![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.122728 |
Kategorie: | Oracle Linux Local Security Checks |
Titel: | Oracle: Security Advisory (ELSA-2015-1978) |
Zusammenfassung: | The remote host is missing an update for the 'kernel' package(s) announced via the ELSA-2015-1978 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'kernel' package(s) announced via the ELSA-2015-1978 advisory. Vulnerability Insight: [3.10.0-229.20.1.OL7] - Oracle Linux certificates (Alexey Petrenko) [3.10.0-229.20.1] - Revert: [crypto] nx - Check for bogus firmware properties (Phillip Lougher) [1247127 1190103] - Revert: [crypto] nx - Moving NX-AES-CBC to be processed logic (Phillip Lougher) [1247127 1190103] - Revert: [crypto] nx - Moving NX-AES-CCM to be processed logic and sg_list bounds (Phillip Lougher) [1247127 1190103] - Revert: [crypto] nx - Moving limit and bound logic in CTR and fix IV vector (Phillip Lougher) [1247127 1190103] - Revert: [crypto] nx - Moving NX-AES-ECB to be processed logic (Phillip Lougher) [1247127 1190103] - Revert: [crypto] nx - Moving NX-AES-GCM to be processed logic (Phillip Lougher) [1247127 1190103] - Revert: [crypto] nx - Moving NX-AES-XCBC to be processed logic (Phillip Lougher) [1247127 1190103] - Revert: [crypto] nx - Fix SHA concurrence issue and sg limit bounds (Phillip Lougher) [1247127 1190103] - Revert: [crypto] nx - Fixing the limit number of bytes to be processed (Phillip Lougher) [1247127 1190103] [3.10.0-229.19.1] - Revert: [fs] xfs: DIO write completion size updates race (Phillip Lougher) [1258942 1213370] - Revert: [fs] xfs: direct IO EOF zeroing needs to drain AIO (Phillip Lougher) [1258942 1213370] [3.10.0-229.18.1] - [scsi] sd: split sd_init_command (Ewan Milne) [1264141 1109348] - [scsi] sd: retry discard commands (Ewan Milne) [1264141 1109348] - [scsi] sd: retry write same commands (Ewan Milne) [1264141 1109348] - [scsi] sd: don't use scsi_setup_blk_pc_cmnd for discard requests (Ewan Milne) [1264141 1109348] - [scsi] sd: don't use scsi_setup_blk_pc_cmnd for write same requests (Ewan Milne) [1264141 1109348] - [scsi] sd: don't use scsi_setup_blk_pc_cmnd for flush requests (Ewan Milne) [1264141 1109348] - [scsi] set sc_data_direction in common code (Ewan Milne) [1264141 1109348] - [scsi] restructure command initialization for TYPE_FS requests (Ewan Milne) [1264141 1109348] - [scsi] move the nr_phys_segments assert into scsi_init_io (Ewan Milne) [1264141 1109348] - [fs] xfs: remove bitfield based superblock updates (Brian Foster) [1261781 1225075] - [netdrv] ixgbe: fix X540 Completion timeout (John Greene) [1257633 1173786] - [lib] radix-tree: handle allocation failure in radix_tree_insert() (Seth Jennings) [1264142 1260613] - [crypto] nx - Fixing the limit number of bytes to be processed (Herbert Xu) [1247127 1190103] - [crypto] nx - Fix SHA concurrence issue and sg limit bounds (Herbert Xu) [1247127 1190103] - [crypto] nx - Moving NX-AES-XCBC to be processed logic (Herbert Xu) [1247127 1190103] - [crypto] nx - Moving NX-AES-GCM to be processed logic (Herbert Xu) [1247127 1190103] - [crypto] nx - Moving NX-AES-ECB to be processed logic (Herbert Xu) [1247127 1190103] - [crypto] nx - Moving limit and bound logic in CTR and fix IV vector (Herbert Xu) [1247127 1190103] - [crypto] nx - Moving NX-AES-CCM to be processed logic and sg_list bounds ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'kernel' package(s) on Oracle Linux 7. Solution: Please install the updated package(s). CVSS Score: 6.1 CVSS Vector: AV:A/AC:L/Au:N/C:N/I:N/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2014-8559 BugTraq ID: 70854 http://www.securityfocus.com/bid/70854 Debian Security Information: DSA-3170 (Google Search) http://www.debian.org/security/2015/dsa-3170 https://lkml.org/lkml/2014/10/25/171 https://lkml.org/lkml/2014/10/25/179 https://lkml.org/lkml/2014/10/25/180 https://lkml.org/lkml/2014/10/26/101 https://lkml.org/lkml/2014/10/26/116 https://lkml.org/lkml/2014/10/26/128 https://lkml.org/lkml/2014/10/26/129 http://www.openwall.com/lists/oss-security/2014/10/30/7 RedHat Security Advisories: RHSA-2015:1976 http://rhn.redhat.com/errata/RHSA-2015-1976.html RedHat Security Advisories: RHSA-2015:1978 http://rhn.redhat.com/errata/RHSA-2015-1978.html http://www.securitytracker.com/id/1034051 http://secunia.com/advisories/62801 SuSE Security Announcement: SUSE-SU-2015:0178 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html SuSE Security Announcement: SUSE-SU-2015:0481 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html SuSE Security Announcement: SUSE-SU-2015:0529 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html SuSE Security Announcement: SUSE-SU-2015:0736 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html SuSE Security Announcement: openSUSE-SU-2015:0566 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html SuSE Security Announcement: openSUSE-SU-2015:0714 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html http://www.ubuntu.com/usn/USN-2492-1 http://www.ubuntu.com/usn/USN-2493-1 http://www.ubuntu.com/usn/USN-2515-1 http://www.ubuntu.com/usn/USN-2516-1 http://www.ubuntu.com/usn/USN-2517-1 http://www.ubuntu.com/usn/USN-2518-1 Common Vulnerability Exposure (CVE) ID: CVE-2015-5156 1034045 http://www.securitytracker.com/id/1034045 76230 http://www.securityfocus.com/bid/76230 DSA-3364 http://www.debian.org/security/2015/dsa-3364 FEDORA-2015-0253d1f070 http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171454.html FEDORA-2015-c15f00eb95 http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169378.html RHSA-2015:1978 RHSA-2016:0855 http://rhn.redhat.com/errata/RHSA-2016-0855.html SUSE-SU-2015:1727 http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html SUSE-SU-2015:2292 http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html USN-2773-1 http://www.ubuntu.com/usn/USN-2773-1 USN-2774-1 http://www.ubuntu.com/usn/USN-2774-1 USN-2777-1 http://www.ubuntu.com/usn/USN-2777-1 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=48900cb6af4282fa0fb6ff4d72a81aa3dadb5c39 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html https://bugzilla.redhat.com/show_bug.cgi?id=1243852 https://github.com/torvalds/linux/commit/48900cb6af4282fa0fb6ff4d72a81aa3dadb5c39 |
Copyright | Copyright (C) 2015 Greenbone AG |
Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |