Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.123810
Kategorie:Oracle Linux Local Security Checks
Titel:Oracle: Security Advisory (ELSA-2012-2034)
Zusammenfassung:The remote host is missing an update for the 'kernel-uek' package(s) announced via the ELSA-2012-2034 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'kernel-uek' package(s) announced via the ELSA-2012-2034 advisory.

Vulnerability Insight:
[2.6.39-200.32.1]
- dl2k: Clean up rio_ioctl (Stephan Mueller) [Orabug: 14680245] {CVE-2012-2313}
- hugetlb: fix resv_map leak in error path (Christoph Lameter) [Orabug: 14680284] {CVE-2012-2390}
- rds: set correct msg_namelen (Jay Fenlason) [Orabug: 14680018] {CVE-2012-3430}

Affected Software/OS:
'kernel-uek' package(s) on Oracle Linux 5, Oracle Linux 6.

Solution:
Please install the updated package(s).

CVSS Score:
4.9

CVSS Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2012-2313
53965
http://www.securityfocus.com/bid/53965
HPSBGN02970
http://marc.info/?l=bugtraq&m=139447903326211&w=2
RHSA-2012:1174
http://rhn.redhat.com/errata/RHSA-2012-1174.html
RHSA-2012:1481
http://rhn.redhat.com/errata/RHSA-2012-1481.html
RHSA-2012:1541
http://rhn.redhat.com/errata/RHSA-2012-1541.html
RHSA-2012:1589
http://rhn.redhat.com/errata/RHSA-2012-1589.html
SUSE-SU-2015:0812
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
[oss-security] 20120504 Re: CVE Request: more tight ioctl permissions in dl2k driver
http://www.openwall.com/lists/oss-security/2012/05/04/8
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1bb57e940e1958e40d51f2078f50c3a96a9b2d75
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.7
https://bugzilla.redhat.com/show_bug.cgi?id=818820
https://github.com/torvalds/linux/commit/1bb57e940e1958e40d51f2078f50c3a96a9b2d75
Common Vulnerability Exposure (CVE) ID: CVE-2012-2390
USN-1515-1
http://www.ubuntu.com/usn/USN-1515-1
USN-1535-1
http://www.ubuntu.com/usn/USN-1535-1
[oss-security] 20120523 Re: CVE Request -- kernel: huge pages: memory leak on mmap failure
http://www.openwall.com/lists/oss-security/2012/05/23/14
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c50ac050811d6485616a193eb0f37bfbd191cc89
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.2
https://bugzilla.redhat.com/show_bug.cgi?id=824345
https://github.com/torvalds/linux/commit/c50ac050811d6485616a193eb0f37bfbd191cc89
Common Vulnerability Exposure (CVE) ID: CVE-2012-3430
50633
http://secunia.com/advisories/50633
50732
http://secunia.com/advisories/50732
50811
http://secunia.com/advisories/50811
RHSA-2012:1323
http://rhn.redhat.com/errata/RHSA-2012-1323.html
SUSE-SU-2012:1679
https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html
USN-1567-1
http://www.ubuntu.com/usn/USN-1567-1
USN-1568-1
http://www.ubuntu.com/usn/USN-1568-1
USN-1572-1
http://www.ubuntu.com/usn/USN-1572-1
USN-1575-1
http://www.ubuntu.com/usn/USN-1575-1
USN-1577-1
http://www.ubuntu.com/usn/USN-1577-1
USN-1578-1
http://www.ubuntu.com/usn/USN-1578-1
USN-1579-1
http://www.ubuntu.com/usn/USN-1579-1
USN-1580-1
http://www.ubuntu.com/usn/USN-1580-1
[oss-security] 20120726 Re: CVE Request -- kernel: recv{from,msg}() on an rds socket can leak kernel memory
http://www.openwall.com/lists/oss-security/2012/07/26/5
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=06b6a1cf6e776426766298d055bb3991957d90a7
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.0.44
https://bugzilla.redhat.com/show_bug.cgi?id=820039
https://github.com/torvalds/linux/commit/06b6a1cf6e776426766298d055bb3991957d90a7
CopyrightCopyright (C) 2015 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.