Vulnerability Name:

CVE-2007-3848 (CCN-36050)

Assigned:2007-08-14
Published:2007-08-14
Updated:2018-10-15
Summary:Linux kernel 2.4.35 and other versions allows local users to send arbitrary signals to a child process that is running at higher privileges by causing a setuid-root parent process to die, which delivers an attacker-controlled parent process death signal (PR_SET_PDEATHSIG).
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:1.9 Low (CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:N/A:P)
1.4 Low (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: Red Hat Bugzilla Bug 250972
CVE-2007-3848 Privilege escalation via PR_SET_PDEATHSIG

Source: MISC
Type: UNKNOWN
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-3848

Source: MITRE
Type: CNA
CVE-2007-3848

Source: SUSE
Type: UNKNOWN
SUSE-SA:2008:006

Source: SUSE
Type: UNKNOWN
SUSE-SA:2008:017

Source: BUGTRAQ
Type: UNKNOWN
20070814 COSEINC Linux Advisory #1: Linux Kernel Parent Process DeathSignal Vulnerability

Source: CCN
Type: openwall-announce Mailing List, 2007-08-14 14:52:21
Linux 2.4.35-ow2

Source: MLIST
Type: UNKNOWN
[openwall-announce] 20070814 Linux 2.4.35-ow2

Source: CCN
Type: RHSA-2007-0939
Important: kernel security update

Source: CCN
Type: RHSA-2007-0940
Important: kernel security update

Source: CCN
Type: RHSA-2007-1049
Important: kernel security and bug fix update

Source: CCN
Type: RHSA-2008-0787
Important: kernel security update

Source: CCN
Type: RHSA-2009-0001
Important: kernel security update

Source: SECUNIA
Type: UNKNOWN
26450

Source: SECUNIA
Type: UNKNOWN
26500

Source: SECUNIA
Type: UNKNOWN
26643

Source: SECUNIA
Type: UNKNOWN
26651

Source: SECUNIA
Type: UNKNOWN
26664

Source: SECUNIA
Type: UNKNOWN
27212

Source: SECUNIA
Type: UNKNOWN
27227

Source: SECUNIA
Type: UNKNOWN
27322

Source: SECUNIA
Type: UNKNOWN
27436

Source: CCN
Type: SA27747
Avaya Products Kernel Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
27747

Source: SECUNIA
Type: UNKNOWN
27913

Source: SECUNIA
Type: UNKNOWN
28806

Source: SECUNIA
Type: UNKNOWN
29058

Source: SECUNIA
Type: UNKNOWN
29570

Source: SECUNIA
Type: UNKNOWN
33280

Source: CONFIRM
Type: UNKNOWN
http://support.avaya.com/elmodocs2/security/ASA-2007-474.htm

Source: CCN
Type: ASA-2007-474
kernel security update (RHSA-2007-0939)

Source: CCN
Type: ASA-2008-010
kernel security and bug fix update (RHSA-2007-1049)

Source: CCN
Type: ASA-2009-005
kernel security update (RHSA-2009-0001)

Source: CCN
Type: ASA-2009-035
kernel security update (RHSA-2008-0787)

Source: DEBIAN
Type: UNKNOWN
DSA-1356

Source: DEBIAN
Type: UNKNOWN
DSA-1503

Source: DEBIAN
Type: UNKNOWN
DSA-1504

Source: DEBIAN
Type: DSA-1356
linux-2.6 -- several vulnerabilities

Source: DEBIAN
Type: DSA-1503
kernel-source-2.4.27 -- several vulnerabilities

Source: DEBIAN
Type: DSA-1504
kernel-source-2.6.8 -- several vulnerabilities

Source: CONFIRM
Type: UNKNOWN
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.4

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2007:195

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2007:196

Source: SUSE
Type: UNKNOWN
SUSE-SA:2007:053

Source: REDHAT
Type: UNKNOWN
RHSA-2007:0939

Source: REDHAT
Type: UNKNOWN
RHSA-2007:0940

Source: REDHAT
Type: UNKNOWN
RHSA-2007:1049

Source: REDHAT
Type: UNKNOWN
RHSA-2008:0787

Source: BUGTRAQ
Type: UNKNOWN
20070814 COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability

Source: BUGTRAQ
Type: UNKNOWN
20070814 Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability

Source: BUGTRAQ
Type: UNKNOWN
20070815 Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability

Source: BUGTRAQ
Type: UNKNOWN
20070816 Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability

Source: BID
Type: UNKNOWN
25387

Source: CCN
Type: BID-25387
Linux Kernel Parent Process Death Signal Local Security Bypass Weakness

Source: CCN
Type: USN-508-1
Linux kernel vulnerabilities

Source: UBUNTU
Type: UNKNOWN
USN-508-1

Source: CCN
Type: USN-509-1
Linux kernel vulnerabilities

Source: UBUNTU
Type: UNKNOWN
USN-509-1

Source: CCN
Type: USN-510-1
Linux kernel vulnerabilities

Source: UBUNTU
Type: UNKNOWN
USN-510-1

Source: XF
Type: UNKNOWN
kernel-prsetpdeathsig-privilege-escalation(36050)

Source: CONFIRM
Type: UNKNOWN
https://issues.rpath.com/browse/RPL-1648

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10120

Source: SUSE
Type: SUSE-SA:2007:051
Linux kernel security update

Source: SUSE
Type: SUSE-SA:2007:053
Linux kernel privilege escalation

Source: SUSE
Type: SUSE-SA:2008:017
Linux kernel security update

Vulnerable Configuration:Configuration 1:
  • cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:* (Version <= 2.4.35)

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:2.4.3:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.18:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.22:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.27:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.21:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.0:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.11:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.11:pre3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.18:pre9:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.19:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.19::-pre1:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.19::-pre2:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.19::-pre3:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.19::-pre4:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.19::-pre5:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.19::-pre6:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.21::-pre1:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.21::-pre4:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.21::-pre7:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.22:pre10:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.23:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.23::-ow2:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.23::-pre9:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.24::-ow1:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.27::-pre1:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.27::-pre2:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.27::-pre3:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.27::-pre4:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.27::-pre5:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.29:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.3:pre3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.30:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.31:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.31:pre1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.32:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.32:pre1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.32:pre2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.33:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.33:pre1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.33.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.34:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.34:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.34.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.34.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.35:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.9_pre5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.22:pre10:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.33.1:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:10.1::personal:*:*:*:*:*
  • OR cpe:/o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_server:10:sp2:itanium_ia64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:4.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:message_networking:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.04:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:3.1.4:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1::x86-64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.5.z::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.5.z::es:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:3.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:10.2:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:3.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:3.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:4.0.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20073848
    V
    CVE-2007-3848
    2015-11-16
    oval:org.mitre.oval:def:17541
    P
    USN-510-1 -- linux-source-2.6.20 vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:17035
    P
    USN-508-1 -- linux-source-2.6.15 vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:17135
    P
    USN-509-1 -- linux-source-2.6.17 vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:8130
    P
    DSA-1504 kernel-source-2.6.8 -- several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:18865
    P
    DSA-1356-1 linux-2.6 - several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:8063
    P
    DSA-1503 kernel-source-2.4.27 -- several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:21736
    P
    ELSA-2007:0940: kernel security update (Important)
    2014-05-26
    oval:org.mitre.oval:def:10120
    V
    Linux kernel 2.4.35 and other versions allows local users to send arbitrary signals to a child process that is running at higher privileges by causing a setuid-root parent process to die, which delivers an attacker-controlled parent process death signal (PR_SET_PDEATHSIG).
    2013-04-29
    oval:org.debian:def:1503
    V
    several vulnerabilities
    2008-02-22
    oval:org.debian:def:1504
    V
    several vulnerabilities
    2008-02-22
    oval:com.redhat.rhsa:def:20071049
    P
    RHSA-2007:1049: kernel security and bug fix update (Important)
    2007-12-03
    oval:com.redhat.rhsa:def:20070939
    P
    RHSA-2007:0939: kernel security update (Important)
    2007-11-01
    oval:com.redhat.rhsa:def:20070940
    P
    RHSA-2007:0940: kernel security update (Important)
    2007-10-22
    oval:org.debian:def:1356
    V
    several vulnerabilities
    2007-08-15
    BACK
    linux linux kernel *
    linux linux kernel 2.4.3
    linux linux kernel 2.4.4
    linux linux kernel 2.4.5
    linux linux kernel 2.4.6
    linux linux kernel 2.4.18
    linux linux kernel 2.4.20
    linux linux kernel 2.4.22
    linux linux kernel 2.4.7
    linux linux kernel 2.4.27
    linux linux kernel 2.4.21
    linux linux kernel 2.4.28
    linux linux kernel 2.4.0
    linux linux kernel 2.4.0 test1
    linux linux kernel 2.4.0 test10
    linux linux kernel 2.4.0 test11
    linux linux kernel 2.4.0 test12
    linux linux kernel 2.4.0 test2
    linux linux kernel 2.4.0 test3
    linux linux kernel 2.4.0 test4
    linux linux kernel 2.4.0 test5
    linux linux kernel 2.4.0 test6
    linux linux kernel 2.4.0 test7
    linux linux kernel 2.4.0 test8
    linux linux kernel 2.4.0 test9
    linux linux kernel 2.4.1
    linux linux kernel 2.4.10
    linux linux kernel 2.4.11
    linux linux kernel 2.4.11 pre3
    linux linux kernel 2.4.12
    linux linux kernel 2.4.13
    linux linux kernel 2.4.14
    linux linux kernel 2.4.15
    linux linux kernel 2.4.16
    linux linux kernel 2.4.17
    linux linux kernel 2.4.18 pre1
    linux linux kernel 2.4.18 pre2
    linux linux kernel 2.4.18 pre3
    linux linux kernel 2.4.18 pre4
    linux linux kernel 2.4.18 pre5
    linux linux kernel 2.4.18 pre6
    linux linux kernel 2.4.18 pre7
    linux linux kernel 2.4.18 pre8
    linux linux kernel 2.4.18 pre9
    linux linux kernel 2.4.19
    linux linux kernel 2.4.19
    linux linux kernel 2.4.19
    linux linux kernel 2.4.19
    linux linux kernel 2.4.19
    linux linux kernel 2.4.19
    linux linux kernel 2.4.19
    linux linux kernel 2.4.2
    linux linux kernel 2.4.21
    linux linux kernel 2.4.21
    linux linux kernel 2.4.21
    linux linux kernel 2.4.22 pre10
    linux linux kernel 2.4.23
    linux linux kernel 2.4.23
    linux linux kernel 2.4.23
    linux linux kernel 2.4.24
    linux linux kernel 2.4.24
    linux linux kernel 2.4.25
    linux linux kernel 2.4.26
    linux linux kernel 2.4.27
    linux linux kernel 2.4.27
    linux linux kernel 2.4.27
    linux linux kernel 2.4.27
    linux linux kernel 2.4.27
    linux linux kernel 2.4.29
    linux linux kernel 2.4.29 rc1
    linux linux kernel 2.4.29 rc2
    linux linux kernel 2.4.3 pre3
    linux linux kernel 2.4.30
    linux linux kernel 2.4.30 rc2
    linux linux kernel 2.4.30 rc3
    linux linux kernel 2.4.31
    linux linux kernel 2.4.31 pre1
    linux linux kernel 2.4.32
    linux linux kernel 2.4.32 pre1
    linux linux kernel 2.4.32 pre2
    linux linux kernel 2.4.33
    linux linux kernel 2.4.33 pre1
    linux linux kernel 2.4.33.2
    linux linux kernel 2.4.33.3
    linux linux kernel 2.4.33.4
    linux linux kernel 2.4.33.5
    linux linux kernel 2.4.34
    linux linux kernel 2.4.34 rc3
    linux linux kernel 2.4.34.1
    linux linux kernel 2.4.34.2
    linux linux kernel 2.4.35
    linux linux kernel 2.4.8
    linux linux kernel 2.4.9
    linux linux kernel 2.4.9_pre5
    linux linux kernel 2.4.22 pre10
    linux linux kernel 2.4.33.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 4
    redhat enterprise linux 4
    novell linux desktop 9
    redhat enterprise linux 4
    redhat enterprise linux 4
    debian debian linux 3.1
    novell open enterprise server *
    redhat linux advanced workstation 2.1
    canonical ubuntu 6.06
    suse suse linux 10.1
    suse linux enterprise server 9
    novell suse linux enterprise server 10 sp2
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2007.1
    debian debian linux 4.0
    avaya communication manager 3.1
    avaya communication manager 4.0.3
    avaya message networking 3.1
    canonical ubuntu 7.04
    avaya communication manager 3.1.4
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2007.1
    redhat enterprise linux 4.5.z
    redhat enterprise linux 4.5.z
    avaya communication manager 4.0
    avaya communication manager 3.1.3
    novell open enterprise server *
    novell opensuse 10.2
    novell opensuse 10.3
    avaya communication manager 3.1.1
    avaya communication manager 3.1.2
    avaya communication manager 4.0.1