![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.122442 |
Kategorie: | Oracle Linux Local Security Checks |
Titel: | Oracle: Security Advisory (ELSA-2009-1337) |
Zusammenfassung: | The remote host is missing an update for the 'gfs2-utils' package(s) announced via the ELSA-2009-1337 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'gfs2-utils' package(s) announced via the ELSA-2009-1337 advisory. Vulnerability Insight: [0.1.62-1] - Fix man page references to fsck.gfs2. - Resolves: rhbz#477072 [0.1.61-1] - fsck.gfs2 no longer segfaults when fixing 'EA leaf block type' problems. - Resolves: rhbz#510758 [0.1.60-1] - When '/' is a gfs2 file system it is now properly mounted without an error. - Resolves: rhbz#507893 [0.1.59-1] - gfs_convert -vy now works properly on a ppc system. - Resolves: rhbz#506629 [0.1.58-1] - Fixed an issue with the gfs2_edit savemeta function not saving blocks of type 2. - Resolves: rhbz#502056 [0.1.57-1] - A gfs filesystems metadata is now properly copied with 'gfs2_edit savemeta' - Resolves: rhbz#501732 [0.1.56-1] - gfs2_fsck now properly fixes journal sequence numbers - The debugfs mount point has been randomized to prevent symlink attacks - Resolves: rhbz#498646 rhbz#498950 [0.1.55-1] - gfs2_convert now properly frees blocks when removing a file with a height greater than 1 - Updated man pages - Added options to gfs2_tool df to provide more human readable output - GFS2 utilities now use and provide filesystem UUID - gfs2_fsck now uses the proper return codes - gfs2_edit has been updated - gfs2_tool df no longer segfaults on a non-4k block size - gfs2_grow no longer references the '-r' option - gfs2_convert no longer causes filesystem corruption - gfs2_edit has been improved to help differentiate between zero-data and non-zero data from pointers - gfs2_edit now properly saves the per-node quota files - A segfault in gfs2_fsck as been fixed - Resolves: rhbz#474707 rhbz#477072 rhbz#480833 rhbz#242701 rhbz#474705 rhbz#483799 rhbz#485761 rhbz#486034 rhbz#490136 rhbz#483799 rhbz#496330 Affected Software/OS: 'gfs2-utils' package(s) on Oracle Linux 5. Solution: Please install the updated package(s). CVSS Score: 6.9 CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2008-6552 BugTraq ID: 32179 http://www.securityfocus.com/bid/32179 http://www.redhat.com/archives/fedora-package-announce/2008-November/msg00163.html http://www.redhat.com/archives/fedora-package-announce/2008-November/msg00164.html http://www.redhat.com/archives/fedora-package-announce/2008-November/msg00165.html http://osvdb.org/50299 http://osvdb.org/50300 http://osvdb.org/50301 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11404 RedHat Security Advisories: RHSA-2009:1337 http://rhn.redhat.com/errata/RHSA-2009-1337.html http://www.redhat.com/support/errata/RHSA-2009-1339.html http://www.redhat.com/support/errata/RHSA-2009-1341.html http://www.redhat.com/support/errata/RHSA-2011-0264.html http://www.redhat.com/support/errata/RHSA-2011-0265.html http://secunia.com/advisories/32602 http://secunia.com/advisories/32616 http://secunia.com/advisories/36530 http://secunia.com/advisories/36555 http://secunia.com/advisories/43367 http://secunia.com/advisories/43372 http://www.ubuntu.com/usn/USN-875-1 http://www.vupen.com/english/advisories/2011/0416 http://www.vupen.com/english/advisories/2011/0417 XForce ISS Database: clusterproject-unspecified-priv-escalation(46412) https://exchange.xforce.ibmcloud.com/vulnerabilities/46412 |
Copyright | Copyright (C) 2015 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |