Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.122545
Kategorie:Oracle Linux Local Security Checks
Titel:Oracle: Security Advisory (ELSA-2008-0957)
Zusammenfassung:The remote host is missing an update for the 'kernel, ocfs2-2.6.18-92.1.17.0.1.el5, oracleasm-2.6.18-92.1.17.0.1.el5' package(s) announced via the ELSA-2008-0957 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'kernel, ocfs2-2.6.18-92.1.17.0.1.el5, oracleasm-2.6.18-92.1.17.0.1.el5' package(s) announced via the ELSA-2008-0957 advisory.

Vulnerability Insight:
[2.6.18-92.1.17.0.1.el5]
- [MM] shrink zone patch (John Sobecki,Chris Mason) [orabug 6086839]
- [NFS] nfs attribute timeout fix (Trond Myklebust) [orabug 7156607] [RHBZ 446083]
- [NET] Add entropy support to e1000 and bnx2 (John Sobecki) [orabug 6045759]
- [NET] fix netpoll race (Tina Yang) [orabugz 5791]

[2.6.18-92.1.17.el5]

- Revert: [nfs] pages of a memory mapped file get corrupted (Peter Staubach ) [450335 435291]

[2.6.18-92.1.16.el5]

- [i386] vDSO: use install_special_mapping (Peter Zijlstra ) [460275 460276] {CVE-2008-3527}
- [scsi] aacraid: remove some quirk AAC_QUIRK_SCSI_32 bits (Tomas Henzl ) [466885 453472]
- [fs] remove SUID when splicing into an inode (Eric Sandeen ) [464451 464452] {CVE-2008-3833}
- [fs] open() allows setgid bit when user is not in group (Eugene Teo ) [463867 463687] {CVE-2008-4210}
- [xen] ia64: fix INIT injection (Tetsu Yamamoto ) [467105 464445]

[2.6.18-92.1.15.el5]

- [pci] fix problems with msi interrupt management (Neil Horman ) [461894 428696]
- [x86_64] revert time syscall changes (Prarit Bhargava ) [466427 461184]
- [xen] allow guests to hide the TSC from applications (Chris Lalancette ) [378471 378481] {CVE-2007-5907}
- [scsi] qla2xxx: additional residual-count correction (Marcus Barrow ) [465741 462117]
- [char] add range_is_allowed check to mmap_mem (Eugene Teo ) [460858 460857]
- [fs] binfmt_misc: avoid potential kernel stack overflow (Vitaly Mayatskikh ) [459464 459463]
- [misc] cpufreq: fix format string bug (Vitaly Mayatskikh ) [459461 459460]
- [dlm] user.c input validation fixes (David Teigland ) [458759 458760]
- [nfs] pages of a memory mapped file get corrupted (Peter Staubach ) [450335 435291]
- [x86_64] gettimeofday fixes for HPET, PMTimer, TSC (Prarit Bhargava ) [462860 250708]

[2.6.18-92.1.14.el5]

- [libata] ata_scsi_rbuf_get check for scatterlist usage (David Milburn ) [460638 455445]
- [net] random32: seeding improvement (Jiri Pirko ) [458021 458019]
- [x86_64] xen: local DOS due to NT bit leakage (Eugene Teo ) [457721 457722] {CVE-2006-5755}
- [fs] cifs: fix O_APPEND on directio mounts (Jeff Layton ) [462591 460063]
- [openib] race between QP async handler and destroy_qp (Brad Peters ) [458781 446109]
- [net] dccp_setsockopt_change integer overflow (Vitaly Mayatskikh ) [459232 459235] {CVE-2008-3276}
- [acpi] error attaching device data (peterm@redhat.com ) [460868 459670]
- [mm] optimize ZERO_PAGE in 'get_user_pages' and fix XIP (Anton Arapov ) [452667 452668] {CVE-2008-2372}
- [xen] xennet: coordinate ARP with backend network status (Herbert Xu ) [461457 458934]
- [xen] event channel lock and barrier (Markus Armbruster ) [461099 457086]
- [fs] fix bad unlock_page in pip_to_file() error path (Larry Woodman ) [462436 439917]

Affected Software/OS:
'kernel, ocfs2-2.6.18-92.1.17.0.1.el5, oracleasm-2.6.18-92.1.17.0.1.el5' package(s) on Oracle Linux 5.

Solution:
Please install the updated package(s).

CVSS Score:
7.1

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2006-5755
20070615 rPSA-2007-0124-1 kernel xen
http://www.securityfocus.com/archive/1/471457
24098
http://secunia.com/advisories/24098
25691
http://secunia.com/advisories/25691
26060
http://www.securityfocus.com/bid/26060
26620
http://secunia.com/advisories/26620
26994
http://secunia.com/advisories/26994
32485
http://secunia.com/advisories/32485
DSA-1381
http://www.debian.org/security/2007/dsa-1381
MDKSA-2007:171
http://www.mandriva.com/security/advisories?name=MDKSA-2007:171
RHSA-2008:0957
http://www.redhat.com/support/errata/RHSA-2008-0957.html
USN-416-1
http://www.ubuntu.com/usn/usn-416-1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=658fdbef66e5e9be79b457edc2cbbb3add840aa9
http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=658fdbef66e5e9be79b457edc2cbbb3add840aa9
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.18
http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.18-git13.log
oval:org.mitre.oval:def:9554
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9554
Common Vulnerability Exposure (CVE) ID: CVE-2007-5907
BugTraq ID: 27219
http://www.securityfocus.com/bid/27219
http://lists.xensource.com/archives/html/xen-devel/2007-10/msg00932.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10380
http://secunia.com/advisories/28405
http://secunia.com/advisories/28412
http://secunia.com/advisories/28636
SuSE Security Announcement: SUSE-SR:2008:001 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html
SuSE Security Announcement: SUSE-SR:2008:002 (Google Search)
http://www.novell.com/linux/security/advisories/suse_security_summary_report.html
Common Vulnerability Exposure (CVE) ID: CVE-2008-2372
30901
http://secunia.com/advisories/30901
30982
http://secunia.com/advisories/30982
31202
http://secunia.com/advisories/31202
31628
http://secunia.com/advisories/31628
32393
http://secunia.com/advisories/32393
RHSA-2008:0585
http://www.redhat.com/support/errata/RHSA-2008-0585.html
SUSE-SA:2008:035
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html
SUSE-SA:2008:037
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html
SUSE-SA:2008:038
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html
USN-659-1
http://www.ubuntu.com/usn/usn-659-1
[linux-kernel] 20080430 Re: Page Faults slower in 2.6.25-rc9 than 2.6.23
http://www.ussg.iu.edu/hypermail/linux/kernel/0804.3/3203.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=89f5b7da2a6bad2e84670422ab8192382a5aeb9f
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.9
http://new-ubuntu-news.blogspot.com/2008/06/re-pending-stable-kernel-security_25.html
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207
https://issues.rpath.com/browse/RPL-2629
linux-kernel-getuserpages-dos(43550)
https://exchange.xforce.ibmcloud.com/vulnerabilities/43550
oval:org.mitre.oval:def:9383
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9383
Common Vulnerability Exposure (CVE) ID: CVE-2008-3276
1020705
http://www.securitytracker.com/id?1020705
30704
http://www.securityfocus.com/bid/30704
31509
http://secunia.com/advisories/31509
31836
http://secunia.com/advisories/31836
31881
http://secunia.com/advisories/31881
32190
http://secunia.com/advisories/32190
32237
http://secunia.com/advisories/32237
32370
http://secunia.com/advisories/32370
ADV-2008-2406
http://www.vupen.com/english/advisories/2008/2406
DSA-1636
http://www.debian.org/security/2008/dsa-1636
DSA-1653
http://www.debian.org/security/2008/dsa-1653
RHSA-2008:0857
http://www.redhat.com/support/errata/RHSA-2008-0857.html
SUSE-SA:2008:052
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html
[oss-security] 20080815 CVE-2008-3276 Linux kernel dccp_setsockopt_change() integer overflow
http://www.openwall.com/lists/oss-security/2008/08/15/3
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=3e8a0a559c66ee9e7468195691a56fefc3589740
https://bugzilla.redhat.com/show_bug.cgi?id=459226
oval:org.mitre.oval:def:11506
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11506
Common Vulnerability Exposure (CVE) ID: CVE-2008-3527
1021137
http://www.securitytracker.com/id?1021137
32759
http://secunia.com/advisories/32759
33180
http://secunia.com/advisories/33180
DSA-1687
http://www.debian.org/security/2008/dsa-1687
SUSE-SR:2008:025
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7d91d531900bfa1165d445390b3b13a8013f98f7
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21
https://bugzilla.redhat.com/show_bug.cgi?id=460251
oval:org.mitre.oval:def:10602
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10602
Common Vulnerability Exposure (CVE) ID: CVE-2008-3833
31567
http://www.securityfocus.com/bid/31567
[oss-security] 20081003 CVE-2008-3833 kernel: remove SUID when splicing into an inode
http://openwall.com/lists/oss-security/2008/10/03/1
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.19.y.git%3Ba=commit%3Bh=8c34e2d63231d4bf4852bac8521883944d770fe3
http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.19/ChangeLog-2.6.19-rc3
https://bugzilla.redhat.com/show_bug.cgi?id=464450
kernel-genericfilesplice-priv-escalation(45922)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45922
oval:org.mitre.oval:def:9980
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9980
Common Vulnerability Exposure (CVE) ID: CVE-2008-4210
BugTraq ID: 31368
http://www.securityfocus.com/bid/31368
Debian Security Information: DSA-1653 (Google Search)
http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
http://www.openwall.com/lists/oss-security/2008/09/24/5
http://www.openwall.com/lists/oss-security/2008/09/24/8
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6386
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9511
http://www.redhat.com/support/errata/RHSA-2008-0787.html
RedHat Security Advisories: RHSA-2008:0972
http://rhn.redhat.com/errata/RHSA-2008-0972.html
http://www.redhat.com/support/errata/RHSA-2008-0973.html
http://secunia.com/advisories/32344
http://secunia.com/advisories/32356
http://secunia.com/advisories/32799
http://secunia.com/advisories/32918
http://secunia.com/advisories/33201
http://secunia.com/advisories/33280
SuSE Security Announcement: SUSE-SA:2008:051 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html
SuSE Security Announcement: SUSE-SA:2008:056 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00000.html
SuSE Security Announcement: SUSE-SA:2008:057 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00001.html
SuSE Security Announcement: SUSE-SR:2008:025 (Google Search)
http://www.ubuntu.com/usn/usn-679-1
XForce ISS Database: linux-kernel-open-privilege-escalation(45539)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45539
Common Vulnerability Exposure (CVE) ID: CVE-2008-4302
BugTraq ID: 31201
http://www.securityfocus.com/bid/31201
http://www.juniper.net/security/auto/vulnerabilities/vuln31201.html
http://lkml.org/lkml/2007/7/20/168
http://www.openwall.com/lists/oss-security/2008/09/16/10
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10547
XForce ISS Database: linux-kernel-addtopagecachelru-dos(45191)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45191
CopyrightCopyright (C) 2015 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.