903326211&w=2

Trust: 1.7

url:https://support.f5.com/csp/article/k15301?utm_source=f5support&amp%3butm_medium=rss

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2011-3188

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3188

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3188

Trust: 0.8

url:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6e5714eaf77d79ae1c8b47e3e040ff5411b717ec

Trust: 0.7

url:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bc0b96b54a21246e377122d54569eef71cec535f

Trust: 0.7

url:https://support.f5.com/csp/article/k15301?utm_source=f5support&utm_medium=rss

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2011-2494

Trust: 0.6

url:https://support.f5.com/csp/article/k15301

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4751/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2011-2495

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2011-1833

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2011-2699

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2011-2695

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2011-3191

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2011-2905

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2011-4110

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2011-3363

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2011-2723

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2011-2497

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2011-2928

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2011-1576

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-4067

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3209

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-2496

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-4132

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-2484

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2011-2723.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2011-3188.html

Trust: 0.2

url:https://access.redhat.com/kb/docs/doc-11259

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://access.redhat.com/security/team/key/#package

Trust: 0.2

url:http://bugzilla.redhat.com/):

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2011-3191.html

Trust: 0.2

url:http://marc.info/?l=bugtraq&amp;m=139447903326211&amp;w=2

Trust: 0.1

url:https://support.f5.com/csp/article/k15301?utm_source=f5support&amp;amp%3butm_medium=rss

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://www.rapid7.com/db/vulnerabilities/vmsa-2012-0013-cve-2011-3188

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=24018

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/1236-1/

Trust: 0.1

url:http://www.ubuntu.com/usn/usn-1236-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/2.6.24-29.95

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1573

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4410

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1020

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4109

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4325

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0830

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4128

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-5029

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4108

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2761

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4577

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-5064

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4180

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0014

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1089

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4252

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4609

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3597

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4324

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4576

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2496.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-3131.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-1585.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2942.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1585

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-1160.html

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2011-1065.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-1833.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2942

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2011-1386.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2484.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3347

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-3347.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2699.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3131

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1160

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2011-1241.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-3209.html

Trust: 0.1

url:https://docs.redhat.com/docs/en-us/red_hat_enterprise_linux/5/html/5.7_technical_notes/kernel.html#rhsa-2011-1386

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2695.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2009-4067.html

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/2.6.32-35.78

Trust: 0.1

url:http://www.ubuntu.com/usn/usn-1253-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2383

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0879

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0058

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2518

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2137

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2492

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2689

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2373

Trust: 0.1

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6205

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4077

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2384

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4008

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2375

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4494

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6206

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2182

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2313

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2372

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2213

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-1179

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-1088

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3359

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4081

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3353

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1162

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-1162.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3637

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-3637.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-4110.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2494.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-4132.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-4081.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2898

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2898.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-4326.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4326

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2012-0010.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-3359.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-3363.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-3353.html

Trust: 0.1

url:http://www.ubuntu.com/usn/usn-1245-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-mvl-dove/2.6.32-419.37

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-mvl-dove/2.6.32-219.37

Trust: 0.1

url:http://www.ubuntu.com/usn/usn-1240-1

Trust: 0.1

url:http://www.ubuntu.com/usn/usn-1243-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2909

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/2.6.35-30.61

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1479

Trust: 0.1

sources: VULHUB: VHN-51133 // VULMON: CVE-2011-3188 // PACKETSTORM: 106036 // PACKETSTORM: 116124 // PACKETSTORM: 106032 // PACKETSTORM: 106774 // PACKETSTORM: 125636 // PACKETSTORM: 108557 // PACKETSTORM: 106206 // PACKETSTORM: 106201 // PACKETSTORM: 106204 // JVNDB: JVNDB-2012-002543 // CNNVD: CNNVD-201108-429 // NVD: CVE-2011-3188

CREDITS

Dan Kaminsky

Trust: 0.6

sources: CNNVD: CNNVD-201108-429

SOURCES

db:VULHUBid:VHN-51133
db:VULMONid:CVE-2011-3188
db:PACKETSTORMid:106036
db:PACKETSTORMid:116124
db:PACKETSTORMid:106032
db:PACKETSTORMid:106774
db:PACKETSTORMid:125636
db:PACKETSTORMid:108557
db:PACKETSTORMid:106206
db:PACKETSTORMid:106201
db:PACKETSTORMid:106204
db:JVNDBid:JVNDB-2012-002543
db:CNNVDid:CNNVD-201108-429
db:NVDid:CVE-2011-3188

LAST UPDATE DATE

2025-08-11T20:44:20.918000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-51133date:2023-02-13T00:00:00
db:VULMONid:CVE-2011-3188date:2020-07-29T00:00:00
db:JVNDBid:JVNDB-2012-002543date:2012-12-17T00:00:00
db:CNNVDid:CNNVD-201108-429date:2023-02-14T00:00:00
db:NVDid:CVE-2011-3188date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-51133date:2012-05-24T00:00:00
db:VULMONid:CVE-2011-3188date:2012-05-24T00:00:00
db:PACKETSTORMid:106036date:2011-10-20T23:03:45
db:PACKETSTORMid:116124date:2012-09-01T00:00:25
db:PACKETSTORMid:106032date:2011-10-20T22:58:37
db:PACKETSTORMid:106774date:2011-11-09T16:05:15
db:PACKETSTORMid:125636date:2014-03-11T01:16:40
db:PACKETSTORMid:108557date:2012-01-11T07:29:41
db:PACKETSTORMid:106206date:2011-10-25T19:55:57
db:PACKETSTORMid:106201date:2011-10-25T19:53:14
db:PACKETSTORMid:106204date:2011-10-25T19:54:45
db:JVNDBid:JVNDB-2012-002543date:2012-05-28T00:00:00
db:CNNVDid:CNNVD-201108-429date:1900-01-01T00:00:00
db:NVDid:CVE-2011-3188date:2012-05-24T23:55:02.213