![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.123305 |
Kategorie: | Oracle Linux Local Security Checks |
Titel: | Oracle: Security Advisory (ELSA-2014-1281) |
Zusammenfassung: | The remote host is missing an update for the 'kernel' package(s) announced via the ELSA-2014-1281 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'kernel' package(s) announced via the ELSA-2014-1281 advisory. Vulnerability Insight: [3.10.0-123.8.1] - Oracle Linux certificates (Alexey Petrenko) [3.10.0-123.8.1] - [scsi] fnic: fix broken FIP discovery by initializing multicast address (Chris Leech) [1119727 1100078] - [scsi] libfcoe: Make fcoe_sysfs optional / fix fnic NULL exception (Chris Leech) [1119727 1100078] - [fs] nfs: Don't mark the data cache as invalid if it has been flushed (Scott Mayhew) [1115817 1114054] - [fs] nfs: Clear NFS_INO_REVAL_PAGECACHE when we update the file size (Scott Mayhew) [1115817 1114054] - [fs] nfs: Fix cache_validity check in nfs_write_pageup todate() (Scott Mayhew) [1115817 1114054] - [mm] hugetlb: ensure hugepage access is denied if hugepages are not supported (David Gibson) [1122115 1081671] - [kernel] hrtimer: Prevent all reprogramming if hang detected (Prarit Bhargava) [1113175 1094732] [3.10.0-123.7.1] - [scsi] set DID_TIME_OUT correctly (Ewan Milne) [1122575 1103881] - [scsi] fix invalid setting of host byte (Ewan Milne) [1122575 1103881] - [scsi] More USB deadlock fixes (Ewan Milne) [1122575 1103881] - [scsi] Fix USB deadlock caused by SCSI error handling (Ewan Milne) [1122575 1103881] - [scsi] Fix command result state propagation (Ewan Milne) [1122575 1103881] - [scsi] Fix spurious request sense in error handling (Ewan Milne) [1122575 1103881] - [input] synaptics: fix resolution for manually provided min/max (Benjamin Tissoires) [1122559 1093449] - [input] synaptics: change min/max quirk table to pnp-id matching (Benjamin Tissoires) [1122559 1093449] - [input] synaptics: add a matches_pnp_id helper function (Benjamin Tissoires) [1122559 1093449] - [input] synaptics: T540p - unify with other LEN0034 models (Benjamin Tissoires) [1122559 1093449] - [input] synaptics: add min/max quirk for the ThinkPad W540 (Benjamin Tissoires) [1122559 1093449] - [input] synaptics: add min/max quirk for ThinkPad Edge E431 (Benjamin Tissoires) [1122559 1093449] - [input] synaptics: add min/max quirk for ThinkPad T431s, L440, L540, S1 Yoga and X1 (Benjamin Tissoires) [1122559 1093449] - [input] synaptics: report INPUT_PROP_TOPBUTTONPAD property (Benjamin Tissoires) [1122559 1093449] - [input] Add INPUT_PROP_TOPBUTTONPAD device property (Benjamin Tissoires) [1122559 1093449] - [input] i8042: add firmware_id support (Benjamin Tissoires) [1122559 1093449] - [input] serio: add firmware_id sysfs attribute (Benjamin Tissoires) [1122559 1093449] - [input] synaptics: add manual min/max quirk for ThinkPad X240 (Benjamin Tissoires) [1122559 1093449] - [input] synaptics: add manual min/max quirk (Benjamin Tissoires) [1122559 1093449] - [input] synaptics: fix incorrect placement of __initconst (Benjamin Tissoires) [1122559 1093449] - [ethernet] be2net: Fix invocation of be_close() after be_clear() (Ivan Vecera) [1122558 1066644] - [ethernet] be2net: enable interrupts in EEH resume (Ivan Vecera) [1121712 1076682] - [ethernet] sfc: PIO:Restrict to 64bit arch and use 64-bit writes (Nikolay ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'kernel' package(s) on Oracle Linux 7. Solution: Please install the updated package(s). CVSS Score: 3.3 CVSS Vector: AV:L/AC:M/Au:N/C:P/I:N/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2014-3917 http://article.gmane.org/gmane.linux.kernel/1713179 http://www.openwall.com/lists/oss-security/2014/05/29/5 RedHat Security Advisories: RHSA-2014:1143 http://rhn.redhat.com/errata/RHSA-2014-1143.html RedHat Security Advisories: RHSA-2014:1281 http://rhn.redhat.com/errata/RHSA-2014-1281.html http://secunia.com/advisories/59777 http://secunia.com/advisories/60011 http://secunia.com/advisories/60564 SuSE Security Announcement: SUSE-SU-2015:0812 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html http://www.ubuntu.com/usn/USN-2334-1 http://www.ubuntu.com/usn/USN-2335-1 |
Copyright | Copyright (C) 2015 Greenbone AG |
Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |