![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.122369 |
Kategorie: | Oracle Linux Local Security Checks |
Titel: | Oracle: Security Advisory (ELSA-2010-0178) |
Zusammenfassung: | The remote host is missing an update for the 'kernel, ocfs2-2.6.18-194.el5, oracleasm-2.6.18-194.el5' package(s) announced via the ELSA-2010-0178 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'kernel, ocfs2-2.6.18-194.el5, oracleasm-2.6.18-194.el5' package(s) announced via the ELSA-2010-0178 advisory. Vulnerability Insight: [2.6.18-194.el5] - [net] mlx4: pass attributes down to vlan interfaces (Doug Ledford) [573098] - [block] cfq-iosched: fix sequential read perf regression (Jeff Moyer) [571818] [2.6.18-193.el5] - [fs] gfs2: locking fix for potential dos (Steven Whitehouse) [572390] {CVE-2010-0727} - [acpi] power_meter: avoid oops on driver load (Matthew Garrett) [566575] - [net] r8169: fix assignments in backported net_device_ops (Ivan Vecera) [568040] - [net] virtio_net: refill rx buffer on out-of-memory (Herbert Xu) [554078] [2.6.18-192.el5] - [cpu] fix amd l3 cache disable functionality (Jarod Wilson) [517586] - [misc] backport upstream strict_strto* functions (Jarod Wilson) [517586] - [wireless] rt2x00: fix work cancel race conditions (Stanislaw Gruszka) [562972] - [net] igb: fix DCA support for 82580 NICs (Stefan Assmann) [513712] - Revert: [ia64] kdump: fix a deadlock while redezvousing (Neil Horman) [506694] - [block] cfq: kick busy queues w/o waiting for merged req (Jeff Moyer) [570814] - [fs] cifs: max username len check in setup does not match (Jeff Layton) [562947] - [fs] cifs: CIFS shouldn't make mountpoints shrinkable (Jeff Layton) [562947] - [fs] cifs: fix dentry hash for case-insensitive mounts (Jeff Layton) [562947] - [fs] cifs: fix len for converted unicode readdir names (Jeff Layton) [562947] - [x86_64] xen: fix missing 32-bit syscalls on 64-bit Xen (Christopher Lalancette) [559410] - [fs] gfs2: fix kernel BUG when using fiemap (Abhijith Das) [569610] - [net] sctp: backport cleanups for ootb handling (Neil Horman) [555667] {CVE-2010-0008} - [xen] vtd: ignore unknown DMAR entries (Don Dugger) [563900] [2.6.18-191.el5] - [wireless] iwlwifi: fix dual band N-only use on 5x00 (Stanislaw Gruszka) [566696] - [net] be2net: critical bugfix from upstream (Ivan Vecera) [567718] - [net] tg3: fix 5717 and 57765 asic revs panic under load (John Feeney) [565964] - [net] bnx2x: use single tx queue (Stanislaw Gruszka) [567979] - [net] igb: fix WoL initialization when disabled in eeprom (Stefan Assmann) [564102] - [net] igb: fix warning in igb_ethtool.c (Stefan Assmann) [561076] - [net] s2io: restore ability to tx/rx vlan traffic (Neil Horman) [562732] - [net] ixgbe: stop unmapping DMA buffers too early (Andy Gospodarek) [568153] - [net] e1000e: disable NFS filtering capabilities in ICH hw (Andy Gospodarek) [558809] - [net] bnx2: update firmware and version to 2.0.8 (Andy Gospodarek) [561578] - [net] mlx4: fix broken SRIOV code (Doug Ledford) [567730] - [net] mlx4: pass eth attributes down to vlan interfaces (Doug Ledford) [557109] - [x86_64] fix missing 32 bit syscalls on 64 bit (Wade Mealing) [559410] - [s390] zcrypt: Do not remove coprocessor on error 8/72 (Hendrik Brueckner) [561067] - [misc] usb-serial: add support for Qualcomm modems (Pete Zaitcev) [523888] - [scsi] mpt2sas: fix missing initialization (Tomas Henzl) [565637] - [i386] mce: avoid deadlocks during MCE broadcasts ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'kernel, ocfs2-2.6.18-194.el5, oracleasm-2.6.18-194.el5' package(s) on Oracle Linux 5. Solution: Please install the updated package(s). CVSS Score: 7.1 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-4027 37170 http://www.securityfocus.com/bid/37170 38017 http://secunia.com/advisories/38017 38492 http://secunia.com/advisories/38492 DSA-1996 http://www.debian.org/security/2010/dsa-1996 RHSA-2010:0380 http://www.redhat.com/support/errata/RHSA-2010-0380.html SUSE-SA:2010:001 http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html USN-864-1 http://www.ubuntu.com/usn/usn-864-1 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=827d42c9ac91ddd728e4f4a31fefb906ef2ceff7 http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.32-rc8-next-20091201.gz https://bugzilla.redhat.com/show_bug.cgi?id=541149 oval:org.mitre.oval:def:11583 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11583 Common Vulnerability Exposure (CVE) ID: CVE-2009-4307 http://www.mandriva.com/security/advisories?name=MDVSA-2011:029 http://lkml.org/lkml/2009/12/9/255 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9874 http://secunia.com/advisories/37658 http://secunia.com/advisories/38276 SuSE Security Announcement: SUSE-SA:2010:001 (Google Search) SuSE Security Announcement: SUSE-SA:2010:005 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html Common Vulnerability Exposure (CVE) ID: CVE-2010-0727 1023809 http://securitytracker.com/id?1023809 39830 http://secunia.com/advisories/39830 DSA-2053 http://www.debian.org/security/2010/dsa-2053 MDVSA-2010:066 http://www.mandriva.com/security/advisories?name=MDVSA-2010:066 RHSA-2010:0330 http://www.redhat.com/support/errata/RHSA-2010-0330.html RHSA-2010:0521 http://www.redhat.com/support/errata/RHSA-2010-0521.html [linux-kernel] 20100311 [PATCH 3/3] GFS2: Skip check for mandatory locks when unlocking http://lkml.org/lkml/2010/3/11/269 [oss-security] 20100312 CVE-2010-0727 kernel: gfs/gfs2 locking code DoS flaw http://www.openwall.com/lists/oss-security/2010/03/12/1 http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.34-rc1-next-20100312.bz2 https://bugzilla.redhat.com/show_bug.cgi?id=570863 oval:org.mitre.oval:def:11392 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11392 Common Vulnerability Exposure (CVE) ID: CVE-2010-1188 BugTraq ID: 39016 http://www.securityfocus.com/bid/39016 http://www.openwall.com/lists/oss-security/2010/03/29/1 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9878 http://www.redhat.com/support/errata/RHSA-2010-0394.html http://www.redhat.com/support/errata/RHSA-2010-0424.html http://www.redhat.com/support/errata/RHSA-2010-0439.html http://www.redhat.com/support/errata/RHSA-2010-0882.html http://www.securitytracker.com/id?1023992 http://secunia.com/advisories/39652 |
Copyright | Copyright (C) 2015 Greenbone AG |
Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |