Vulnerability Name:

CVE-2013-1928 (CCN-83853)

Assigned:2012-10-25
Published:2012-10-25
Updated:2023-02-13
Summary:The do_video_set_spu_palette function in fs/compat_ioctl.c in the Linux kernel before 3.6.5 on unspecified architectures lacks a certain error check, which might allow local users to obtain sensitive information from kernel stack memory via a crafted VIDEO_SET_SPU_PALETTE ioctl call on a /dev/dvb device.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:4.7 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:N/A:N)
3.5 Low (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): None
Availibility (A): None
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
1.6 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
1.7 Low (REDHAT CVSS v2 Vector: AV:L/AC:L/Au:S/C:P/I:N/A:N)
1.3 Low (REDHAT Temporal CVSS v2 Vector: AV:L/AC:L/Au:S/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2013-1928

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: Linux Kernel GIT Repository
fs/compat_ioctl.c: VIDEO_SET_SPU_PALETTE missing error check

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: RHSA-2013-1645
Important: Red Hat Enterprise Linux 6 kernel update

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: DEBIAN
Type: DSA-2668
linux-2.6 -- privilege escalation/denial of service/information leak

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: BID-58906
Linux Kernel 'fs/compat_ioctl.c' Information Disclosure Vulnerability

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: Red Hat Bugzilla Bug 949567
CVE-2013-1928 Kernel: information leak in fs/compat_ioctl.c VIDEO_SET_SPU_PALETTE

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: XF
Type: UNKNOWN
linux-cve20131928-info-disc(83853)

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2013-1928

Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:redhat:enterprise_linux:6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.3:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*
  • OR cpe:/a:accelatech:bizsearch:3.2:-:~~~linux_kernel~~:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.1:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.31:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.6:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.32:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.30:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.29:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.27:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.28:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.25:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.4.26:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20131928
    V
    CVE-2013-1928
    2022-05-20
    oval:org.opensuse.security:def:33117
    P
    Security update for openexr (Important)
    2022-01-12
    oval:org.opensuse.security:def:33068
    P
    Security update for libvpx (Moderate)
    2021-12-23
    oval:org.opensuse.security:def:33011
    P
    Security update for hivex (Moderate)
    2021-09-23
    oval:org.opensuse.security:def:33900
    P
    Security update for java-1_7_0-openjdk (Moderate)
    2021-04-29
    oval:org.opensuse.security:def:33861
    P
    Security update for jakarta-commons-fileupload (Important)
    2020-12-01
    oval:org.opensuse.security:def:29113
    P
    Security update for java-1_7_0-ibm (Important)
    2020-12-01
    oval:org.opensuse.security:def:32855
    P
    evince on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28593
    P
    Security update for openvpn
    2020-12-01
    oval:org.opensuse.security:def:32392
    P
    Security update for tomcat6 (Important)
    2020-12-01
    oval:org.opensuse.security:def:29174
    P
    Security update to ucode-intel (Important)
    2020-12-01
    oval:org.opensuse.security:def:28735
    P
    Security update for kvm and libvirt
    2020-12-01
    oval:org.opensuse.security:def:32404
    P
    Security update for w3m (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:29848
    P
    Security update for Linux kernel
    2020-12-01
    oval:org.opensuse.security:def:33156
    P
    libjasper on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28971
    P
    Security update for postgresql94 (Important)
    2020-12-01
    oval:org.opensuse.security:def:32617
    P
    xorg-x11 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28383
    P
    Security update for rubygem-activesupport-3_2 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33223
    P
    pam_ldap on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:29074
    P
    Security update for cups (Important)
    2020-12-01
    oval:org.opensuse.security:def:32768
    P
    perl-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28462
    P
    Security update for xorg-x11-libX11 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:29130
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:28678
    P
    Security update for MozillaFirefox, mozilla-nss (Important)
    2020-12-01
    oval:org.opensuse.security:def:32393
    P
    Security update for tomcat6 (Important)
    2020-12-01
    oval:org.opensuse.security:def:29812
    P
    Security update for jasper
    2020-12-01
    oval:org.opensuse.security:def:28819
    P
    Security update for python
    2020-12-01
    oval:org.opensuse.security:def:32482
    P
    NetworkManager-gnome on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28382
    P
    Security update for rubygem-activerecord-3_2 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33179
    P
    libsamplerate on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:29025
    P
    Security update for LibVNCServer (Important)
    2020-12-01
    oval:org.opensuse.security:def:32711
    P
    libfreebl3 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:28394
    P
    Security update for samba (Moderate)
    2020-12-01
    oval:org.mitre.oval:def:24665
    P
    SUSE-SU-2014:0287-1 -- Security update for Linux kernel
    2015-03-16
    oval:org.mitre.oval:def:27358
    P
    ELSA-2013-2585 -- Unbreakable Enterprise Kernel security update (important)
    2015-03-16
    oval:org.mitre.oval:def:27431
    P
    ELSA-2013-2584 -- Unbreakable Enterprise Kernel security update (important)
    2014-12-15
    oval:org.mitre.oval:def:27264
    P
    ELSA-2013-1645 -- Oracle Linux 6 kernel update (important)
    2014-12-15
    oval:org.mitre.oval:def:26083
    P
    RHSA-2013:1645: Red Hat Enterprise Linux 6 kernel update (Important)
    2014-09-15
    oval:org.mitre.oval:def:25739
    P
    SUSE-SU-2013:1832-1 -- Security update for Linux kernel
    2014-09-08
    oval:org.mitre.oval:def:25975
    P
    SUSE-SU-2013:0856-1 -- Security update for Linux kernel
    2014-09-08
    oval:org.mitre.oval:def:18315
    P
    USN-1829-1 -- linux-ec2 vulnerabilities
    2014-07-21
    oval:org.mitre.oval:def:18197
    P
    USN-1644-1 -- linux vulnerabilities
    2014-07-21
    oval:org.mitre.oval:def:17527
    P
    USN-1671-1 -- linux vulnerability
    2014-07-07
    oval:org.mitre.oval:def:17778
    P
    USN-1648-1 -- linux vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:18214
    P
    USN-1649-1 -- linux-ti-omap4 vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:17235
    P
    USN-1652-1 -- linux-lts-backport-oneiric vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:18082
    P
    USN-1645-1 -- linux-ti-omap4 vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:18254
    P
    USN-1704-1 -- linux-lts-quantal - Linux kernel hardware enablement from Quantal vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:17291
    P
    USN-1673-1 -- linux-ti-omap4 vulnerability
    2014-06-30
    oval:org.mitre.oval:def:18125
    P
    USN-1824-1 -- linux vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:19799
    P
    DSA-2668-1 linux-2.6 - several
    2014-06-23
    oval:com.redhat.rhsa:def:20131645
    P
    RHSA-2013:1645: Red Hat Enterprise Linux 6 kernel update (Important)
    2013-11-21
    oval:com.ubuntu.precise:def:20131928000
    V
    CVE-2013-1928 on Ubuntu 12.04 LTS (precise) - low.
    2013-04-29
    oval:com.ubuntu.xenial:def:201319280000000
    V
    CVE-2013-1928 on Ubuntu 16.04 LTS (xenial) - low.
    2013-04-29
    oval:com.ubuntu.trusty:def:20131928000
    V
    CVE-2013-1928 on Ubuntu 14.04 LTS (trusty) - low.
    2013-04-29
    oval:com.ubuntu.xenial:def:20131928000
    V
    CVE-2013-1928 on Ubuntu 16.04 LTS (xenial) - low.
    2013-04-29
    BACK
    redhat enterprise linux 6
    linux linux kernel 3.0 rc1
    linux linux kernel 3.0 rc2
    linux linux kernel 3.0 rc3
    linux linux kernel 3.0 rc4
    linux linux kernel 3.0.1
    linux linux kernel 3.0.4
    linux linux kernel 3.0.5
    linux linux kernel 3.1.8
    linux linux kernel 3.1.6
    linux linux kernel 3.1.5
    linux linux kernel 3.1.4
    linux linux kernel 3.1.3
    linux linux kernel 3.1.2
    linux linux kernel 3.1.1
    linux linux kernel 3.0 rc7
    linux linux kernel 3.0 rc5
    linux linux kernel 3.0 rc6
    linux linux kernel 3.0.7
    linux linux kernel 3.0.6
    linux linux kernel 3.0.9
    linux linux kernel 3.0.8
    linux linux kernel 3.0.24
    linux linux kernel 3.0.22
    linux linux kernel 3.0.23
    linux linux kernel 3.0.20
    linux linux kernel 3.0.21
    linux linux kernel 3.0.18
    linux linux kernel 3.0.19
    linux linux kernel 3.0.16
    linux linux kernel 3.0.17
    linux linux kernel 3.0.14
    linux linux kernel 3.0.15
    linux linux kernel 3.0.12
    linux linux kernel 3.0.13
    linux linux kernel 3.0.10
    linux linux kernel 3.0.11
    linux linux kernel 3.1.7
    linux linux kernel 3.2 rc2
    linux linux kernel 3.2 rc3
    linux linux kernel 3.2 rc4
    linux linux kernel 3.2 rc5
    linux linux kernel 3.2 rc6
    linux linux kernel 3.2 rc7
    linux linux kernel 3.2.1
    linux linux kernel 3.2.2
    linux linux kernel 3.2.3
    linux linux kernel 3.2.4
    linux linux kernel 3.2.5
    linux linux kernel 3.2.6
    linux linux kernel 3.2.7
    linux linux kernel 3.2.8
    linux linux kernel 3.2.9
    linux linux kernel 3.3 rc7
    linux linux kernel 3.3 rc4
    linux linux kernel 3.3 rc3
    linux linux kernel 3.3 rc6
    linux linux kernel 3.3 rc5
    linux linux kernel 3.3 rc2
    linux linux kernel 3.3 rc1
    linux linux kernel 3.3
    linux linux kernel 3.3.1
    linux linux kernel 3.3.2
    linux linux kernel 3.3.3
    linux linux kernel 3.3.4
    linux linux kernel 3.3.5
    linux linux kernel 3.3.6
    linux linux kernel 3.4.1
    linux linux kernel 3.4
    linux kernel 3.4 rc7
    linux kernel 3.4 rc6
    linux kernel 3.4 rc5
    linux kernel 3.4 rc4
    linux kernel 3.4 rc3
    linux kernel 3.4 rc2
    linux kernel 3.4 rc1
    linux linux kernel 3.1.10
    linux linux kernel 3.1.9
    accelatech bizsearch 3.2 -
    linux linux kernel 3.2.12
    linux linux kernel 3.0.2
    linux linux kernel 3.0.25
    linux linux kernel 3.0.26
    linux linux kernel 3.0.27
    linux linux kernel 3.0.28
    linux linux kernel 3.0.29
    linux linux kernel 3.0.3
    linux linux kernel 3.0.30
    linux linux kernel 3.0.31
    linux linux kernel 3.0.32
    linux linux kernel 3.0.33
    linux linux kernel 3.0.34
    linux linux kernel 3.1
    linux kernel 3.1 rc1
    linux kernel 3.1 rc2
    linux kernel 3.1 rc3
    linux kernel 3.1 rc4
    linux linux kernel 3.2.10
    linux linux kernel 3.2.11
    linux linux kernel 3.2.13
    linux linux kernel 3.2.14
    linux linux kernel 3.2.15
    linux linux kernel 3.2.16
    linux linux kernel 3.2.17
    linux linux kernel 3.2.18
    linux linux kernel 3.2.19
    linux linux kernel 3.2.20
    linux linux kernel 3.3.7
    linux linux kernel 3.3.8
    linux linux kernel 3.4.2
    linux linux kernel 3.4.5
    linux linux kernel 3.4.31
    linux linux kernel 3.6
    linux linux kernel 3.6.1
    linux linux kernel 3.6.4
    linux linux kernel 3.6.3
    linux linux kernel 3.6.2
    linux linux kernel 3.5.6
    linux linux kernel 3.5.4
    linux linux kernel 3.5.5
    linux linux kernel 3.5.1
    linux linux kernel 3.5.2
    linux linux kernel 3.5.7
    linux linux kernel 3.5.3
    linux linux kernel 3.4.13
    linux linux kernel 3.4.9
    linux linux kernel 3.4.10
    linux linux kernel 3.4.11
    linux linux kernel 3.4.12
    linux linux kernel 3.4.6
    linux linux kernel 3.4.7
    linux linux kernel 3.4.8
    linux linux kernel 3.4.3
    linux linux kernel 3.4.4
    linux linux kernel 3.4.16
    linux linux kernel 3.4.17
    linux linux kernel 3.4.14
    linux linux kernel 3.4.15
    linux linux kernel 3.4.20
    linux linux kernel 3.4.21
    linux linux kernel 3.4.18
    linux linux kernel 3.4.19
    linux linux kernel 3.4.24
    linux linux kernel 3.4.23
    linux linux kernel 3.4.22
    linux linux kernel 3.2.25
    linux linux kernel 3.2.26
    linux linux kernel 3.2.27
    linux linux kernel 3.2.28
    linux linux kernel 3.2.24
    linux linux kernel 3.2.23
    linux linux kernel 3.2.30
    linux linux kernel 3.2.29
    linux linux kernel 3.2.22
    linux linux kernel 3.2.21
    linux linux kernel 3.0.43
    linux linux kernel 3.0.44
    linux linux kernel 3.0.37
    linux linux kernel 3.0.38
    linux linux kernel 3.0.35
    linux linux kernel 3.0.36
    linux linux kernel 3.0.41
    linux linux kernel 3.0.42
    linux linux kernel 3.0.39
    linux linux kernel 3.0.40
    linux linux kernel 3.4.32
    linux linux kernel 3.4.30
    linux linux kernel 3.4.29
    linux linux kernel 3.4.27
    linux linux kernel 3.4.28
    linux linux kernel 3.4.25
    linux linux kernel 3.4.26
    linux linux kernel 3.0.58
    linux linux kernel 3.0.59
    linux linux kernel 3.0.60
    linux linux kernel 3.0.61
    linux linux kernel 3.0.62
    linux linux kernel 3.0.63
    linux linux kernel 3.0.64
    linux linux kernel 3.0.65
    linux linux kernel 3.0.50
    linux linux kernel 3.0.51
    linux linux kernel 3.0.52
    linux linux kernel 3.0.53
    linux linux kernel 3.0.54
    linux linux kernel 3.0.55
    linux linux kernel 3.0.56
    linux linux kernel 3.0.57
    linux linux kernel 3.0.45
    linux linux kernel 3.0.47
    linux linux kernel 3.0.46
    linux linux kernel 3.0.49
    linux linux kernel 3.0.48
    linux linux kernel 3.0.68
    linux linux kernel 3.0.67
    linux linux kernel 3.0.66
    redhat enterprise linux 6
    redhat enterprise linux 6
    redhat enterprise linux desktop 6
    redhat enterprise linux hpc node 6