![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.122091 |
Kategorie: | Oracle Linux Local Security Checks |
Titel: | Oracle: Security Advisory (ELSA-2011-1212) |
Zusammenfassung: | The remote host is missing an update for the 'kernel, ocfs2-2.6.18-274.3.1.0.1.el5, oracleasm-2.6.18-274.3.1.0.1.el5' package(s) announced via the ELSA-2011-1212 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'kernel, ocfs2-2.6.18-274.3.1.0.1.el5, oracleasm-2.6.18-274.3.1.0.1.el5' package(s) announced via the ELSA-2011-1212 advisory. Vulnerability Insight: [2.6.18-274.3.1.0.1.el5] - [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646] - [scsi] fix scsi hotplug and rescan race [orabug 10260172] - fix filp_close() race (Joe Jin) [orabug 10335998] - fix missing aio_complete() in end_io (Joel Becker) [orabug 10365195] - make xenkbd.abs_pointer=1 by default [orabug 67188919] - [xen] check to see if hypervisor supports memory reservation change (Chuck Anderson) [orabug 7556514] - [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki) [orabug 10315433] - [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258] - [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839] - fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042] - [rds] Patch rds to 1.4.2-20 (Andy Grover) [orabug 9471572, 9344105] RDS: Fix BUG_ONs to not fire when in a tasklet ipoib: Fix lockup of the tx queue RDS: Do not call set_page_dirty() with irqs off (Sherman Pun) RDS: Properly unmap when getting a remote access error (Tina Yang) RDS: Fix locking in rds_send_drop_to() - [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson) [orabug 9107465] - [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson) [orabug 9764220] - Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615] - fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro, Guru Anbalagane) [orabug 6124033] - [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208] - [ib] fix memory corruption (Andy Grover) [orabug 9972346] - [aio] patch removes limit on number of retries (Srinivas Eeda) [orabug 10044782] - [loop] Do not call loop_unplug for not configured loop device (orabug 10314497) [2.6.18-274.3.1.el5] - [xen] fix off-by-one shift in x86_64 __addr_ok (Laszlo Ersek) [728043 719850] {CVE-2011-2901} [2.6.18-274.2.1.el5] - Fix up some fallout from RHEL5.7 kernel package structure changes [2.6.18-274.1.1.el5] - [net] sctp: fix memory reclaim and panic in sctp_sock_rfree (Thomas Graf) [714869 714867] - [x86_64] Revert ACPI APIC mode test (Prarit Bhargava) [728163 721361] - [net] sctp: reset packet information after packet transmit (Thomas Graf) [727592 725573] - [fs] block: initialise bd_super in bdget (Lachlan McIlroy) [726628 707425] - [fs] nfs: Remove bogus call to nfs4_drop_state_owner (Jeff Layton) [726625 724923] - [net] be2net: clear interrupt bit in be_probe (Ivan Vecera) [723552 713703] - [net] be2net: remove certain cmd failure logging (Ivan Vecera) [726619 716821] - [wireless] nl80211: check for valid SSID size in scan operation (Stanislaw Gruszka) [718154 718155] {CVE-2011-2517} - [fs] xfs: handle NULL mount struct in error reports (Eric Sandeen) [727835 720551] - [fs] proc: restrict access to /proc/PID/io (Oleg Nesterov) [716827 716828] {CVE-2011-2495} - [fs] lockd: don't use file's credentials on RPCSEC_GSS mounts (Max ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'kernel, ocfs2-2.6.18-274.3.1.0.1.el5, oracleasm-2.6.18-274.3.1.0.1.el5' package(s) on Oracle Linux 5. Solution: Please install the updated package(s). CVSS Score: 7.8 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-2482 RHSA-2011:1212 http://rhn.redhat.com/errata/RHSA-2011-1212.html [oss-security] 20110830 kernel: CVE-2011-2482/2519 http://www.openwall.com/lists/oss-security/2011/08/30/1 http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea2bc483ff5caada7c4aa0d5fbf87d3a6590273d https://bugzilla.redhat.com/show_bug.cgi?id=714867 https://github.com/torvalds/linux/commit/ea2bc483ff5caada7c4aa0d5fbf87d3a6590273d Common Vulnerability Exposure (CVE) ID: CVE-2011-2491 [oss-security] 20110623 Re: CVE request: kernel: NLM: Don't hang forever on NLM unlock requests http://www.openwall.com/lists/oss-security/2011/06/23/6 http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0b760113a3a155269a3fba93a409c640031dd68f https://bugzilla.redhat.com/show_bug.cgi?id=709393 https://github.com/torvalds/linux/commit/0b760113a3a155269a3fba93a409c640031dd68f Common Vulnerability Exposure (CVE) ID: CVE-2011-2495 [oss-security] 20110627 Re: CVE request: kernel: taskstats/procfs io infoleak http://www.openwall.com/lists/oss-security/2011/06/27/1 http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39.4 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1d1221f375c94ef961ba8574ac4f85c8870ddd51 https://bugzilla.redhat.com/show_bug.cgi?id=716825 https://github.com/torvalds/linux/commit/1d1221f375c94ef961ba8574ac4f85c8870ddd51 Common Vulnerability Exposure (CVE) ID: CVE-2011-2517 [oss-security] 20110701 Re: CVE request: kernel: nl80211: missing check for valid SSID size in scan operations http://www.openwall.com/lists/oss-security/2011/07/01/4 http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39.2 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=208c72f4fe44fe09577e7975ba0e7fa0278f3d03 https://bugzilla.redhat.com/show_bug.cgi?id=718152 https://github.com/torvalds/linux/commit/208c72f4fe44fe09577e7975ba0e7fa0278f3d03 Common Vulnerability Exposure (CVE) ID: CVE-2011-2519 [oss-security] 20130830 kernel: CVE-2011-2482/2519 http://xenbits.xen.org/hg/xen-3.1-testing.hg/rev/15644 https://bugzilla.redhat.com/show_bug.cgi?id=718882 Common Vulnerability Exposure (CVE) ID: CVE-2011-2901 55082 http://secunia.com/advisories/55082 GLSA-201309-24 http://security.gentoo.org/glsa/glsa-201309-24.xml [oss-security] 20110902 Xen Security Advisory 4 (CVE-2011-2901) - Xen 3.3 vaddr validation http://www.openwall.com/lists/oss-security/2011/09/02/2 https://bugzilla.redhat.com/show_bug.cgi?id=728042 |
Copyright | Copyright (C) 2015 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |