Vulnerability Name:

CVE-2008-0600 (CCN-40540)

Assigned:2008-02-09
Published:2008-02-09
Updated:2023-02-13
Summary:The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.6 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.6 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (REDHAT CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.6 Medium (REDHAT Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: BugTraq Mailing List, Tue Feb 12 2008 - 01:50:49 CST
CSA-L03: Linux kernel vmsplice unchecked user-pointer dereference

Source: MITRE
Type: CNA
CVE-2008-0600

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: Exploit
secalert@redhat.com

Source: secalert@redhat.com
Type: Exploit
secalert@redhat.com

Source: secalert@redhat.com
Type: Exploit
secalert@redhat.com

Source: secalert@redhat.com
Type: Exploit
secalert@redhat.com

Source: secalert@redhat.com
Type: Exploit
secalert@redhat.com

Source: CCN
Type: RHSA-2008-0129
Important: kernel security update

Source: CCN
Type: SA28835
Linux Kernel "vmsplice()" System Call Vulnerabilities

Source: CCN
Type: SECTRACK ID: 1019393
Linux Kernel vmsplice() Memory Dereference Bug Lets Local Users Gain Root Privileges

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: DEBIAN
Type: DSA-1494
linux-2.6 -- missing access checks

Source: CCN
Type: iSEC Security Research Web site
Linux kernel vmsplice unchecked user-pointer dereference

Source: CCN
Type: The Linux Kernel Archives Web site
The Linux Kernel Archives

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: BID-27704
RETIRED: Linux Kernel Multiple Prior to 2.6.24.1 Multiple Memory Access Vulnerabilities

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: BID-27801
Linux Kernel Prior to 2.6.24.2 'vmsplice_to_pipe()' Local Privilege Escalation Vulnerability

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: TLSA-2008-8
Security and Bug fix

Source: CCN
Type: USN-577-1
Linux kernel vulnerability

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: XF
Type: UNKNOWN
linux-kernel-vmsplicetopipe-priv-escalation(40540)

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: SUSE
Type: SUSE-SA:2008:007
Linux Kernel Security Problem

Source: SUSE
Type: SUSE-SA:2008:013
Linux kernel security problem

Source: SUSE
Type: SUSE-SA:2008:030
Linux kernel security update

Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.19:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.21:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.20:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.23:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.22:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.21:rc7:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.10:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.11:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.12:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.13:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.14:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.15:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.16:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.17:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.18:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.19:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.20:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.21:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.22:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.23:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.24:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.25:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.26:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.27:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.28:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.29:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.30:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.31:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.32:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.33:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.34:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.35:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.36:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.37:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.38:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.39:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.40:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.41:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.42:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.43:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.44:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.45:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.46:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.47:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.48:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.49:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.50:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.51:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.52:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.53:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18.9:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.24:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*
  • AND
  • cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*
  • OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:10.1::personal:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007::x86_64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.04:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.10:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1::x86-64:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:10.2:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:10.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:17497
    P
    USN-577-1 -- linux-source-2.6.17/20/22 vulnerability
    2014-06-30
    oval:org.mitre.oval:def:7882
    P
    DSA-1494 linux-2.6 -- missing access checks
    2014-06-23
    oval:org.mitre.oval:def:22451
    P
    ELSA-2008:0129: kernel security update (Important)
    2014-05-26
    oval:org.mitre.oval:def:11358
    V
    The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.
    2013-04-29
    oval:org.debian:def:1494
    V
    missing access checks
    2013-01-21
    oval:org.opensuse.security:def:20080600
    V
    CVE-2008-0600
    2012-11-01
    oval:com.redhat.rhsa:def:20080129
    P
    RHSA-2008:0129: kernel security update (Important)
    2008-02-12
    BACK
    linux linux kernel 2.6.17 rc1
    linux linux kernel 2.6.19
    linux linux kernel 2.6.21
    linux linux kernel 2.6.20
    linux linux kernel 2.6.22.7
    linux linux kernel 2.6.23
    linux linux kernel 2.6.17
    linux linux kernel 2.6.18
    linux linux kernel 2.6.22
    linux linux kernel 2.6.23.14
    linux linux kernel 2.6.18 rc5
    linux linux kernel 2.6.18 rc2
    linux linux kernel 2.6.18 rc1
    linux linux kernel 2.6.17 rc6
    linux linux kernel 2.6.17 rc5
    linux linux kernel 2.6.17 rc4
    linux linux kernel 2.6.17 rc3
    linux linux kernel 2.6.17 rc2
    linux linux kernel 2.6.17.9
    linux linux kernel 2.6.17.8
    linux linux kernel 2.6.17.7
    linux linux kernel 2.6.17.6
    linux linux kernel 2.6.17.5
    linux linux kernel 2.6.17.4
    linux linux kernel 2.6.17.3
    linux linux kernel 2.6.17.2
    linux linux kernel 2.6.17.11
    linux linux kernel 2.6.17.10
    linux linux kernel 2.6.17.1
    linux linux kernel 2.6.24 rc2
    linux linux kernel 2.6.23.1
    linux linux kernel 2.6.23.2
    linux linux kernel 2.6.23.3
    linux linux kernel 2.6.23.4
    linux linux kernel 2.6.23.5
    linux linux kernel 2.6.23 rc1
    linux linux kernel 2.6.23 rc2
    linux linux kernel 2.6.22 rc6
    linux linux kernel 2.6.17.12
    linux linux kernel 2.6.17.13
    linux linux kernel 2.6.17.14
    linux linux kernel 2.6.18.1
    linux linux kernel 2.6.18.2
    linux linux kernel 2.6.18.3
    linux linux kernel 2.6.18.4
    linux linux kernel 2.6.19 rc1
    linux linux kernel 2.6.19 rc2
    linux linux kernel 2.6.19 rc3
    linux linux kernel 2.6.19 rc4
    linux linux kernel 2.6.19.1
    linux linux kernel 2.6.19.2
    linux linux kernel 2.6.20.1
    linux linux kernel 2.6.20.10
    linux linux kernel 2.6.20.11
    linux linux kernel 2.6.20.12
    linux linux kernel 2.6.20.13
    linux linux kernel 2.6.20.14
    linux linux kernel 2.6.20.2
    linux linux kernel 2.6.20.3
    linux linux kernel 2.6.20.4
    linux linux kernel 2.6.20.5
    linux linux kernel 2.6.20.8
    linux linux kernel 2.6.20.9
    linux linux kernel 2.6.21.1
    linux linux kernel 2.6.21.2
    linux linux kernel 2.6.21.3
    linux linux kernel 2.6.21.4
    linux linux kernel 2.6.22.1
    linux linux kernel 2.6.22.6
    linux linux kernel 2.6.22.3
    linux linux kernel 2.6.22.4
    linux linux kernel 2.6.22.5
    linux linux kernel 2.6.21 rc3
    linux linux kernel 2.6.21 rc4
    linux linux kernel 2.6.21 rc5
    linux linux kernel 2.6.21 rc6
    linux linux kernel 2.6.21 rc7
    linux linux kernel 2.6.20 rc2
    linux linux kernel 2.6.20.15
    linux linux kernel 2.6.18.5
    linux linux kernel 2.6.18.6
    linux linux kernel 2.6.18.7
    linux linux kernel 2.6.18.8
    linux linux kernel 2.6.18 rc3
    linux linux kernel 2.6.18 rc4
    linux linux kernel 2.6.18 rc6
    linux linux kernel 2.6.18 rc7
    linux linux kernel 2.6.19.3
    linux linux kernel 2.6.20.6
    linux linux kernel 2.6.20.7
    linux linux kernel 2.6.21 git1
    linux linux kernel 2.6.21 git2
    linux linux kernel 2.6.21 git3
    linux linux kernel 2.6.21 git4
    linux linux kernel 2.6.21 git5
    linux linux kernel 2.6.21 git6
    linux linux kernel 2.6.21 git7
    linux linux kernel 2.6.22.16
    linux linux kernel 2.6.23.9
    linux linux kernel 2.6.24 rc3
    linux linux kernel 2.6.18.10
    linux linux kernel 2.6.18.11
    linux linux kernel 2.6.18.12
    linux linux kernel 2.6.18.13
    linux linux kernel 2.6.18.14
    linux linux kernel 2.6.18.15
    linux linux kernel 2.6.18.16
    linux linux kernel 2.6.18.17
    linux linux kernel 2.6.18.18
    linux linux kernel 2.6.18.19
    linux linux kernel 2.6.18.20
    linux linux kernel 2.6.18.21
    linux linux kernel 2.6.18.22
    linux linux kernel 2.6.18.23
    linux linux kernel 2.6.18.24
    linux linux kernel 2.6.18.25
    linux linux kernel 2.6.18.26
    linux linux kernel 2.6.18.27
    linux linux kernel 2.6.18.28
    linux linux kernel 2.6.18.29
    linux linux kernel 2.6.18.30
    linux linux kernel 2.6.18.31
    linux linux kernel 2.6.18.32
    linux linux kernel 2.6.18.33
    linux linux kernel 2.6.18.34
    linux linux kernel 2.6.18.35
    linux linux kernel 2.6.18.36
    linux linux kernel 2.6.18.37
    linux linux kernel 2.6.18.38
    linux linux kernel 2.6.18.39
    linux linux kernel 2.6.18.40
    linux linux kernel 2.6.18.41
    linux linux kernel 2.6.18.42
    linux linux kernel 2.6.18.43
    linux linux kernel 2.6.18.44
    linux linux kernel 2.6.18.45
    linux linux kernel 2.6.18.46
    linux linux kernel 2.6.18.47
    linux linux kernel 2.6.18.48
    linux linux kernel 2.6.18.49
    linux linux kernel 2.6.18.50
    linux linux kernel 2.6.18.51
    linux linux kernel 2.6.18.52
    linux linux kernel 2.6.18.53
    linux linux kernel 2.6.18.9
    linux linux kernel 2.6.24.1
    linux linux kernel 2.6.24
    linux linux kernel 2.6.23.6
    linux linux kernel 2.6.23.7
    suse linux enterprise server 8
    novell linux desktop 9
    suse suse linux 10.1
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux 2007
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2007.1
    mandrakesoft mandrake linux 2008.0
    debian debian linux 4.0
    canonical ubuntu 7.04
    redhat enterprise linux 5
    canonical ubuntu 7.10
    mandrakesoft mandrake linux 2008.0
    mandrakesoft mandrake linux 2007.1
    novell opensuse 10.2
    novell opensuse 10.3