Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.123976
Kategorie:Oracle Linux Local Security Checks
Titel:Oracle: Security Advisory (ELSA-2012-0152)
Zusammenfassung:The remote host is missing an update for the 'kexec-tools' package(s) announced via the ELSA-2012-0152 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'kexec-tools' package(s) announced via the ELSA-2012-0152 advisory.

Vulnerability Insight:
[1.102pre-154.0.3]
- mkdumprd.orig get packed, remove it.

[1.102pre-154.0.2]
- fix mounting root fs on labeled disk (Maxim Uvarov) [orabug: 13709374]

[1.102pre-154.0.1]
Merge following patches from mkinitrd:
- mkinitrd-fix-san-boot.patch
- mkinitrd-fix-shared-lib-library-path.patch
- mkinitrd-5.1.19.6-libfirmware-subdir-include.patch
- mkinitrd-fix-setquiet-for-non-verbose.patch
- add-option-to-forceload-multipath.patch
- Update kexec-kdump-howto.txt with Oracle references
- Add mkdumprd load firmware support [orabug 10432768]
- Updated makedumpfile to el6 version (Herbert van den Bergh) [orabug 10088607]
- Merged UEK modification,Updated Source1 kdump.init
Added --allow-missing for rebuilding kdump_initrd
- Updated kexec-kdump-howto.txt with Oracle references

[1.102pre-154]
- Add xfs support, resolve bug 668706.

[1.102pre-153]
- Avoid recursive directory deletion when unmount failed, from Cai Qian.
Resolve bug 781907.

[1.102pre-152]
- Replace sed with awk in interface-mapping code,
resolve bug 765702.

[1.102pre-151]
- Set pipefail to catch errors in a pipe, resolve bug 761336.

[1.102pre-150]
- Remove the restriction for Xen HVM guests, resolve bug 743217.

[1.102pre-149]
- Honor the resettable flag, resolve bug 761048.

[1.102pre-148]
- Revert the patch in -144, resolve bug 755781. From Cai Qian.

[1.102pre-147]
- Poll every ifcfg file to get bridge members, resolve bug 760844.

[1.102pre-146]
- Don't add default gateway when there is none. Resolve bug 759006.

[1.102pre-145]
- Bypass blacklist option for target checking. Resolve bug 690678.

[1.102pre-144]
- Change the default core_collector for raw dump to makedumpfile.
Resolve bug 755781.

[1.102pre-143]
- Support static route. Resolve bug 715531.

[1.102pre-142]
- Fix some security flaws. Resolve bug 743163.

[1.102pre-141]
- Remove two unused patches.

[1.102pre-140]
- Fix link_delay regression since -135, resolve bug 753684.

[1.102pre-139]
- Improve debugfs mounting code, from Dave Young. Resolve bug 748749.

[1.102pre-138]
- Backport blacklist option. Resolve bug 690678.

[1.102pre-137]
- Fix link_delay handling code. Resolve bug 682359.

[1.102pre-136]
- Add /etc/fstab into initrd, resolve Bug 748319.

[1.102pre-135]
- Support dump over vlan tagged bond. Resolve bug 682359.

[1.102pre-134]
- Fix two trivial bugs, Bug 709622 and Bug 662530.

[1.102pre-133]
- Support software iscsi as dump target, from Vivek Goyal.
Resolve bug 719384.

[1.102pre-132]
- Add the missing part of the previous patch. Resolve bug 696547.

[1.102pre-131]
- Get the backup memory region dynamically. Resolve bug 678308.

[1.102pre-130]
- Add ext4 module. Resolve bug 667791.

[1.102pre-129]
- Updating release to force brew rebuild

[1.102pre-128]
- Check fsck.ext4 binary before include it. Resolve bug 667791.

[1.102pre-127]
- Add ext4 support, from Dave Maley. Resolve bug 667791.

Affected Software/OS:
'kexec-tools' package(s) on Oracle Linux 5.

Solution:
Please install the updated package(s).

CVSS Score:
5.7

CVSS Vector:
AV:A/AC:M/Au:N/C:C/I:N/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2011-3588
RHSA-2011:1532
http://rhn.redhat.com/errata/RHSA-2011-1532.html
RHSA-2012:0152
http://rhn.redhat.com/errata/RHSA-2012-0152.html
https://bugzilla.redhat.com/show_bug.cgi?id=716439
Common Vulnerability Exposure (CVE) ID: CVE-2011-3589
Common Vulnerability Exposure (CVE) ID: CVE-2011-3590
CopyrightCopyright (C) 2015 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.