![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.123968 |
Kategorie: | Oracle Linux Local Security Checks |
Titel: | Oracle: Security Advisory (ELSA-2012-0150) |
Zusammenfassung: | The remote host is missing an update for the 'kernel, ocfs2-2.6.18-308.el5, oracleasm-2.6.18-308.el5' package(s) announced via the ELSA-2012-0150 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'kernel, ocfs2-2.6.18-308.el5, oracleasm-2.6.18-308.el5' package(s) announced via the ELSA-2012-0150 advisory. Vulnerability Insight: kernel [2.6.18-308.el5] - [scsi] lpfc: Update lpfc version for 8.2.0.108.4p driver release (Rob Evers) [784073] - [scsi] lpfc: Fix FCP EQ memory check init w/single int vector (Rob Evers) [784073] [2.6.18-307.el5] - [s390] crypto: Reset sha2 index after processing partial block (David Howells) [677860] - Revert: [fs] xfs: implement ->dirty_inode to fix timestamp (Eric Sandeen) [653215] [2.6.18-306.el5] - [s390] pfault: ignore leftover completion interrupts (Jarod Wilson) [753194] - [cpufreq] powernow-k8: Fix indexing issue (Frank Arnold) [782773] - [scsi] device_handler: optimize transition retries (Rob Evers) [733635] - [net] qlge: fix size of external list for TX address descriptors (Chad Dupuis) [772696] - [net] igmp: Avoid zero delay when rx'ing odd mix of IGMP queries (Jiri Pirko) [772869] - [net] be2net: create RSS rings even in multi-channel configs (Ivan Vecera) [773114] - [net] ipv6: track device renames in snmp6 (Andy Gospodarek) [758923] - [fs] jbd2: clear BH_Delay & BH_Unwritten in journal_unmap_buffer (Eric Sandeen) [783284] {CVE-2011-4086} - [fs] epoll: workarounds to preserve kernel ABI (Jason Baron) [681692] {CVE-2011-1083} - [fs] epoll: limit paths (Jason Baron) [681692] {CVE-2011-1083} - [fs] epoll: prevent creating circular epoll structures (Jason Baron) [681692] {CVE-2011-1083} - [fs] epoll: add ep_call_nested() (Jason Baron) [681692] {CVE-2011-1083} - [fs] gfs2: additional fix for inode allocation error path (Robert S Peterson) [767377] - [fs] gfs2: Revert clean up fsync changes (Robert S Peterson) [767377] - [fs] ext4: ignore EXT4_INODE_JOURNAL_DATA flag with delalloc (Lukas Czerner) [769386] - [mm] filemap: Make write(2) interruptible by a fatal signal (Lukas Czerner) [740898] - [mm] Make task in balance_dirty_pages killable (Lukas Czerner) [740898] - [fs] ext4: fix the deadlock in mpage_da_map_and_submit (Lukas Czerner) [740898] - [fs] ext4: fix deadlock in ext4_ordered_write_end (Lukas Czerner) [740898] - [fs] ext4: mark multi-page IO complete on mapping failure (Lukas Czerner) [740898] - [fs] ext4: make invalidate pages handle page range properly (Lukas Czerner) [740898] - [fs] ext4: call mpage_da_submit_io from mpage_da_map_blocks (Lukas Czerner) [740898] - [fs] nfsd: Avoid excess stack usage in svc_tcp_recvfrom (J. Bruce Fields) [765751] - [fs] nfsd: Replace two page lists in struct svc_rqst with one (J. Bruce Fields) [765751] [2.6.18-305.el5] - [edac] i5000: don't crash before showing the edac error (Mauro Carvalho Chehab) [713034] - [Documentation] Add pci=noseg to kernel-parameters.txt (Prarit Bhargava) [743168] - [net] ipv6: fix tcp_v6_conn_request (Jiri Benc) [714670] - [redhat] update RHEL_MINOR to 8 for 5.8 release (Jarod Wilson) [773033] - [misc] Move exit_robust_list to mm_release, null lists on cleanup (Laszlo Ersek) [750283] {CVE-2012-0028} - [fs] nfs: Fix an O_DIRECT Oops (Jeff Layton) [754620] {CVE-2011-4325} - [xen] x86: fix a ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'kernel, ocfs2-2.6.18-308.el5, oracleasm-2.6.18-308.el5' package(s) on Oracle Linux 5. Solution: Please install the updated package(s). CVSS Score: 4.9 CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-1083 43522 http://secunia.com/advisories/43522 48115 http://secunia.com/advisories/48115 48410 http://secunia.com/advisories/48410 48898 http://secunia.com/advisories/48898 48964 http://secunia.com/advisories/48964 71265 http://www.osvdb.org/71265 RHSA-2012:0862 http://rhn.redhat.com/errata/RHSA-2012-0862.html SUSE-SU-2012:0554 http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html SUSE-SU-2012:0616 http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html [linux-kernel] 20110225 [PATCH] optimize epoll loop detection http://article.gmane.org/gmane.linux.kernel/1105744 [linux-kernel] 20110226 Re: [PATCH] optimize epoll loop detection http://article.gmane.org/gmane.linux.kernel/1105888 [linux-kernel] 20110228 Re: [PATCH] optimize epoll loop detection http://article.gmane.org/gmane.linux.kernel/1106686 [oss-security] 20110301 CVE request: kernel: Multiple DoS issues in epoll http://openwall.com/lists/oss-security/2011/03/02/1 [oss-security] 20110302 Re: CVE request: kernel: Multiple DoS issues in epoll http://openwall.com/lists/oss-security/2011/03/02/2 https://bugzilla.redhat.com/show_bug.cgi?id=681578 |
Copyright | Copyright (C) 2015 Greenbone AG |
Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |