U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2009-2692

Change History

Modified Analysis by NIST 2/08/2024 6:50:03 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:4.8:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:suse:linux_enterprise_real_time:10:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:linux:kernel:2.6.24.7:*:*:*:*:*:*:*
     *cpe:2.3:a:linux:kernel:2.6.25.15:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.18:*:pre-1:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.18:*:pre-2:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.18:*:pre-3:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.18:*:pre-4:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.18:*:pre-5:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.18:*:pre-6:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.18:*:pre-7:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.18:*:pre-8:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.19:*:-pre1:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.19:*:-pre2:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.19:*:-pre3:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.19:*:-pre4:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.19:*:-pre5:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.19:*:-pre6:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.21:*:-pre1:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.21:*:-pre4:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.21:*:-pre7:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.23:*:-ow2:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.23:*:-pre9:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.24:*:-ow1:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.27:*:-pre1:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.27:*:-pre2:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.27:*:-pre3:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.27:*:-pre4:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.27:*:-pre5:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.29:-rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.29:-rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.31:-pre1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.32:-pre1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.32:-pre2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.33:p-re1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.33.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.33.7:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.34:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.35.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.36.7:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.36.8:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.37:-rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.37.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.30:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.30:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.30:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.30:rc5:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.30:rc6:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.30:rc7-git6:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.30.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.30.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.30.4:*:*:*:*:*:*:*
OR
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 2.4.4 up to (excluding) 2.4.37.5
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 2.6.0 up to (excluding) 2.6.30.5
Added CVSS V3.1

								
							
							
						
NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
NIST CWE-908
Removed CWE
NIST CWE-119

								
						
Changed Reference Type
http://archives.neohapsis.com/archives/fulldisclosure/2009-08/0174.html Exploit
http://archives.neohapsis.com/archives/fulldisclosure/2009-08/0174.html Broken Link, Exploit
Changed Reference Type
http://blog.cr0.org/2009/08/linux-null-pointer-dereference-due-to.html No Types Assigned
http://blog.cr0.org/2009/08/linux-null-pointer-dereference-due-to.html Exploit, Issue Tracking
Changed Reference Type
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.37.y.git%3Ba=commit%3Bh=c18d0fe535a73b219f960d1af3d0c264555a12e3 No Types Assigned
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.37.y.git%3Ba=commit%3Bh=c18d0fe535a73b219f960d1af3d0c264555a12e3 Broken Link
Changed Reference Type
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e694958388c50148389b0e9b9e9e8945cf0f1b98 No Types Assigned
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e694958388c50148389b0e9b9e9e8945cf0f1b98 Broken Link
Changed Reference Type
http://grsecurity.net/~spender/wunderbar_emporium.tgz No Types Assigned
http://grsecurity.net/~spender/wunderbar_emporium.tgz Broken Link
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html Mailing List
Changed Reference Type
http://rhn.redhat.com/errata/RHSA-2009-1222.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2009-1222.html Third Party Advisory
Changed Reference Type
http://rhn.redhat.com/errata/RHSA-2009-1223.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2009-1223.html Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/36278 Vendor Advisory
http://secunia.com/advisories/36278 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/36289 Vendor Advisory
http://secunia.com/advisories/36289 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/36327 Vendor Advisory
http://secunia.com/advisories/36327 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/36430 Vendor Advisory
http://secunia.com/advisories/36430 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/37298 Vendor Advisory
http://secunia.com/advisories/37298 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/37471 Vendor Advisory
http://secunia.com/advisories/37471 Broken Link, Vendor Advisory
Changed Reference Type
http://support.avaya.com/css/P8/documents/100067254 No Types Assigned
http://support.avaya.com/css/P8/documents/100067254 Third Party Advisory
Changed Reference Type
http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0121 No Types Assigned
http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0121 Broken Link
Changed Reference Type
http://www.debian.org/security/2009/dsa-1865 No Types Assigned
http://www.debian.org/security/2009/dsa-1865 Mailing List, Third Party Advisory
Changed Reference Type
http://www.exploit-db.com/exploits/19933 No Types Assigned
http://www.exploit-db.com/exploits/19933 Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.exploit-db.com/exploits/9477 No Types Assigned
http://www.exploit-db.com/exploits/9477 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.37.5 Vendor Advisory
http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.37.5 Broken Link, Vendor Advisory
Changed Reference Type
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.5 Vendor Advisory
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.5 Broken Link, Vendor Advisory
Changed Reference Type
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.31-rc6 Vendor Advisory
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.31-rc6 Broken Link, Vendor Advisory
Changed Reference Type
http://www.mandriva.com/security/advisories?name=MDVSA-2009:233 No Types Assigned
http://www.mandriva.com/security/advisories?name=MDVSA-2009:233 Broken Link
Changed Reference Type
http://www.openwall.com/lists/oss-security/2009/08/14/1 No Types Assigned
http://www.openwall.com/lists/oss-security/2009/08/14/1 Mailing List, Patch
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2009-1233.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2009-1233.html Broken Link
Changed Reference Type
http://www.securityfocus.com/archive/1/505751/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/505751/100/0/threaded Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/archive/1/505912/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/505912/100/0/threaded Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/archive/1/507985/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/507985/100/0/threaded Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/archive/1/512019/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/512019/100/0/threaded Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/36038 Exploit
http://www.securityfocus.com/bid/36038 Broken Link, Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.vmware.com/security/advisories/VMSA-2009-0016.html No Types Assigned
http://www.vmware.com/security/advisories/VMSA-2009-0016.html Third Party Advisory
Changed Reference Type
http://www.vupen.com/english/advisories/2009/2272 Patch, Vendor Advisory
http://www.vupen.com/english/advisories/2009/2272 Broken Link, Patch, Vendor Advisory
Changed Reference Type
http://www.vupen.com/english/advisories/2009/3316 Vendor Advisory
http://www.vupen.com/english/advisories/2009/3316 Broken Link, Vendor Advisory
Changed Reference Type
http://zenthought.org/content/file/android-root-2009-08-16-source No Types Assigned
http://zenthought.org/content/file/android-root-2009-08-16-source Broken Link
Changed Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=516949 No Types Assigned
https://bugzilla.redhat.com/show_bug.cgi?id=516949 Issue Tracking, Patch
Changed Reference Type
https://issues.rpath.com/browse/RPL-3103 No Types Assigned
https://issues.rpath.com/browse/RPL-3103 Broken Link
Changed Reference Type
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11526 No Types Assigned
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11526 Broken Link
Changed Reference Type
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11591 No Types Assigned
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11591 Broken Link
Changed Reference Type
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8657 No Types Assigned
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8657 Broken Link