var-201403-0508
Vulnerability from variot

The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk. The Linux kernel is prone to a denial-of-service vulnerability. An attacker can exploit this issue to crash the affected computer, denying service to legitimate users. The NFSv4 implementation is one of the distributed file system protocols. The vulnerability stems from the fact that the program does not verify the auth_enable and auth_capable fields before calling sctp_sf_authenticate. (CVE-2014-0196)

Matthew Daley reported an information leak in the floppy disk driver of the Linux kernel. (CVE-2014-1737)

A flaw was discovered in the Linux kernel's IPC reference counting. (CVE-2014-0069)

A flaw was discovered in the handling of network packets when mergeable buffers are disabled for virtual machines in the Linux kernel. (CVE-2014-0077)

A flaw was discovered in the Linux kernel's handling of the SCTP handshake. (CVE-2014-2309)

An error was discovered in the Linux kernel's DCCP protocol support. (CVE-2014-2523)

Max Sydorenko discovered a race condition in the Atheros 9k wireless driver in the Linux kernel. (CVE-2014-2672)

An error was discovered in the Reliable Datagram Sockets (RDS) protocol stack in the Linux kernel. (CVE-2014-2678)

Yaara Rozenblum discovered a race condition in the Linux kernel's Generic IEEE 802.11 Networking Stack (mac80211). (CVE-2014-2706)

A flaw was discovered in the Linux kernel's ping sockets. (CVE-2014-2851)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.04 LTS: linux-image-3.2.0-1446-omap4 3.2.0-1446.65

After a standard system update you need to reboot your computer to make all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well.

The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification (CVE-2014-3153). NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced (CVE-2014-3144). NOTE: the affected code was moved to the __skb_get_nlattr_nest function before the vulnerability was announced (CVE-2014-3145).

The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device (CVE-2014-1737).

Buffer overflow in virt/kvm/irq_comm.c in the KVM subsystem in the Linux kernel before 3.2.24 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to Message Signaled Interrupts (MSI), irq routing entries, and an incorrect check by the setup_routing_entry function before invoking the kvm_set_irq function (CVE-2012-2137).

The updated packages provides a solution for these security issues. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2013-0343

George Kargiotakis reported an issue in the temporary address handling
of the IPv6 privacy extensions. Users on the same LAN can cause a denial
of service or obtain access to sensitive information by sending router
advertisement messages that cause temporary address generation to be
disabled.

CVE-2013-2147

Dan Carpenter reported issues in the cpqarray driver for Compaq
Smart2 Controllers and the cciss driver for HP Smart Array controllers
allowing users to gain access to sensitive kernel memory.

CVE-2013-2889

Kees Cook discovered missing input sanitization in the HID driver for
Zeroplus game pads that could lead to a local denial of service.

CVE-2013-2893

Kees Cook discovered that missing input sanitization in the HID driver
for various Logitech force feedback devices could lead to a local denial
of service.

CVE-2013-2929

Vasily Kulikov discovered that a flaw in the get_dumpable() function of
the ptrace subsytsem could lead to information disclosure. Only systems
with the fs.suid_dumpable sysctl set to a non-default value of '2' are
vulnerable.

CVE-2013-4162

Hannes Frederic Sowa discovered that incorrect handling of IPv6 sockets
using the UDP_CORK option could result in denial of service.

CVE-2013-4299

Fujitsu reported an issue in the device-mapper subsystem. Local users
could gain access to sensitive kernel memory.

CVE-2013-4345

Stephan Mueller found in bug in the ANSI pseudo random number generator
which could lead to the use of less entropy than expected.

CVE-2013-4512

Nico Golde and Fabian Yamaguchi reported an issue in the user mode
linux port. A buffer overflow condition exists in the write method
for the /proc/exitcode file. Local users with sufficient privileges
allowing them to write to this file could gain further elevated
privileges.

CVE-2013-4587

Andrew Honig of Google reported an issue in the KVM virtualization
subsystem. A local user could gain elevated privileges by passing
a large vcpu_id parameter.

CVE-2013-6367

Andrew Honig of Google reported an issue in the KVM virtualization
subsystem.

CVE-2013-6380

Mahesh Rajashekhara reported an issue in the aacraid driver for storage
products from various vendors. Local users with CAP_SYS_ADMIN privileges
could gain further elevated privileges.

CVE-2013-6381

Nico Golde and Fabian Yamaguchi reported an issue in the Gigabit Ethernet
device support for s390 systems.

CVE-2013-6382

Nico Golde and Fabian Yamaguchi reported an issue in the XFS filesystem. 
Local users with CAP_SYS_ADMIN privileges could gain further elevated
privileges.

CVE-2013-6383

Dan Carpenter reported an issue in the aacraid driver for storage devices
from various vendors. A local user could gain elevated privileges due to
a missing privilege level check in the aac_compat_ioctl function.

CVE-2013-7263 CVE-2013-7264 CVE-2013-7265

mpb reported an information leak in the recvfrom, recvmmsg and recvmsg
system calls.

CVE-2013-7339

Sasha Levin reported an issue in the RDS network protocol over Infiniband. 
A local user could cause a denial of service condition.

CVE-2014-0101

Nokia Siemens Networks reported an issue in the SCTP network protocol
subsystem. Remote users could cause a denial of service (NULL pointer
dereference).

CVE-2014-1444

Salva Peiro reported an issue in the FarSync WAN driver. Local users
with the CAP_NET_ADMIN capability could gain access to sensitive kernel
memory.

CVE-2014-1445

Salva Peiro reported an issue in the wanXL serial card driver. Local
users could gain access to sensitive kernel memory.

CVE-2014-1446

Salva Peiro reported an issue in the YAM radio modem driver. Local users
with the CAP_NET_ADMIN capability could gain access to sensitive kernel
memory.

CVE-2014-1874

Matthew Thode reported an issue in the SELinux subsystem.

CVE-2014-2039

Martin Schwidefsky reported an issue on s390 systems. A local user
could cause a denial of service (kernel oops) by executing an application
with a linkage stack instruction.

CVE-2014-2523

Daniel Borkmann provided a fix for an issue in the nf_conntrack_dccp
module.

For the oldstable distribution (squeeze), this problem has been fixed in version 2.6.32-48squeeze5.

The following matrix lists additional source packages that were rebuilt for compatibility with or to take advantage of this update:

                                         Debian 6.0 (squeeze)
 user-mode-linux                         2.6.32-1um-4+48squeeze5

We recommend that you upgrade your linux-2.6 and user-mode-linux packages. However, given the high frequency at which low-severity security issues are discovered in the kernel and the resource requirements of doing an update, updates for lower priority issues will normally not be released for all kernels at the same time. Rather, they will be released in a staggered or "leap-frog" fashion. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2014:0328-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0328.html Issue date: 2014-03-25 CVE Names: CVE-2013-1860 CVE-2014-0055 CVE-2014-0069 CVE-2014-0101 =====================================================================

  1. Summary:

Updated kernel packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64

  1. A flaw was found in the way the get_rx_bufs() function in the vhost_net implementation in the Linux kernel handled error conditions reported by the vhost_get_vq_desc() function. A privileged guest user could use this flaw to crash the host. (CVE-2014-0055, Important)

  2. A flaw was found in the way the Linux kernel processed an authenticated COOKIE_ECHO chunk during the initialization of an SCTP connection. (CVE-2014-0101, Important)

  3. A flaw was found in the way the Linux kernel's CIFS implementation handled uncached write operations with specially crafted iovec structures. An unprivileged local user with access to a CIFS share could use this flaw to crash the system, leak kernel memory, or, potentially, escalate their privileges on the system. Note: the default cache settings for CIFS mounts on Red Hat Enterprise Linux 6 prohibit a successful exploitation of this issue. (CVE-2014-0069, Moderate)

  4. A heap-based buffer overflow flaw was found in the Linux kernel's cdc-wdm driver, used for USB CDC WCM device management. An attacker with physical access to a system could use this flaw to cause a denial of service or, potentially, escalate their privileges. (CVE-2013-1860, Low)

Red Hat would like to thank Nokia Siemens Networks for reporting CVE-2014-0101, and Al Viro for reporting CVE-2014-0069.

This update also fixes several bugs. Documentation for these changes will be available shortly from the Technical Notes document linked to in the References section.

All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect.

  1. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system.

  1. Bugs fixed (https://bugzilla.redhat.com/):

921970 - CVE-2013-1860 kernel: usb: cdc-wdm buffer overflow triggered by device 1062577 - CVE-2014-0055 kernel: vhost-net: insufficient handling of error conditions in get_rx_bufs() 1064253 - CVE-2014-0069 kernel: cifs: incorrect handling of bogus user pointers during uncached writes 1070705 - CVE-2014-0101 kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk

  1. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/kernel-2.6.32-431.11.2.el6.src.rpm

i386: kernel-2.6.32-431.11.2.el6.i686.rpm kernel-debug-2.6.32-431.11.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-431.11.2.el6.i686.rpm kernel-debug-devel-2.6.32-431.11.2.el6.i686.rpm kernel-debuginfo-2.6.32-431.11.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-431.11.2.el6.i686.rpm kernel-devel-2.6.32-431.11.2.el6.i686.rpm kernel-headers-2.6.32-431.11.2.el6.i686.rpm perf-2.6.32-431.11.2.el6.i686.rpm perf-debuginfo-2.6.32-431.11.2.el6.i686.rpm python-perf-debuginfo-2.6.32-431.11.2.el6.i686.rpm

noarch: kernel-abi-whitelists-2.6.32-431.11.2.el6.noarch.rpm kernel-doc-2.6.32-431.11.2.el6.noarch.rpm kernel-firmware-2.6.32-431.11.2.el6.noarch.rpm

x86_64: kernel-2.6.32-431.11.2.el6.x86_64.rpm kernel-debug-2.6.32-431.11.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-431.11.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.11.2.el6.x86_64.rpm kernel-devel-2.6.32-431.11.2.el6.x86_64.rpm kernel-headers-2.6.32-431.11.2.el6.x86_64.rpm perf-2.6.32-431.11.2.el6.x86_64.rpm perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/kernel-2.6.32-431.11.2.el6.src.rpm

i386: kernel-debug-debuginfo-2.6.32-431.11.2.el6.i686.rpm kernel-debuginfo-2.6.32-431.11.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-431.11.2.el6.i686.rpm perf-debuginfo-2.6.32-431.11.2.el6.i686.rpm python-perf-2.6.32-431.11.2.el6.i686.rpm python-perf-debuginfo-2.6.32-431.11.2.el6.i686.rpm

x86_64: kernel-debug-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.11.2.el6.x86_64.rpm perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm python-perf-2.6.32-431.11.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/kernel-2.6.32-431.11.2.el6.src.rpm

noarch: kernel-abi-whitelists-2.6.32-431.11.2.el6.noarch.rpm kernel-doc-2.6.32-431.11.2.el6.noarch.rpm kernel-firmware-2.6.32-431.11.2.el6.noarch.rpm

x86_64: kernel-2.6.32-431.11.2.el6.x86_64.rpm kernel-debug-2.6.32-431.11.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-431.11.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.11.2.el6.x86_64.rpm kernel-devel-2.6.32-431.11.2.el6.x86_64.rpm kernel-headers-2.6.32-431.11.2.el6.x86_64.rpm perf-2.6.32-431.11.2.el6.x86_64.rpm perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/kernel-2.6.32-431.11.2.el6.src.rpm

x86_64: kernel-debug-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.11.2.el6.x86_64.rpm perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm python-perf-2.6.32-431.11.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/kernel-2.6.32-431.11.2.el6.src.rpm

i386: kernel-2.6.32-431.11.2.el6.i686.rpm kernel-debug-2.6.32-431.11.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-431.11.2.el6.i686.rpm kernel-debug-devel-2.6.32-431.11.2.el6.i686.rpm kernel-debuginfo-2.6.32-431.11.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-431.11.2.el6.i686.rpm kernel-devel-2.6.32-431.11.2.el6.i686.rpm kernel-headers-2.6.32-431.11.2.el6.i686.rpm perf-2.6.32-431.11.2.el6.i686.rpm perf-debuginfo-2.6.32-431.11.2.el6.i686.rpm python-perf-debuginfo-2.6.32-431.11.2.el6.i686.rpm

noarch: kernel-abi-whitelists-2.6.32-431.11.2.el6.noarch.rpm kernel-doc-2.6.32-431.11.2.el6.noarch.rpm kernel-firmware-2.6.32-431.11.2.el6.noarch.rpm

ppc64: kernel-2.6.32-431.11.2.el6.ppc64.rpm kernel-bootwrapper-2.6.32-431.11.2.el6.ppc64.rpm kernel-debug-2.6.32-431.11.2.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-431.11.2.el6.ppc64.rpm kernel-debug-devel-2.6.32-431.11.2.el6.ppc64.rpm kernel-debuginfo-2.6.32-431.11.2.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-431.11.2.el6.ppc64.rpm kernel-devel-2.6.32-431.11.2.el6.ppc64.rpm kernel-headers-2.6.32-431.11.2.el6.ppc64.rpm perf-2.6.32-431.11.2.el6.ppc64.rpm perf-debuginfo-2.6.32-431.11.2.el6.ppc64.rpm python-perf-debuginfo-2.6.32-431.11.2.el6.ppc64.rpm

s390x: kernel-2.6.32-431.11.2.el6.s390x.rpm kernel-debug-2.6.32-431.11.2.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-431.11.2.el6.s390x.rpm kernel-debug-devel-2.6.32-431.11.2.el6.s390x.rpm kernel-debuginfo-2.6.32-431.11.2.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-431.11.2.el6.s390x.rpm kernel-devel-2.6.32-431.11.2.el6.s390x.rpm kernel-headers-2.6.32-431.11.2.el6.s390x.rpm kernel-kdump-2.6.32-431.11.2.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-431.11.2.el6.s390x.rpm kernel-kdump-devel-2.6.32-431.11.2.el6.s390x.rpm perf-2.6.32-431.11.2.el6.s390x.rpm perf-debuginfo-2.6.32-431.11.2.el6.s390x.rpm python-perf-debuginfo-2.6.32-431.11.2.el6.s390x.rpm

x86_64: kernel-2.6.32-431.11.2.el6.x86_64.rpm kernel-debug-2.6.32-431.11.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-431.11.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.11.2.el6.x86_64.rpm kernel-devel-2.6.32-431.11.2.el6.x86_64.rpm kernel-headers-2.6.32-431.11.2.el6.x86_64.rpm perf-2.6.32-431.11.2.el6.x86_64.rpm perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/kernel-2.6.32-431.11.2.el6.src.rpm

i386: kernel-debug-debuginfo-2.6.32-431.11.2.el6.i686.rpm kernel-debuginfo-2.6.32-431.11.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-431.11.2.el6.i686.rpm perf-debuginfo-2.6.32-431.11.2.el6.i686.rpm python-perf-2.6.32-431.11.2.el6.i686.rpm python-perf-debuginfo-2.6.32-431.11.2.el6.i686.rpm

ppc64: kernel-debug-debuginfo-2.6.32-431.11.2.el6.ppc64.rpm kernel-debuginfo-2.6.32-431.11.2.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-431.11.2.el6.ppc64.rpm perf-debuginfo-2.6.32-431.11.2.el6.ppc64.rpm python-perf-2.6.32-431.11.2.el6.ppc64.rpm python-perf-debuginfo-2.6.32-431.11.2.el6.ppc64.rpm

s390x: kernel-debug-debuginfo-2.6.32-431.11.2.el6.s390x.rpm kernel-debuginfo-2.6.32-431.11.2.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-431.11.2.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-431.11.2.el6.s390x.rpm perf-debuginfo-2.6.32-431.11.2.el6.s390x.rpm python-perf-2.6.32-431.11.2.el6.s390x.rpm python-perf-debuginfo-2.6.32-431.11.2.el6.s390x.rpm

x86_64: kernel-debug-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.11.2.el6.x86_64.rpm perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm python-perf-2.6.32-431.11.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/kernel-2.6.32-431.11.2.el6.src.rpm

i386: kernel-2.6.32-431.11.2.el6.i686.rpm kernel-debug-2.6.32-431.11.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-431.11.2.el6.i686.rpm kernel-debug-devel-2.6.32-431.11.2.el6.i686.rpm kernel-debuginfo-2.6.32-431.11.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-431.11.2.el6.i686.rpm kernel-devel-2.6.32-431.11.2.el6.i686.rpm kernel-headers-2.6.32-431.11.2.el6.i686.rpm perf-2.6.32-431.11.2.el6.i686.rpm perf-debuginfo-2.6.32-431.11.2.el6.i686.rpm python-perf-debuginfo-2.6.32-431.11.2.el6.i686.rpm

noarch: kernel-abi-whitelists-2.6.32-431.11.2.el6.noarch.rpm kernel-doc-2.6.32-431.11.2.el6.noarch.rpm kernel-firmware-2.6.32-431.11.2.el6.noarch.rpm

x86_64: kernel-2.6.32-431.11.2.el6.x86_64.rpm kernel-debug-2.6.32-431.11.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-431.11.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.11.2.el6.x86_64.rpm kernel-devel-2.6.32-431.11.2.el6.x86_64.rpm kernel-headers-2.6.32-431.11.2.el6.x86_64.rpm perf-2.6.32-431.11.2.el6.x86_64.rpm perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/kernel-2.6.32-431.11.2.el6.src.rpm

i386: kernel-debug-debuginfo-2.6.32-431.11.2.el6.i686.rpm kernel-debuginfo-2.6.32-431.11.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-431.11.2.el6.i686.rpm perf-debuginfo-2.6.32-431.11.2.el6.i686.rpm python-perf-2.6.32-431.11.2.el6.i686.rpm python-perf-debuginfo-2.6.32-431.11.2.el6.i686.rpm

x86_64: kernel-debug-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.11.2.el6.x86_64.rpm perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm python-perf-2.6.32-431.11.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package

  1. References:

https://www.redhat.com/security/data/cve/CVE-2013-1860.html https://www.redhat.com/security/data/cve/CVE-2014-0055.html https://www.redhat.com/security/data/cve/CVE-2014-0069.html https://www.redhat.com/security/data/cve/CVE-2014-0101.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.5_Technical_Notes/kernel.html

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFTMZPXXlSAg2UNWIIRAs3jAKCY1B4c1Gm3xuwrXDDvHlYLoVu3WQCfRaVc ZY3S4jlAmQF9n5M8ByIyFkY= =OVFT -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201403-0508",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "kernel",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "linux",
        "version": "3.2.56"
      },
      {
        "model": "big-ip policy enforcement manager",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.3.0"
      },
      {
        "model": "big-ip policy enforcement manager",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.5.3"
      },
      {
        "model": "enterprise linux workstation",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.0"
      },
      {
        "model": "big-ip enterprise manager",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "2.3.0"
      },
      {
        "model": "big-ip link controller",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.5.3"
      },
      {
        "model": "big-iq security",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "4.5.0"
      },
      {
        "model": "kernel",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "linux",
        "version": "3.3"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.5"
      },
      {
        "model": "big-ip global traffic manager",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.1.0"
      },
      {
        "model": "big-ip enterprise manager",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "3.0.0"
      },
      {
        "model": "kernel",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "linux",
        "version": "3.5"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.0"
      },
      {
        "model": "big-ip protocol security module",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.1.0"
      },
      {
        "model": "kernel",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "linux",
        "version": "3.13.7"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "10.04"
      },
      {
        "model": "big-ip edge gateway",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.1.0"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.5"
      },
      {
        "model": "big-ip protocol security module",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.4.1"
      },
      {
        "model": "big-iq adc",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f5",
        "version": "4.5.0"
      },
      {
        "model": "big-ip access policy manager",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.5.3"
      },
      {
        "model": "big-ip webaccelerator",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.1.0"
      },
      {
        "model": "big-ip link controller",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.1.0"
      },
      {
        "model": "big-ip analytics",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.5.3"
      },
      {
        "model": "big-ip local traffic manager",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.5.3"
      },
      {
        "model": "big-iq device",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "4.5.0"
      },
      {
        "model": "big-ip advanced firewall manager",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.5.3"
      },
      {
        "model": "big-ip access policy manager",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.1.0"
      },
      {
        "model": "big-iq cloud",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "4.0.0"
      },
      {
        "model": "kernel",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.24"
      },
      {
        "model": "kernel",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "linux",
        "version": "3.12.15"
      },
      {
        "model": "kernel",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "linux",
        "version": "3.4.84"
      },
      {
        "model": "big-ip enterprise manager",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "2.1.0"
      },
      {
        "model": "big-ip webaccelerator",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.3.0"
      },
      {
        "model": "big-ip wan optimization manager",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.1.0"
      },
      {
        "model": "big-iq cloud",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "4.5.0"
      },
      {
        "model": "big-ip local traffic manager",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.1.0"
      },
      {
        "model": "enterprise linux eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.3"
      },
      {
        "model": "big-ip advanced firewall manager",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.3.0"
      },
      {
        "model": "big-ip edge gateway",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.3.0"
      },
      {
        "model": "big-ip analytics",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.1.0"
      },
      {
        "model": "enterprise linux eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.4"
      },
      {
        "model": "big-ip application acceleration manager",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.5.3"
      },
      {
        "model": "kernel",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "linux",
        "version": "3.11"
      },
      {
        "model": "big-ip enterprise manager",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "3.1.1"
      },
      {
        "model": "big-ip application security manager",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.5.3"
      },
      {
        "model": "kernel",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "linux",
        "version": "3.10.34"
      },
      {
        "model": "big-iq centralized management",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f5",
        "version": "4.6.0"
      },
      {
        "model": "kernel",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "linux",
        "version": "3.13"
      },
      {
        "model": "enterprise linux eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.5"
      },
      {
        "model": "big-ip application security manager",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.1.0"
      },
      {
        "model": "big-ip wan optimization manager",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.3.0"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.0"
      },
      {
        "model": "big-iq device",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "4.2.0"
      },
      {
        "model": "big-ip application acceleration manager",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.4.0"
      },
      {
        "model": "big-iq security",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "4.0.0"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.4"
      },
      {
        "model": "big-ip global traffic manager",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "f5",
        "version": "11.5.3"
      },
      {
        "model": "kernel",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "linux",
        "version": "3.13.6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "linux",
        "version": "3.13.6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "linux",
        "version": "3.10.7"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "linux",
        "version": "3.13.4"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "linux",
        "version": "3.13.1"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "linux",
        "version": "3.12.13"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "linux",
        "version": "3.12.6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "linux",
        "version": "3.13"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "linux",
        "version": "3.13.5"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "linux",
        "version": "3.13.2"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "linux",
        "version": "3.13.3"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.37"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.12"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.19.1"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.24.6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.25.13"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.25"
      },
      {
        "model": "kernel rc4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.9"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.2"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.28.8"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.20.11"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.28.9"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.40"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.27.26"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.27.8"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.27.12"
      },
      {
        "model": "kernel 2.6.33-rc7",
        "scope": null,
        "trust": 0.3,
        "vendor": "linux",
        "version": null
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.18.7"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.28"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.43"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.32.28"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.30.10"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.52"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.45"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.11.10"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "3.2.1"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "3.3.5"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.31.1"
      },
      {
        "model": "linux arm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "kernel rc5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.18"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.10"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.34.2"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.28.4"
      },
      {
        "model": "linux ia-64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "6.2"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.38"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.25.12"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.37"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "3.2.2"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.8"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.30.3"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.39"
      },
      {
        "model": "kernel rc3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.18"
      },
      {
        "model": "linux enterprise server unsupported extras",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "suse",
        "version": "11"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.50"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.27.5"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.14.6"
      },
      {
        "model": "kernel rc1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.9"
      },
      {
        "model": "kernel rc4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.3"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.47"
      },
      {
        "model": "kernel 2.6.36-rc8",
        "scope": null,
        "trust": 0.3,
        "vendor": "linux",
        "version": null
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.27.46"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.38.3"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.18"
      },
      {
        "model": "hat enterprise linux server optional",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "red",
        "version": "6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.29"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.25.10"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.24.2"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.20.7"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.19.2"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.22"
      },
      {
        "model": "kernel 2.6.35-rc5",
        "scope": null,
        "trust": 0.3,
        "vendor": "linux",
        "version": null
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.48"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.26.1"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.28.5"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.15.11"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.36"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.21.1"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.27.14"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.38"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "3.2.9"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.25.8"
      },
      {
        "model": "hat enterprise linux workstation optional",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "red",
        "version": "6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.35.13"
      },
      {
        "model": "kernel rc1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.3"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.11.2"
      },
      {
        "model": "kernel rc2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.18"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.29.4"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.22.11"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "3.0.1"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.20.6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.25"
      },
      {
        "model": "linux amd64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "10.04"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.27.24"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.27"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.18.6"
      },
      {
        "model": "kernel rc4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.8"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.26"
      },
      {
        "model": "kernel rc3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.4"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.33.1"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.18.2"
      },
      {
        "model": "kernel 2.6.36-rc6",
        "scope": null,
        "trust": 0.3,
        "vendor": "linux",
        "version": null
      },
      {
        "model": "kernel 2.6.28-rc7",
        "scope": null,
        "trust": 0.3,
        "vendor": "linux",
        "version": null
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.28"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.19.3"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.36"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.15.2"
      },
      {
        "model": "kernel rc1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.2"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.17"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.20.3"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.31.6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.53"
      },
      {
        "model": "kernel rc3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.9"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.41"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.11.9"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.38.2"
      },
      {
        "model": "kernel rc2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.5"
      },
      {
        "model": "hat enterprise linux hpc node",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "red",
        "version": "6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.11"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.20.12"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.25.4"
      },
      {
        "model": "linux i386",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "10.04"
      },
      {
        "model": "linux sparc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.31.2"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.24.4"
      },
      {
        "model": "kernel rc3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.20.10"
      },
      {
        "model": "kernel rc2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.17"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "3.0.2"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.49"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.14"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.35"
      },
      {
        "model": "kernel rc3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.7"
      },
      {
        "model": "kernel rc2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.4"
      },
      {
        "model": "hat enterprise linux hpc node optional",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "red",
        "version": "6"
      },
      {
        "model": "kernel 2.6.36-rc4",
        "scope": null,
        "trust": 0.3,
        "vendor": "linux",
        "version": null
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.24.3"
      },
      {
        "model": "kernel rc3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.3"
      },
      {
        "model": "kernel 2.6.28-rc6",
        "scope": null,
        "trust": 0.3,
        "vendor": "linux",
        "version": null
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.32.11"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.21.6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.22"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.3113"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.17.8"
      },
      {
        "model": "kernel 2.6.35-rc1",
        "scope": null,
        "trust": 0.3,
        "vendor": "linux",
        "version": null
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.28.10"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.21.7"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.20.15"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.20.2"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.20-2"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.34"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.30"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.26.3"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.28.6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.29.1"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.11.3"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.22.15"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.31"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "3.0"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.25.1"
      },
      {
        "model": "kernel 2.6.36-rc5",
        "scope": null,
        "trust": 0.3,
        "vendor": "linux",
        "version": null
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.30.1"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.38.4"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.25.6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.27.13"
      },
      {
        "model": "kernel rc2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.6"
      },
      {
        "model": "centos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "centos",
        "version": "6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.31"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "3.3.2"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.25.2"
      },
      {
        "model": "kernel rc7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.18"
      },
      {
        "model": "kernel rc2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.7"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.20.14"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.29"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "3.3.4"
      },
      {
        "model": "linux sparc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "10.04"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.18.8"
      },
      {
        "model": "kernel rc2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.3"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.24"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.13.5"
      },
      {
        "model": "kernel rc4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.18"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.4"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.38.6"
      },
      {
        "model": "opensuse factory",
        "scope": null,
        "trust": 0.3,
        "vendor": "suse",
        "version": null
      },
      {
        "model": "hat enterprise linux workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "red",
        "version": "6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.25.7"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.22.17"
      },
      {
        "model": "linux powerpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "10.04"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "3.0.18"
      },
      {
        "model": "linux lts i386",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "12.04"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "3.0.4"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.23.10"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.32.3"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.9"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.39"
      },
      {
        "model": "linux amd64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.28.2"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.214"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.20.8"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.44"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.15"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.32"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.22.14"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.20.1"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.28.1"
      },
      {
        "model": "linux arm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "10.04"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.19.4"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.11.1"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.25.11"
      },
      {
        "model": "kernel rc1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.18"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.27"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.6"
      },
      {
        "model": "linux lts amd64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "12.04"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.22.2"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.7"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.10"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.24.1"
      },
      {
        "model": "kernel rc2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.9"
      },
      {
        "model": "kernel rc4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.17"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.21.2"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.22.1"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.13"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.3"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.21"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.32.22"
      },
      {
        "model": "linux ia-32",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.32.4"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.14.7"
      },
      {
        "model": "linux mips",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.20.13"
      },
      {
        "model": "kernel rc3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.2"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.35.4"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.20.4"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.32"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.33.7"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.26.6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.22.12"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.15.7"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.22.16"
      },
      {
        "model": "kernel rc1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.5"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.32.9"
      },
      {
        "model": "kernel 2.6.36-rc1",
        "scope": null,
        "trust": 0.3,
        "vendor": "linux",
        "version": null
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.31.4"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.32.7"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.11.4"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.25.3"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.25.9"
      },
      {
        "model": "kernel 2.6.35-rc4",
        "scope": null,
        "trust": 0.3,
        "vendor": "linux",
        "version": null
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.32.8"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "3.2.13"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.33"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.23"
      },
      {
        "model": "kernel rc1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.17"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.26"
      },
      {
        "model": "kernel rc1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.4"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.27.54"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.14"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "3.0.5"
      },
      {
        "model": "linux s/390",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.25.5"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.20.5"
      },
      {
        "model": "kernel rc6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.18"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.1"
      },
      {
        "model": "aura experience portal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.0"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.19"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.22.13"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.32.17"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.32.12"
      },
      {
        "model": "kernel rc2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.2"
      },
      {
        "model": "linux powerpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "kernel 2.6.35-rc6",
        "scope": null,
        "trust": 0.3,
        "vendor": "linux",
        "version": null
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.27.51"
      },
      {
        "model": "hat enterprise linux server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "red",
        "version": "6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.51"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.33"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.20"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.0"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.22.8"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.18.5"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.23.09"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.27.49"
      },
      {
        "model": "kernel -rc1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.23"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.31.11"
      },
      {
        "model": "kernel 2.6.28-rc4",
        "scope": null,
        "trust": 0.3,
        "vendor": "linux",
        "version": null
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.315"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.30.5"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.20.9"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.30.4"
      },
      {
        "model": "hat enterprise linux desktop optional",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "red",
        "version": "6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.37.2"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.21.3"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.15"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.24"
      },
      {
        "model": "hat enterprise linux desktop",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "red",
        "version": "6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.20"
      },
      {
        "model": "kernel rc3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.5"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "3.1.8"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.28.3"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.35.5"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.26.4"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.16.46"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.30"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.23.14"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.23.1"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.18-53"
      },
      {
        "model": "kernel rc6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.17"
      },
      {
        "model": "kernel rc3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.17"
      },
      {
        "model": "kernel -rc6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linux",
        "version": "2.6.30"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "65943"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001608"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201403-197"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-0101"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:linux:linux_kernel",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001608"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Nokia Siemens Networks",
    "sources": [
      {
        "db": "BID",
        "id": "65943"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2014-0101",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2014-0101",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 1.1,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 7.1,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2014-0101",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-67594",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2014-0101",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2014-0101",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201403-197",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-67594",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2014-0101",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-67594"
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-0101"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001608"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201403-197"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-0101"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk. The Linux kernel is prone to a denial-of-service vulnerability. \nAn attacker can exploit this issue to crash the affected computer, denying service to legitimate users. The NFSv4 implementation is one of the distributed file system protocols. The vulnerability stems from the fact that the program does not verify the auth_enable and auth_capable fields before calling sctp_sf_authenticate. \n(CVE-2014-0196)\n\nMatthew Daley reported an information leak in the floppy disk driver of the\nLinux kernel. (CVE-2014-1737)\n\nA flaw was discovered in the Linux kernel\u0027s IPC reference counting. \n(CVE-2014-0069)\n\nA flaw was discovered in the handling of network packets when mergeable\nbuffers are disabled for virtual machines in the Linux kernel. (CVE-2014-0077)\n\nA flaw was discovered in the Linux kernel\u0027s handling of the SCTP handshake. (CVE-2014-2309)\n\nAn error was discovered in the Linux kernel\u0027s DCCP protocol support. (CVE-2014-2523)\n\nMax Sydorenko discovered a race condition in the Atheros 9k wireless driver\nin the Linux kernel. (CVE-2014-2672)\n\nAn error was discovered in the Reliable Datagram Sockets (RDS) protocol\nstack in the Linux kernel. \n(CVE-2014-2678)\n\nYaara Rozenblum discovered a race condition in the Linux kernel\u0027s Generic\nIEEE 802.11 Networking Stack (mac80211). (CVE-2014-2706)\n\nA flaw was discovered in the Linux kernel\u0027s ping sockets. \n(CVE-2014-2851)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 12.04 LTS:\n  linux-image-3.2.0-1446-omap4    3.2.0-1446.65\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. Unless you\nmanually uninstalled the standard kernel metapackages (e.g. linux-generic,\nlinux-server, linux-powerpc), a standard system upgrade will automatically\nperform this as well. \n \n The futex_requeue function in kernel/futex.c in the Linux kernel\n through 3.14.5 does not ensure that calls have two different futex\n addresses, which allows local users to gain privileges via a crafted\n FUTEX_REQUEUE command that facilitates unsafe waiter modification\n (CVE-2014-3153). NOTE: the affected code was moved to\n the __skb_get_nlattr and __skb_get_nlattr_nest functions before the\n vulnerability was announced (CVE-2014-3144). NOTE: the affected code was moved to the\n __skb_get_nlattr_nest function before the vulnerability was announced\n (CVE-2014-3145). \n \n The raw_cmd_copyin function in drivers/block/floppy.c in the Linux\n kernel through 3.14.3 does not properly handle error conditions during\n processing of an FDRAWCMD ioctl call, which allows local users to\n trigger kfree operations and gain privileges by leveraging write\n access to a /dev/fd device (CVE-2014-1737). \n \n Buffer overflow in virt/kvm/irq_comm.c in the KVM subsystem in the\n Linux kernel before 3.2.24 allows local users to cause a denial\n of service (crash) and possibly execute arbitrary code via vectors\n related to Message Signaled Interrupts (MSI), irq routing entries,\n and an incorrect check by the setup_routing_entry function before\n invoking the kvm_set_irq function (CVE-2012-2137). \n \n The updated packages provides a solution for these security issues.  The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. The Common\nVulnerabilities and Exposures project identifies the following problems:\n\nCVE-2013-0343\n\n    George Kargiotakis reported an issue in the temporary address handling\n    of the IPv6 privacy extensions. Users on the same LAN can cause a denial\n    of service or obtain access to sensitive information by sending router\n    advertisement messages that cause temporary address generation to be\n    disabled. \n\nCVE-2013-2147\n\n    Dan Carpenter reported issues in the cpqarray driver for Compaq\n    Smart2 Controllers and the cciss driver for HP Smart Array controllers\n    allowing users to gain access to sensitive kernel memory. \n\nCVE-2013-2889\n\n    Kees Cook discovered missing input sanitization in the HID driver for\n    Zeroplus game pads that could lead to a local denial of service. \n\nCVE-2013-2893\n\n    Kees Cook discovered that missing input sanitization in the HID driver\n    for various Logitech force feedback devices could lead to a local denial\n    of service. \n\nCVE-2013-2929\n\n    Vasily Kulikov discovered that a flaw in the get_dumpable() function of\n    the ptrace subsytsem could lead to information disclosure. Only systems\n    with the fs.suid_dumpable sysctl set to a non-default value of \u00272\u0027 are\n    vulnerable. \n\nCVE-2013-4162\n\n    Hannes Frederic Sowa discovered that incorrect handling of IPv6 sockets\n    using the UDP_CORK option could result in denial of service. \n\nCVE-2013-4299\n\n    Fujitsu reported an issue in the device-mapper subsystem. Local users\n    could gain access to sensitive kernel memory. \n\nCVE-2013-4345\n\n    Stephan Mueller found in bug in the ANSI pseudo random number generator\n    which could lead to the use of less entropy than expected. \n\nCVE-2013-4512\n\n    Nico Golde and Fabian Yamaguchi reported an issue in the user mode\n    linux port. A buffer overflow condition exists in the write method\n    for the /proc/exitcode file. Local users with sufficient privileges\n    allowing them to write to this file could gain further elevated\n    privileges. \n\nCVE-2013-4587\n\n    Andrew Honig of Google reported an issue in the KVM virtualization\n    subsystem. A local user could gain elevated privileges by passing\n    a large vcpu_id parameter. \n\nCVE-2013-6367\n\n    Andrew Honig of Google reported an issue in the KVM virtualization\n    subsystem. \n\nCVE-2013-6380\n\n    Mahesh Rajashekhara reported an issue in the aacraid driver for storage\n    products from various vendors. Local users with CAP_SYS_ADMIN privileges\n    could gain further elevated privileges. \n\nCVE-2013-6381\n\n    Nico Golde and Fabian Yamaguchi reported an issue in the Gigabit Ethernet\n    device support for s390 systems. \n\nCVE-2013-6382\n\n    Nico Golde and Fabian Yamaguchi reported an issue in the XFS filesystem. \n    Local users with CAP_SYS_ADMIN privileges could gain further elevated\n    privileges. \n\nCVE-2013-6383\n\n    Dan Carpenter reported an issue in the aacraid driver for storage devices\n    from various vendors. A local user could gain elevated privileges due to\n    a missing privilege level check in the aac_compat_ioctl function. \n\nCVE-2013-7263 CVE-2013-7264 CVE-2013-7265\n\n    mpb reported an information leak in the recvfrom, recvmmsg and recvmsg\n    system calls. \n\nCVE-2013-7339\n\n    Sasha Levin reported an issue in the RDS network protocol over Infiniband. \n    A local user could cause a denial of service condition. \n\nCVE-2014-0101\n\n    Nokia Siemens Networks reported an issue in the SCTP network protocol\n    subsystem. Remote users could cause a denial of service (NULL pointer\n    dereference). \n\nCVE-2014-1444\n\n    Salva Peiro reported an issue in the FarSync WAN driver. Local users\n    with the CAP_NET_ADMIN capability could gain access to sensitive kernel\n    memory. \n\nCVE-2014-1445\n\n    Salva Peiro reported an issue in the wanXL serial card driver. Local\n    users could gain access to sensitive kernel memory. \n\nCVE-2014-1446\n\n    Salva Peiro reported an issue in the YAM radio modem driver. Local users\n    with the CAP_NET_ADMIN capability could gain access to sensitive kernel\n    memory. \n\nCVE-2014-1874\n\n    Matthew Thode reported an issue in the SELinux subsystem. \n    \nCVE-2014-2039\n\n    Martin Schwidefsky reported an issue on s390 systems. A local user\n    could cause a denial of service (kernel oops) by executing an application\n    with a linkage stack instruction. \n\nCVE-2014-2523\n\n    Daniel Borkmann provided a fix for an issue in the nf_conntrack_dccp\n    module. \n\nFor the oldstable distribution (squeeze), this problem has been fixed in\nversion 2.6.32-48squeeze5. \n\nThe following matrix lists additional source packages that were rebuilt for\ncompatibility with or to take advantage of this update:\n\n                                             Debian 6.0 (squeeze)\n     user-mode-linux                         2.6.32-1um-4+48squeeze5\n\nWe recommend that you upgrade your linux-2.6 and user-mode-linux packages. \nHowever, given the high frequency at which low-severity security\nissues are discovered in the kernel and the resource requirements of\ndoing an update, updates for lower priority issues will normally not\nbe released for all kernels at the same time. Rather, they will be\nreleased in a staggered or \"leap-frog\" fashion. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Important: kernel security and bug fix update\nAdvisory ID:       RHSA-2014:0328-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://rhn.redhat.com/errata/RHSA-2014-0328.html\nIssue date:        2014-03-25\nCVE Names:         CVE-2013-1860 CVE-2014-0055 CVE-2014-0069 \n                   CVE-2014-0101 \n=====================================================================\n\n1. Summary:\n\nUpdated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 6. \n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. \n\n* A flaw was found in the way the get_rx_bufs() function in the vhost_net\nimplementation in the Linux kernel handled error conditions reported by the\nvhost_get_vq_desc() function. A privileged guest user could use this flaw\nto crash the host. (CVE-2014-0055, Important)\n\n* A flaw was found in the way the Linux kernel processed an authenticated\nCOOKIE_ECHO chunk during the initialization of an SCTP connection. (CVE-2014-0101, Important)\n\n* A flaw was found in the way the Linux kernel\u0027s CIFS implementation\nhandled uncached write operations with specially crafted iovec structures. \nAn unprivileged local user with access to a CIFS share could use this flaw\nto crash the system, leak kernel memory, or, potentially, escalate their\nprivileges on the system. Note: the default cache settings for CIFS mounts\non Red Hat Enterprise Linux 6 prohibit a successful exploitation of this\nissue. (CVE-2014-0069, Moderate)\n\n* A heap-based buffer overflow flaw was found in the Linux kernel\u0027s cdc-wdm\ndriver, used for USB CDC WCM device management. An attacker with physical\naccess to a system could use this flaw to cause a denial of service or,\npotentially, escalate their privileges. (CVE-2013-1860, Low)\n\nRed Hat would like to thank Nokia Siemens Networks for reporting\nCVE-2014-0101, and Al Viro for reporting CVE-2014-0069. \n\nThis update also fixes several bugs. Documentation for these changes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section. \n\nAll kernel users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. The system must be\nrebooted for this update to take effect. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not use\n\"rpm -Uvh\" as that will remove the running kernel binaries from your\nsystem. You may use \"rpm -e\" to remove old kernels after determining that\nthe new kernel functions properly on your system. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n921970 - CVE-2013-1860 kernel: usb: cdc-wdm buffer overflow triggered by device\n1062577 - CVE-2014-0055 kernel: vhost-net: insufficient handling of error conditions in get_rx_bufs()\n1064253 - CVE-2014-0069 kernel: cifs: incorrect handling of bogus user pointers during uncached writes\n1070705 - CVE-2014-0101 kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/kernel-2.6.32-431.11.2.el6.src.rpm\n\ni386:\nkernel-2.6.32-431.11.2.el6.i686.rpm\nkernel-debug-2.6.32-431.11.2.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-431.11.2.el6.i686.rpm\nkernel-debug-devel-2.6.32-431.11.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-431.11.2.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-431.11.2.el6.i686.rpm\nkernel-devel-2.6.32-431.11.2.el6.i686.rpm\nkernel-headers-2.6.32-431.11.2.el6.i686.rpm\nperf-2.6.32-431.11.2.el6.i686.rpm\nperf-debuginfo-2.6.32-431.11.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-431.11.2.el6.i686.rpm\n\nnoarch:\nkernel-abi-whitelists-2.6.32-431.11.2.el6.noarch.rpm\nkernel-doc-2.6.32-431.11.2.el6.noarch.rpm\nkernel-firmware-2.6.32-431.11.2.el6.noarch.rpm\n\nx86_64:\nkernel-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debug-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debug-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debug-devel-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-devel-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-headers-2.6.32-431.11.2.el6.x86_64.rpm\nperf-2.6.32-431.11.2.el6.x86_64.rpm\nperf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/kernel-2.6.32-431.11.2.el6.src.rpm\n\ni386:\nkernel-debug-debuginfo-2.6.32-431.11.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-431.11.2.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-431.11.2.el6.i686.rpm\nperf-debuginfo-2.6.32-431.11.2.el6.i686.rpm\npython-perf-2.6.32-431.11.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-431.11.2.el6.i686.rpm\n\nx86_64:\nkernel-debug-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-431.11.2.el6.x86_64.rpm\nperf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\npython-perf-2.6.32-431.11.2.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/kernel-2.6.32-431.11.2.el6.src.rpm\n\nnoarch:\nkernel-abi-whitelists-2.6.32-431.11.2.el6.noarch.rpm\nkernel-doc-2.6.32-431.11.2.el6.noarch.rpm\nkernel-firmware-2.6.32-431.11.2.el6.noarch.rpm\n\nx86_64:\nkernel-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debug-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debug-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debug-devel-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-devel-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-headers-2.6.32-431.11.2.el6.x86_64.rpm\nperf-2.6.32-431.11.2.el6.x86_64.rpm\nperf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/kernel-2.6.32-431.11.2.el6.src.rpm\n\nx86_64:\nkernel-debug-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-431.11.2.el6.x86_64.rpm\nperf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\npython-perf-2.6.32-431.11.2.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/kernel-2.6.32-431.11.2.el6.src.rpm\n\ni386:\nkernel-2.6.32-431.11.2.el6.i686.rpm\nkernel-debug-2.6.32-431.11.2.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-431.11.2.el6.i686.rpm\nkernel-debug-devel-2.6.32-431.11.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-431.11.2.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-431.11.2.el6.i686.rpm\nkernel-devel-2.6.32-431.11.2.el6.i686.rpm\nkernel-headers-2.6.32-431.11.2.el6.i686.rpm\nperf-2.6.32-431.11.2.el6.i686.rpm\nperf-debuginfo-2.6.32-431.11.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-431.11.2.el6.i686.rpm\n\nnoarch:\nkernel-abi-whitelists-2.6.32-431.11.2.el6.noarch.rpm\nkernel-doc-2.6.32-431.11.2.el6.noarch.rpm\nkernel-firmware-2.6.32-431.11.2.el6.noarch.rpm\n\nppc64:\nkernel-2.6.32-431.11.2.el6.ppc64.rpm\nkernel-bootwrapper-2.6.32-431.11.2.el6.ppc64.rpm\nkernel-debug-2.6.32-431.11.2.el6.ppc64.rpm\nkernel-debug-debuginfo-2.6.32-431.11.2.el6.ppc64.rpm\nkernel-debug-devel-2.6.32-431.11.2.el6.ppc64.rpm\nkernel-debuginfo-2.6.32-431.11.2.el6.ppc64.rpm\nkernel-debuginfo-common-ppc64-2.6.32-431.11.2.el6.ppc64.rpm\nkernel-devel-2.6.32-431.11.2.el6.ppc64.rpm\nkernel-headers-2.6.32-431.11.2.el6.ppc64.rpm\nperf-2.6.32-431.11.2.el6.ppc64.rpm\nperf-debuginfo-2.6.32-431.11.2.el6.ppc64.rpm\npython-perf-debuginfo-2.6.32-431.11.2.el6.ppc64.rpm\n\ns390x:\nkernel-2.6.32-431.11.2.el6.s390x.rpm\nkernel-debug-2.6.32-431.11.2.el6.s390x.rpm\nkernel-debug-debuginfo-2.6.32-431.11.2.el6.s390x.rpm\nkernel-debug-devel-2.6.32-431.11.2.el6.s390x.rpm\nkernel-debuginfo-2.6.32-431.11.2.el6.s390x.rpm\nkernel-debuginfo-common-s390x-2.6.32-431.11.2.el6.s390x.rpm\nkernel-devel-2.6.32-431.11.2.el6.s390x.rpm\nkernel-headers-2.6.32-431.11.2.el6.s390x.rpm\nkernel-kdump-2.6.32-431.11.2.el6.s390x.rpm\nkernel-kdump-debuginfo-2.6.32-431.11.2.el6.s390x.rpm\nkernel-kdump-devel-2.6.32-431.11.2.el6.s390x.rpm\nperf-2.6.32-431.11.2.el6.s390x.rpm\nperf-debuginfo-2.6.32-431.11.2.el6.s390x.rpm\npython-perf-debuginfo-2.6.32-431.11.2.el6.s390x.rpm\n\nx86_64:\nkernel-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debug-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debug-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debug-devel-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-devel-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-headers-2.6.32-431.11.2.el6.x86_64.rpm\nperf-2.6.32-431.11.2.el6.x86_64.rpm\nperf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/kernel-2.6.32-431.11.2.el6.src.rpm\n\ni386:\nkernel-debug-debuginfo-2.6.32-431.11.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-431.11.2.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-431.11.2.el6.i686.rpm\nperf-debuginfo-2.6.32-431.11.2.el6.i686.rpm\npython-perf-2.6.32-431.11.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-431.11.2.el6.i686.rpm\n\nppc64:\nkernel-debug-debuginfo-2.6.32-431.11.2.el6.ppc64.rpm\nkernel-debuginfo-2.6.32-431.11.2.el6.ppc64.rpm\nkernel-debuginfo-common-ppc64-2.6.32-431.11.2.el6.ppc64.rpm\nperf-debuginfo-2.6.32-431.11.2.el6.ppc64.rpm\npython-perf-2.6.32-431.11.2.el6.ppc64.rpm\npython-perf-debuginfo-2.6.32-431.11.2.el6.ppc64.rpm\n\ns390x:\nkernel-debug-debuginfo-2.6.32-431.11.2.el6.s390x.rpm\nkernel-debuginfo-2.6.32-431.11.2.el6.s390x.rpm\nkernel-debuginfo-common-s390x-2.6.32-431.11.2.el6.s390x.rpm\nkernel-kdump-debuginfo-2.6.32-431.11.2.el6.s390x.rpm\nperf-debuginfo-2.6.32-431.11.2.el6.s390x.rpm\npython-perf-2.6.32-431.11.2.el6.s390x.rpm\npython-perf-debuginfo-2.6.32-431.11.2.el6.s390x.rpm\n\nx86_64:\nkernel-debug-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-431.11.2.el6.x86_64.rpm\nperf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\npython-perf-2.6.32-431.11.2.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/kernel-2.6.32-431.11.2.el6.src.rpm\n\ni386:\nkernel-2.6.32-431.11.2.el6.i686.rpm\nkernel-debug-2.6.32-431.11.2.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-431.11.2.el6.i686.rpm\nkernel-debug-devel-2.6.32-431.11.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-431.11.2.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-431.11.2.el6.i686.rpm\nkernel-devel-2.6.32-431.11.2.el6.i686.rpm\nkernel-headers-2.6.32-431.11.2.el6.i686.rpm\nperf-2.6.32-431.11.2.el6.i686.rpm\nperf-debuginfo-2.6.32-431.11.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-431.11.2.el6.i686.rpm\n\nnoarch:\nkernel-abi-whitelists-2.6.32-431.11.2.el6.noarch.rpm\nkernel-doc-2.6.32-431.11.2.el6.noarch.rpm\nkernel-firmware-2.6.32-431.11.2.el6.noarch.rpm\n\nx86_64:\nkernel-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debug-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debug-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debug-devel-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-devel-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-headers-2.6.32-431.11.2.el6.x86_64.rpm\nperf-2.6.32-431.11.2.el6.x86_64.rpm\nperf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/kernel-2.6.32-431.11.2.el6.src.rpm\n\ni386:\nkernel-debug-debuginfo-2.6.32-431.11.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-431.11.2.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-431.11.2.el6.i686.rpm\nperf-debuginfo-2.6.32-431.11.2.el6.i686.rpm\npython-perf-2.6.32-431.11.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-431.11.2.el6.i686.rpm\n\nx86_64:\nkernel-debug-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-431.11.2.el6.x86_64.rpm\nperf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\npython-perf-2.6.32-431.11.2.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-431.11.2.el6.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2013-1860.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0055.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0069.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0101.html\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.5_Technical_Notes/kernel.html\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e.  More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2014 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFTMZPXXlSAg2UNWIIRAs3jAKCY1B4c1Gm3xuwrXDDvHlYLoVu3WQCfRaVc\nZY3S4jlAmQF9n5M8ByIyFkY=\n=OVFT\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-0101"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001608"
      },
      {
        "db": "BID",
        "id": "65943"
      },
      {
        "db": "VULHUB",
        "id": "VHN-67594"
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-0101"
      },
      {
        "db": "PACKETSTORM",
        "id": "126800"
      },
      {
        "db": "PACKETSTORM",
        "id": "126793"
      },
      {
        "db": "PACKETSTORM",
        "id": "126295"
      },
      {
        "db": "PACKETSTORM",
        "id": "127099"
      },
      {
        "db": "PACKETSTORM",
        "id": "126321"
      },
      {
        "db": "PACKETSTORM",
        "id": "126346"
      },
      {
        "db": "PACKETSTORM",
        "id": "125860"
      }
    ],
    "trust": 2.7
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-67594",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-67594"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-0101",
        "trust": 3.6
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2014/03/04/6",
        "trust": 2.6
      },
      {
        "db": "BID",
        "id": "65943",
        "trust": 2.1
      },
      {
        "db": "SECUNIA",
        "id": "59216",
        "trust": 1.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001608",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201403-197",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "126295",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "126346",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "126255",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "126343",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "126729",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-67594",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-0101",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "126800",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "126793",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "127099",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "126321",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "125860",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-67594"
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-0101"
      },
      {
        "db": "BID",
        "id": "65943"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001608"
      },
      {
        "db": "PACKETSTORM",
        "id": "126800"
      },
      {
        "db": "PACKETSTORM",
        "id": "126793"
      },
      {
        "db": "PACKETSTORM",
        "id": "126295"
      },
      {
        "db": "PACKETSTORM",
        "id": "127099"
      },
      {
        "db": "PACKETSTORM",
        "id": "126321"
      },
      {
        "db": "PACKETSTORM",
        "id": "126346"
      },
      {
        "db": "PACKETSTORM",
        "id": "125860"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201403-197"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-0101"
      }
    ]
  },
  "id": "VAR-201403-0508",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-67594"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-09-19T22:37:33.076000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "net: sctp: fix sctp_sf_do_5_1D_ce to verify if we/peer is AUTH capable",
        "trust": 0.8,
        "url": "https://github.com/torvalds/linux/commit/ec0223ec48a90cb605244b45f7c62de856403729"
      },
      {
        "title": "Linux Kernel Archives",
        "trust": 0.8,
        "url": "http://www.kernel.org"
      },
      {
        "title": "net: sctp: fix sctp_sf_do_5_1D_ce to verify if we/peer is AUTH capable",
        "trust": 0.8,
        "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ec0223ec48a90cb605244b45f7c62de856403729"
      },
      {
        "title": "Bug 1070705",
        "trust": 0.8,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1070705"
      },
      {
        "title": "RHSA-2014:0328",
        "trust": 0.8,
        "url": "http://rhn.redhat.com/errata/RHSA-2014-0328.html"
      },
      {
        "title": "fba54a407bb2b7c2aae62ac2d03df806bc1a794a",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=48590"
      },
      {
        "title": "11dac21e658690cdf01d7eb41c7e653d142ad9d4",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=48589"
      },
      {
        "title": "Ubuntu Security Notice: linux vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2173-1"
      },
      {
        "title": "Ubuntu Security Notice: linux-ec2 vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2174-1"
      },
      {
        "title": "Amazon Linux AMI: ALAS-2014-317",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2014-317"
      },
      {
        "title": "Red Hat: CVE-2014-0101",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2014-0101"
      },
      {
        "title": "Ubuntu Security Notice: linux-lts-quantal vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2223-1"
      },
      {
        "title": "Ubuntu Security Notice: linux vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2228-1"
      },
      {
        "title": "Ubuntu Security Notice: linux vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2221-1"
      },
      {
        "title": "Ubuntu Security Notice: linux-lts-raring vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2224-1"
      },
      {
        "title": "Ubuntu Security Notice: linux-ti-omap4 vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2227-1"
      },
      {
        "title": "Ubuntu Security Notice: linux-lts-saucy vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2225-1"
      },
      {
        "title": "DRA_writeup",
        "trust": 0.1,
        "url": "https://github.com/KPN-CISO/DRA_writeup "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2014-0101"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001608"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201403-197"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-476",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-20",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-67594"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001608"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-0101"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "http://www.openwall.com/lists/oss-security/2014/03/04/6"
      },
      {
        "trust": 2.1,
        "url": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15317.html"
      },
      {
        "trust": 2.1,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1070705"
      },
      {
        "trust": 1.9,
        "url": "http://rhn.redhat.com/errata/rhsa-2014-0328.html"
      },
      {
        "trust": 1.9,
        "url": "http://rhn.redhat.com/errata/rhsa-2014-0432.html"
      },
      {
        "trust": 1.9,
        "url": "http://www.ubuntu.com/usn/usn-2174-1"
      },
      {
        "trust": 1.8,
        "url": "http://secunia.com/advisories/59216"
      },
      {
        "trust": 1.8,
        "url": "http://www.securityfocus.com/bid/65943"
      },
      {
        "trust": 1.8,
        "url": "http://rhn.redhat.com/errata/rhsa-2014-0419.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.ubuntu.com/usn/usn-2173-1"
      },
      {
        "trust": 1.8,
        "url": "https://github.com/torvalds/linux/commit/ec0223ec48a90cb605244b45f7c62de856403729"
      },
      {
        "trust": 1.7,
        "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=ec0223ec48a90cb605244b45f7c62de856403729"
      },
      {
        "trust": 0.9,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0101"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0101"
      },
      {
        "trust": 0.7,
        "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ec0223ec48a90cb605244b45f7c62de856403729"
      },
      {
        "trust": 0.7,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0101"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/errata/rhsa-2014:0419"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/cve/cve-2014-0101"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/errata/rhsa-2014:0432"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/errata/rhsa-2014:0520"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/errata/rhsa-2014:0328"
      },
      {
        "trust": 0.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2523"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0069"
      },
      {
        "trust": 0.3,
        "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bbd0d59809f9"
      },
      {
        "trust": 0.3,
        "url": "http://www.kernel.org/"
      },
      {
        "trust": 0.3,
        "url": "http://patchwork.ozlabs.org/patch/325898/"
      },
      {
        "trust": 0.3,
        "url": "https://downloads.avaya.com/css/p8/documents/100180030"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2706"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2851"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1738"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2309"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2678"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2672"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1737"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0077"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4483"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0196"
      },
      {
        "trust": 0.2,
        "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/team/key/#package"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/site/articles/11258"
      },
      {
        "trust": 0.2,
        "url": "https://www.redhat.com/security/data/cve/cve-2014-0101.html"
      },
      {
        "trust": 0.2,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2039"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1874"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/476.html"
      },
      {
        "trust": 0.1,
        "url": "https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-alas-2014-317"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/2173-1/"
      },
      {
        "trust": 0.1,
        "url": "https://www.rapid7.com/db/vulnerabilities/linuxrpm-rhsa-2014-0432"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-ti-omap4/3.2.0-1446.65"
      },
      {
        "trust": 0.1,
        "url": "http://www.ubuntu.com/usn/usn-2227-1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux/3.2.0-63.95"
      },
      {
        "trust": 0.1,
        "url": "http://www.ubuntu.com/usn/usn-2221-1"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/site/documentation/en-us/red_hat_enterprise_linux/6/html/6.4_technical_notes/kernel.html"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2523"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0196"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0077"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2137"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2706"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2137"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3144"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2309"
      },
      {
        "trust": 0.1,
        "url": "http://www.mandriva.com/en/support/security/"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2678"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3144"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3153"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3153"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2039"
      },
      {
        "trust": 0.1,
        "url": "http://www.mandriva.com/en/support/security/advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2672"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3917"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1738"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2897"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2851"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3917"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3145"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3145"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2897"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1874"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0069"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1737"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0343"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4512"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-6367"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2103-2929"
      },
      {
        "trust": 0.1,
        "url": "http://www.debian.org/security/faq"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1444"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1445"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2889"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1446"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-7264"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-6381"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4345"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2893"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-7263"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-6382"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4299"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-6380"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-7265"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2147"
      },
      {
        "trust": 0.1,
        "url": "http://www.debian.org/security/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4162"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-6383"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4587"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-7339"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-ec2/2.6.32-363.76"
      },
      {
        "trust": 0.1,
        "url": "https://www.redhat.com/security/data/cve/cve-2014-0069.html"
      },
      {
        "trust": 0.1,
        "url": "https://www.redhat.com/security/data/cve/cve-2014-0055.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1860"
      },
      {
        "trust": 0.1,
        "url": "https://www.redhat.com/security/data/cve/cve-2013-1860.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0055"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/site/documentation/en-us/red_hat_enterprise_linux/6/html/6.5_technical_notes/kernel.html"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-67594"
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-0101"
      },
      {
        "db": "BID",
        "id": "65943"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001608"
      },
      {
        "db": "PACKETSTORM",
        "id": "126800"
      },
      {
        "db": "PACKETSTORM",
        "id": "126793"
      },
      {
        "db": "PACKETSTORM",
        "id": "126295"
      },
      {
        "db": "PACKETSTORM",
        "id": "127099"
      },
      {
        "db": "PACKETSTORM",
        "id": "126321"
      },
      {
        "db": "PACKETSTORM",
        "id": "126346"
      },
      {
        "db": "PACKETSTORM",
        "id": "125860"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201403-197"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-0101"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-67594"
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-0101"
      },
      {
        "db": "BID",
        "id": "65943"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001608"
      },
      {
        "db": "PACKETSTORM",
        "id": "126800"
      },
      {
        "db": "PACKETSTORM",
        "id": "126793"
      },
      {
        "db": "PACKETSTORM",
        "id": "126295"
      },
      {
        "db": "PACKETSTORM",
        "id": "127099"
      },
      {
        "db": "PACKETSTORM",
        "id": "126321"
      },
      {
        "db": "PACKETSTORM",
        "id": "126346"
      },
      {
        "db": "PACKETSTORM",
        "id": "125860"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201403-197"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-0101"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-03-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-67594"
      },
      {
        "date": "2014-03-11T00:00:00",
        "db": "VULMON",
        "id": "CVE-2014-0101"
      },
      {
        "date": "2014-02-27T00:00:00",
        "db": "BID",
        "id": "65943"
      },
      {
        "date": "2014-03-12T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-001608"
      },
      {
        "date": "2014-05-27T16:02:18",
        "db": "PACKETSTORM",
        "id": "126800"
      },
      {
        "date": "2014-05-27T16:00:19",
        "db": "PACKETSTORM",
        "id": "126793"
      },
      {
        "date": "2014-04-24T22:17:52",
        "db": "PACKETSTORM",
        "id": "126295"
      },
      {
        "date": "2014-06-15T17:22:00",
        "db": "PACKETSTORM",
        "id": "127099"
      },
      {
        "date": "2014-04-25T17:49:50",
        "db": "PACKETSTORM",
        "id": "126321"
      },
      {
        "date": "2014-04-26T18:57:45",
        "db": "PACKETSTORM",
        "id": "126346"
      },
      {
        "date": "2014-03-25T18:47:49",
        "db": "PACKETSTORM",
        "id": "125860"
      },
      {
        "date": "2014-03-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201403-197"
      },
      {
        "date": "2014-03-11T13:01:06.733000",
        "db": "NVD",
        "id": "CVE-2014-0101"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2023-02-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-67594"
      },
      {
        "date": "2020-08-25T00:00:00",
        "db": "VULMON",
        "id": "CVE-2014-0101"
      },
      {
        "date": "2015-04-13T20:26:00",
        "db": "BID",
        "id": "65943"
      },
      {
        "date": "2014-04-08T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-001608"
      },
      {
        "date": "2023-04-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201403-197"
      },
      {
        "date": "2023-02-13T00:32:28.940000",
        "db": "NVD",
        "id": "CVE-2014-0101"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "126295"
      },
      {
        "db": "PACKETSTORM",
        "id": "126346"
      },
      {
        "db": "PACKETSTORM",
        "id": "125860"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201403-197"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Linux Kernel of  net/sctp/sm_statefuns.c Inside  sctp_sf_do_5_1D_ce Service disruption in functions  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001608"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "code problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201403-197"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.