Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.123793
Category:Oracle Linux Local Security Checks
Title:Oracle: Security Advisory (ELSA-2012-2038)
Summary:The remote host is missing an update for the 'kernel-uek, mlnx_en-2.6.32-300.37.1.el5uek, mlnx_en-2.6.32-300.37.1.el6uek, ofa-2.6.32-300.37.1.el5uek, ofa-2.6.32-300.37.1.el6uek' package(s) announced via the ELSA-2012-2038 advisory.
Description:Summary:
The remote host is missing an update for the 'kernel-uek, mlnx_en-2.6.32-300.37.1.el5uek, mlnx_en-2.6.32-300.37.1.el6uek, ofa-2.6.32-300.37.1.el5uek, ofa-2.6.32-300.37.1.el6uek' package(s) announced via the ELSA-2012-2038 advisory.

Vulnerability Insight:
[2.6.32-300.37.1.]
- sfc: Replace some literal constants with EFX_PAGE_SIZE/EFX_BUF_SIZE (Ben Hutchings) [Orabug: 14769994]
- CVE-2012-3412 sfc: Fix maximum number of TSO segments and minimum TX queue size (Ben Hutchings) [Orabug: 14769994] {CVE-2012-3412}

[2.6.32-300.36.1.]
- dl2k: Clean up rio_ioctl (Stephan Mueller) [Orabug: 14675306] {CVE-2012-2313}
- hugetlb: fix resv_map leak in error path (Christoph Lameter) [Orabug: 14676403] {CVE-2012-2390}
- rds: set correct msg_namelen (Jay Fenlason) [Orabug: 14676504] {CVE-2012-3430}

[2.6.32-300.35.1.]
- oracleasm: Bring driver in sync with UEK2 (Martin K. Petersen)
- Fix system hang due to bad protection module parameters (CR 130769) (Martin
K. Petersen)
- sd: Avoid remapping bad reference tags (Martin K. Petersen)
- block: Fix bad range check in bio_sector_offset (Martin K. Petersen)

[2.6.32-300.34.1.]
- htrimer: fix kabi breakage (Joe Jin)
- 2.6.32.x: timekeeping: Add missing update call in timekeeping_resume()
(Thomas Gleixner)
- 2.6.32.x: hrtimer: Update hrtimer base offsets each hrtimer_interrupt (John
Stultz)
- 2.6.32.x: timekeeping: Provide hrtimer update function (Thomas Gleixner)
- 2.6.32.x: hrtimers: Move lock held region in hrtimer_interrupt() (Thomas
Gleixner)
- 2.6.32.x: timekeeping: Maintain ktime_t based offsets for hrtimers (Thomas
Gleixner)
- 2.6.32.x: timekeeping: Fix leapsecond triggered load spike issue (John
Stultz)
- 2.6.32.x: hrtimer: Provide clock_was_set_delayed() (John Stultz)
- 2.6.32.x: time: Move common updates to a function (Thomas Gleixner)
- 2.6.32.x: timekeeping: Fix CLOCK_MONOTONIC inconsistency during leapsecond
(John Stultz)
- 2.6.32.x: ntp: Correct TAI offset during leap second (Richard Cochran)
- 2.6.32.x: ntp: Fix leap-second hrtimer livelock (John Stultz)
- Revert '2.6.32.x: hrtimer: Fix clock_was_set so it is safe to call from irq
context' (Joe Jin)
- Revert '2.6.32.x: time: Fix leapsecond triggered hrtimer/futex load spike
issue' (Joe Jin)
- Revert '2.6.32.x: hrtimer: Update hrtimer base offsets each
hrtimer_interrupt' (Joe Jin)

[2.6.32-300.33.1.]
- mpt2sas: Update mpt2sas to 120.105.11.00 (Guru Anbalagane) [Orabug: 14376481]
- Revert 'mpt2sas: update to 12.105.11.00' (Maxim Uvarov)

Affected Software/OS:
'kernel-uek, mlnx_en-2.6.32-300.37.1.el5uek, mlnx_en-2.6.32-300.37.1.el6uek, ofa-2.6.32-300.37.1.el5uek, ofa-2.6.32-300.37.1.el6uek' package(s) on Oracle Linux 5, Oracle Linux 6.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2012-3412
50633
http://secunia.com/advisories/50633
50732
http://secunia.com/advisories/50732
50811
http://secunia.com/advisories/50811
51193
http://secunia.com/advisories/51193
RHSA-2012:1323
http://rhn.redhat.com/errata/RHSA-2012-1323.html
RHSA-2012:1324
http://rhn.redhat.com/errata/RHSA-2012-1324.html
RHSA-2012:1347
http://rhn.redhat.com/errata/RHSA-2012-1347.html
RHSA-2012:1375
http://rhn.redhat.com/errata/RHSA-2012-1375.html
RHSA-2012:1401
http://rhn.redhat.com/errata/RHSA-2012-1401.html
RHSA-2012:1430
http://rhn.redhat.com/errata/RHSA-2012-1430.html
SUSE-SU-2012:1679
https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html
USN-1567-1
http://www.ubuntu.com/usn/USN-1567-1
USN-1568-1
http://www.ubuntu.com/usn/USN-1568-1
USN-1572-1
http://www.ubuntu.com/usn/USN-1572-1
USN-1575-1
http://www.ubuntu.com/usn/USN-1575-1
USN-1577-1
http://www.ubuntu.com/usn/USN-1577-1
USN-1578-1
http://www.ubuntu.com/usn/USN-1578-1
USN-1579-1
http://www.ubuntu.com/usn/USN-1579-1
USN-1580-1
http://www.ubuntu.com/usn/USN-1580-1
[oss-security] 20120803 Remote DoS in Linux sfc driver through TCP MSS option (CVE-2012-3412)
http://www.openwall.com/lists/oss-security/2012/08/03/4
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.30
https://bugzilla.redhat.com/show_bug.cgi?id=844714
https://github.com/torvalds/linux/commit/68cb695ccecf949d48949e72f8ce591fdaaa325c
openSUSE-SU-2012:1330
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00005.html
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.