Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.122573
Kategorie:Oracle Linux Local Security Checks
Titel:Oracle: Security Advisory (ELSA-2008-0519)
Zusammenfassung:The remote host is missing an update for the 'kernel, ocfs2-2.6.18-92.1.6.0.2.el5, oracleasm-2.6.18-92.1.6.0.2.el5' package(s) announced via the ELSA-2008-0519 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'kernel, ocfs2-2.6.18-92.1.6.0.2.el5, oracleasm-2.6.18-92.1.6.0.2.el5' package(s) announced via the ELSA-2008-0519 advisory.

Vulnerability Insight:
[2.6.18-92.1.6.0.2.el5]
- [NET] Add entropy support to e1000 and bnx2 (John Sobecki) [orabug 6045759]
- [splice] Fix bad unlock_page() in error case (Jens Axboe) [orabug 6263574]
- [dio] fix error-path crashes (Linus Torvalds) [orabug 6242289]
- [NET] fix netpoll race (Tina Yang) [orabugz 5791]

[2.6.18-92.1.6.el5]
- [x86] sanity checking for read_tsc on i386 (Brian Maly ) [447686 443435]

[2.6.18-92.1.5.el5]
- [x86_64] copy_user doesn't zero tail bytes on page fault (Vitaly Mayatskikh) [451275 451276] {CVE-2008-2729}

[2.6.18-92.1.4.el5]
- Revert: [misc] ttyS1 loses interrupt and stops transmitting (Simon McGrath ) [443071 440121]

[2.6.18-92.1.3.el5]
- [x86_64] fix possible data leaks in copy_from_user() routine (Anton Arapov ) [433944 433945] {CVE-2008-0598}

[2.6.18-92.1.2.el5]
- [misc] ttyS1 loses interrupt and stops transmitting (Simon McGrath ) [443071 440121]
- [net] DCCP sanity check feature length (Anton Arapov ) [447395 447396] {CVE-2008-2358}
- [misc] fix possible buffer overflow in ASN.1 parsing routine (Anton Arapov ) [444464 444465] {CVE-2008-1673}

Affected Software/OS:
'kernel, ocfs2-2.6.18-92.1.6.0.2.el5, oracleasm-2.6.18-92.1.6.0.2.el5' package(s) on Oracle Linux 5.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2008-0598
1020367
http://www.securitytracker.com/id?1020367
29942
http://www.securityfocus.com/bid/29942
30849
http://secunia.com/advisories/30849
30850
http://secunia.com/advisories/30850
31107
http://secunia.com/advisories/31107
31551
http://secunia.com/advisories/31551
32103
http://secunia.com/advisories/32103
32104
http://secunia.com/advisories/32104
33201
http://secunia.com/advisories/33201
33586
http://secunia.com/advisories/33586
DSA-1630
http://www.debian.org/security/2008/dsa-1630
MDVSA-2008:220
http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
RHSA-2008:0508
http://rhn.redhat.com/errata/RHSA-2008-0508.html
RHSA-2008:0519
http://www.redhat.com/support/errata/RHSA-2008-0519.html
RHSA-2008:0973
http://www.redhat.com/support/errata/RHSA-2008-0973.html
RHSA-2009:0009
http://www.redhat.com/support/errata/RHSA-2009-0009.html
SUSE-SA:2008:047
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html
SUSE-SA:2008:048
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html
SUSE-SA:2008:049
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html
USN-625-1
http://www.ubuntu.com/usn/usn-625-1
https://bugzilla.redhat.com/show_bug.cgi?id=433938
linux-kernel-emulation-disclosure(43554)
https://exchange.xforce.ibmcloud.com/vulnerabilities/43554
oval:org.mitre.oval:def:10721
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10721
oval:org.mitre.oval:def:6201
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6201
Common Vulnerability Exposure (CVE) ID: CVE-2008-2358
1020211
http://www.securitytracker.com/id?1020211
29603
http://www.securityfocus.com/bid/29603
30000
http://secunia.com/advisories/30000
30818
http://secunia.com/advisories/30818
30920
http://secunia.com/advisories/30920
DSA-1592
http://www.debian.org/security/2008/dsa-1592
FEDORA-2008-5893
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00082.html
MDVSA-2008:112
http://www.mandriva.com/security/advisories?name=MDVSA-2008:112
MDVSA-2008:167
http://www.mandriva.com/security/advisories?name=MDVSA-2008:167
SUSE-SA:2008:030
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
https://bugzilla.redhat.com/show_bug.cgi?id=447389
linux-kernel-dccpfeatchange-bo(43034)
https://exchange.xforce.ibmcloud.com/vulnerabilities/43034
oval:org.mitre.oval:def:9644
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9644
Common Vulnerability Exposure (CVE) ID: CVE-2008-2729
BugTraq ID: 29943
http://www.securityfocus.com/bid/29943
Debian Security Information: DSA-1630 (Google Search)
http://www.mandriva.com/security/advisories?name=MDVSA-2008:174
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11571
RedHat Security Advisories: RHSA-2008:0508
http://www.redhat.com/support/errata/RHSA-2008-0585.html
http://www.securitytracker.com/id?1020364
http://secunia.com/advisories/31628
XForce ISS Database: linux-kernel-destination-info-disclosure(43558)
https://exchange.xforce.ibmcloud.com/vulnerabilities/43558
CopyrightCopyright (C) 2015 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.