Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.123082
Kategorie:Oracle Linux Local Security Checks
Titel:Oracle: Security Advisory (ELSA-2015-1221)
Zusammenfassung:The remote host is missing an update for the 'kernel' package(s) announced via the ELSA-2015-1221 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'kernel' package(s) announced via the ELSA-2015-1221 advisory.

Vulnerability Insight:
[2.6.32-504.30.3]
- [redhat] spec: Update dracut dependency to pull in drbg module (Frantisek Hrbata) [1241517 1241338]

[2.6.32-504.30.2]
- [crypto] rng: Remove krng (Herbert Xu) [1233512 1226418]
- [crypto] drbg: Add stdrng alias and increase priority (Herbert Xu) [1233512 1226418]
- [crypto] seqiv: Move IV seeding into init function (Herbert Xu) [1233512 1226418]
- [crypto] eseqiv: Move IV seeding into init function (Herbert Xu) [1233512 1226418]
- [crypto] chainiv: Move IV seeding into init function (Herbert Xu) [1233512 1226418]

[2.6.32-504.30.1]
- [net] Fix checksum features handling in netif_skb_features() (Vlad Yasevich) [1231690 1220247]

[2.6.32-504.29.1]
- [net] gso: fix skb_segment for non-offset skb pointers (Jiri Benc) [1229586 1200533]

[2.6.32-504.28.1]
- [fs] pipe: fix pipe corruption and iovec overrun on partial copy (Seth Jennings) [1202860 1185166] {CVE-2015-1805}
- [net] ipv4: Missing sk_nulls_node_init in ping_unhash (Denys Vlasenko) [1218102 1218103] {CVE-2015-3636}
- [net] conntrack: RFC5961 challenge ACK confuse conntrack LAST-ACK transition (Jesper Brouer) [1227467 1227468 1212801 1200541]
- [net] tcp: Restore RFC5961-compliant behavior for SYN packets (Jesper Brouer) [1227467 1227468 1212801 1200541]
- [x86] kernel: ignore NMI IOCK when in kdump kernel (Jerry Snitselaar) [1225054 1196263]
- [x86] asm/entry/64: Remove a bogus 'ret_from_fork' optimization (Mateusz Guzik) [1209232 1209233] {CVE-2015-2830}
- [fs] gfs2: try harder to obtain journal lock during recovery (Abhijith Das) [1222588 1110846]
for core_pmu (Jiri Olsa) [1219149 1188336]
- [x86] mm: Linux stack ASLR implementation (Jacob Tanenbaum) [1195682 1195683] {CVE-2015-1593}
- [fs] xfs: DIO write completion size updates race (Brian Foster) [1218499 1198440]
- [net] ipv6: Don't reduce hop limit for an interface (Denys Vlasenko) [1208492 1208493]
- [net] vlan: more careful checksum features handling (Vlad Yasevich) [1221844 1212384]
- [kernel] tracing: Export tracing clock functions (Jerry Snitselaar) [1217986 1212502]
- [edac] sb_edac: fix corruption/crash on imbalanced Haswell home agents (Seth Jennings) [1213468 1210148]
- [netdrv] tun: Fix csum_start with VLAN acceleration (Jason Wang) [1217189 1036482]
- [netdrv] tun: unbreak truncated packet signalling (Jason Wang) [1217189 1036482]
- [netdrv] tuntap: hardware vlan tx support (Jason Wang) [1217189 1036482]
- [vhost] vhost-net: fix handle_rx buffer size (Jason Wang) [1217189 1036482]
- [netdrv] ixgbe: fix X540 Completion timeout (John Greene) [1215855 1150343]
- [char] tty: drop driver reference in tty_open fail path (Mateusz Guzik) [1201893 1201894]
- [netdrv] macvtap: Fix csum_start when VLAN tags are present (Vlad Yasevich) [1215914 1123697]
- [netdrv] macvtap: signal truncated packets (Vlad Yasevich) [1215914 1123697]
- [netdrv] macvtap: restore vlan header on user read (Vlad Yasevich) [1215914 1123697]
- [netdrv] macvlan: ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'kernel' package(s) on Oracle Linux 6.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2011-5321
RHSA-2015:1221
http://rhn.redhat.com/errata/RHSA-2015-1221.html
[oss-security] 20150313 Re: CVE request: Linux kernel: tty: kobject reference leakage in tty_open
http://www.openwall.com/lists/oss-security/2015/03/13/17
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c290f8358acaeffd8e0c551ddcc24d1206143376
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1.1
https://bugzilla.redhat.com/show_bug.cgi?id=1201887
https://github.com/torvalds/linux/commit/c290f8358acaeffd8e0c551ddcc24d1206143376
Common Vulnerability Exposure (CVE) ID: CVE-2015-1593
BugTraq ID: 72607
http://www.securityfocus.com/bid/72607
Debian Security Information: DSA-3170 (Google Search)
http://www.debian.org/security/2015/dsa-3170
http://hmarco.org/bugs/linux-ASLR-integer-overflow.html
https://lkml.org/lkml/2015/1/7/811
http://www.openwall.com/lists/oss-security/2015/02/13/13
RedHat Security Advisories: RHSA-2015:1137
http://rhn.redhat.com/errata/RHSA-2015-1137.html
RedHat Security Advisories: RHSA-2015:1138
http://rhn.redhat.com/errata/RHSA-2015-1138.html
RedHat Security Advisories: RHSA-2015:1221
RedHat Security Advisories: RHSA-2019:3517
https://access.redhat.com/errata/RHSA-2019:3517
SuSE Security Announcement: SUSE-SU-2015:0736 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
SuSE Security Announcement: openSUSE-SU-2015:0714 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html
http://www.ubuntu.com/usn/USN-2560-1
http://www.ubuntu.com/usn/USN-2561-1
http://www.ubuntu.com/usn/USN-2562-1
http://www.ubuntu.com/usn/USN-2563-1
http://www.ubuntu.com/usn/USN-2564-1
http://www.ubuntu.com/usn/USN-2565-1
Common Vulnerability Exposure (CVE) ID: CVE-2015-2830
Debian Security Information: DSA-3237 (Google Search)
http://www.debian.org/security/2015/dsa-3237
http://www.openwall.com/lists/oss-security/2015/04/02/1
http://www.securitytracker.com/id/1032413
SuSE Security Announcement: SUSE-SU-2015:1478 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html
SuSE Security Announcement: SUSE-SU-2015:1592 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
SuSE Security Announcement: SUSE-SU-2015:1611 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
http://www.ubuntu.com/usn/USN-2631-1
http://www.ubuntu.com/usn/USN-2632-1
Common Vulnerability Exposure (CVE) ID: CVE-2015-2922
BugTraq ID: 74315
http://www.securityfocus.com/bid/74315
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155908.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155804.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155854.html
http://www.openwall.com/lists/oss-security/2015/04/04/2
RedHat Security Advisories: RHSA-2015:1534
http://rhn.redhat.com/errata/RHSA-2015-1534.html
RedHat Security Advisories: RHSA-2015:1564
http://rhn.redhat.com/errata/RHSA-2015-1564.html
http://www.securitytracker.com/id/1032417
SuSE Security Announcement: SUSE-SU-2015:1224 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
SuSE Security Announcement: openSUSE-SU-2015:1382 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-3636
BugTraq ID: 74450
http://www.securityfocus.com/bid/74450
Debian Security Information: DSA-3290 (Google Search)
http://www.debian.org/security/2015/dsa-3290
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157897.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157788.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158804.html
http://www.openwall.com/lists/oss-security/2015/05/02/5
RedHat Security Advisories: RHSA-2015:1583
http://rhn.redhat.com/errata/RHSA-2015-1583.html
RedHat Security Advisories: RHSA-2015:1643
http://rhn.redhat.com/errata/RHSA-2015-1643.html
http://www.securitytracker.com/id/1033186
SuSE Security Announcement: SUSE-SU-2015:1487 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html
SuSE Security Announcement: SUSE-SU-2015:1488 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html
SuSE Security Announcement: SUSE-SU-2015:1489 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html
SuSE Security Announcement: SUSE-SU-2015:1491 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html
http://www.ubuntu.com/usn/USN-2633-1
http://www.ubuntu.com/usn/USN-2634-1
CopyrightCopyright (C) 2015 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.