Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.122298
Kategorie:Oracle Linux Local Security Checks
Titel:Oracle: Security Advisory (ELSA-2010-0839)
Zusammenfassung:The remote host is missing an update for the 'kernel, ocfs2-2.6.18-194.26.1.0.1.el5, oracleasm-2.6.18-194.26.1.0.1.el5' package(s) announced via the ELSA-2010-0839 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'kernel, ocfs2-2.6.18-194.26.1.0.1.el5, oracleasm-2.6.18-194.26.1.0.1.el5' package(s) announced via the ELSA-2010-0839 advisory.

Vulnerability Insight:
[2.6.18-194.26.1.0.1.el5]
- [xen] check to see if hypervisor supports memory reservation change
(Chuck Anderson) [orabug 7556514]
- Add entropy support to igb (John Sobecki) [orabug 7607479]
- [nfs] convert ENETUNREACH to ENOTCONN [orabug 7689332]
- [NET] Add xen pv/bonding netconsole support (Tina Yang) [orabug 6993043]
[bz 7258]
- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]
- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]
- [nfsd] fix failure of file creation from hpux client (Wen gang Wang)
[orabug 7579314]
- [qla] fix qla not to query hccr (Guru Anbalagane) [Orabug 8746702]
- [net] bonding: fix xen+bonding+netconsole panic issue (Joe Jin)
[orabug 9504524]
- [rds] Patch rds to 1.4.2-14 (Andy Grover) [orabug 9471572, 9344105]
RDS: Fix BUG_ONs to not fire when in a tasklet
ipoib: Fix lockup of the tx queue
RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)
RDS: Properly unmap when getting a remote access error (Tina Yang)
RDS: Fix locking in rds_send_drop_to()
- [mm] Enhance shrink_zone patch allow full swap utilization, and also be
NUMA-aware (John Sobecki, Chris Mason, Herbert van den Bergh)
[orabug 9245919]
- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)
[orabug 9107465]
- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)
[orabug 9764220]
- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]
- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,
Guru Anbalagane) [orabug 6124033]
- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]
- [ib] fix memory corruption (Andy Grover) [orabug 9972346]

[2.6.18-194.26.1.el5]
- [net] mlx4: bump max log_mtts_per_seg memory reservation (Jay Fenlason) [643806 636198]

[2.6.18-194.25.1.el5]
- [fs] nfs: fix regression in NFS Direct I/O path (Steve Dickson) [647601 647297]

[2.6.18-194.24.1.el5]
- Changelog fix

[2.6.18-194.23.1.el5]
- [net] bonding: correctly process non-linear skbs (Andy Gospodarek) [644822 619070]
- Syncing following patch from branched build:
- [net] rds: fix local privilege escalation (Eugene Teo) [642897 642898] {CVE-2010-3904}

[2.6.18-194.22.1.el5]
- [fs] xfs: fix speculative allocation beyond eof (Dave Chinner) [643571 638753]

[2.6.18-194.21.1.el5]
- [scsi] qla2xxx: Correct use-after-free issue in terminate_rport_io callback
(Chad Dupuis) [643135 567428]
- [misc] futex: replace LOCK_PREFIX in futex.h (Peter Zijlstra) [633175 633176]
{CVE-2010-3086}
- [v4l] remove compat code for VIDIOCSMICROCODE (Mauro Carvalho Chehab) [642470
642471] {CVE-2010-2963}
- [xen] hvm: correct accuracy of pmtimer (Andrew Jones) [641915 633028]
- [net] bonding: fix IGMP report on slave during failover (Flavio Leitner) [640973
637764]
- [fs] nfsv4: fix bug when server returns NFS4ERR_RESOURCE (Steve Dickson) [628889
620502]
- [fs] nfsv4: ensure lockowners are labelled ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'kernel, ocfs2-2.6.18-194.26.1.0.1.el5, oracleasm-2.6.18-194.26.1.0.1.el5' package(s) on Oracle Linux 5.

Solution:
Please install the updated package(s).

CVSS Score:
4.9

CVSS Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2010-3066
1024708
http://securitytracker.com/id?1024708
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
http://www.securityfocus.com/archive/1/520102/100/0/threaded
46397
http://secunia.com/advisories/46397
RHSA-2010:0839
http://www.redhat.com/support/errata/RHSA-2010-0839.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87e2831c3fa39cbf6f7ab676bb5aef039b9659e2
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23
http://www.vmware.com/security/advisories/VMSA-2011-0012.html
https://bugzilla.redhat.com/show_bug.cgi?id=631716
Common Vulnerability Exposure (CVE) ID: CVE-2010-3067
42778
http://secunia.com/advisories/42778
42801
http://secunia.com/advisories/42801
42890
http://secunia.com/advisories/42890
43291
http://secunia.com/advisories/43291
ADV-2011-0012
http://www.vupen.com/english/advisories/2011/0012
ADV-2011-0298
http://www.vupen.com/english/advisories/2011/0298
ADV-2011-0375
http://www.vupen.com/english/advisories/2011/0375
DSA-2126
http://www.debian.org/security/2010/dsa-2126
MDVSA-2010:257
http://www.mandriva.com/security/advisories?name=MDVSA-2010:257
MDVSA-2011:029
http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
MDVSA-2011:051
http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
RHSA-2010:0758
http://www.redhat.com/support/errata/RHSA-2010-0758.html
RHSA-2010:0779
http://www.redhat.com/support/errata/RHSA-2010-0779.html
RHSA-2011:0007
http://www.redhat.com/support/errata/RHSA-2011-0007.html
SUSE-SA:2010:060
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
SUSE-SA:2011:001
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
SUSE-SA:2011:002
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
SUSE-SA:2011:007
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
SUSE-SA:2011:008
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
USN-1000-1
http://www.ubuntu.com/usn/USN-1000-1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478
http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2
https://bugzilla.redhat.com/show_bug.cgi?id=629441
kernel-doiosubmit-dos(61884)
https://exchange.xforce.ibmcloud.com/vulnerabilities/61884
Common Vulnerability Exposure (CVE) ID: CVE-2010-3078
1024418
http://securitytracker.com/id?1024418
41284
http://secunia.com/advisories/41284
41512
http://secunia.com/advisories/41512
43022
http://www.securityfocus.com/bid/43022
ADV-2010-2430
http://www.vupen.com/english/advisories/2010/2430
SUSE-SA:2010:041
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html
SUSE-SA:2010:050
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html
SUSE-SA:2010:054
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html
[oss-security] 20100907 CVE request: kernel: xfs: XFS_IOC_FSGETXATTR ioctl memory leak
http://www.openwall.com/lists/oss-security/2010/09/07/1
[oss-security] 20100907 Re: CVE request: kernel: xfs: XFS_IOC_FSGETXATTR ioctl memory leak
http://www.openwall.com/lists/oss-security/2010/09/07/12
[xfs-masters] 20100906 [PATCH] xfs: prevent reading uninitialized stack memory
http://www.linux.sgi.com/archives/xfs-masters/2010-09/msg00002.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a122eb2fdfd78b58c6dd992d6f4b1aaef667eef9
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc4
https://bugzilla.redhat.com/show_bug.cgi?id=630804
Common Vulnerability Exposure (CVE) ID: CVE-2010-3086
1024709
http://securitytracker.com/id?1024709
[oss-security] 20101110 CVE-2010-3086 kernel panic via futex
http://marc.info/?l=oss-security&m=128935856605589&w=2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9d55b9923a1b7ea8193b8875c57ec940dc2ff027
http://kerneltrap.org/mailarchive/linux-kernel/2008/2/6/752194/thread
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25
https://bugzilla.redhat.com/show_bug.cgi?id=429412
https://bugzilla.redhat.com/show_bug.cgi?id=633170
Common Vulnerability Exposure (CVE) ID: CVE-2010-3448
[oss-security] 20100623 kernel: thinkpad-acpi: lock down video output state access
http://openwall.com/lists/oss-security/2010/06/23/2
[oss-security] 20100928 Re: CVE requests: POE::Component::IRC, Alien Arena, Babiloo, Typo3, abcm2ps, ModSecurity, Linux kernel
http://openwall.com/lists/oss-security/2010/09/28/1
[oss-security] 20100929 Re: CVE requests: POE::Component::IRC, Alien Arena, Babiloo, Typo3, abcm2ps, ModSecurity, Linux kernel
http://openwall.com/lists/oss-security/2010/09/29/7
[oss-security] 20100930 Re: CVE requests: POE::Component::IRC, Alien Arena, Babiloo, Typo3, abcm2ps, ModSecurity, Linux kernel
http://openwall.com/lists/oss-security/2010/09/30/1
http://openwall.com/lists/oss-security/2010/09/30/6
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=565790
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b525c06cdbd8a3963f0173ccd23f9147d4c384b5
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34
https://bugzilla.redhat.com/show_bug.cgi?id=652122
kernel-thinkpad-dos(64580)
https://exchange.xforce.ibmcloud.com/vulnerabilities/64580
Common Vulnerability Exposure (CVE) ID: CVE-2010-3477
Bugtraq: 20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (Google Search)
Debian Security Information: DSA-2126 (Google Search)
http://www.securitytracker.com/id?1024603
CopyrightCopyright (C) 2015 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.