Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.122593
Kategorie:Oracle Linux Local Security Checks
Titel:Oracle: Security Advisory (ELSA-2008-0233)
Zusammenfassung:The remote host is missing an update for the 'kernel, ocfs2-2.6.18-53.1.19.0.1.el5, oracleasm-2.6.18-53.1.19.0.1.el5' package(s) announced via the ELSA-2008-0233 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'kernel, ocfs2-2.6.18-53.1.19.0.1.el5, oracleasm-2.6.18-53.1.19.0.1.el5' package(s) announced via the ELSA-2008-0233 advisory.

Vulnerability Insight:
[2.6.18-53.1.19.0.1.el5]
- [NET] Add entropy support to e1000 and bnx2 (John Sobecki) [ORA 6045759]
- [NET] Fix msi issue with kexec/kdump (Michael Chan) [ORA 6219364]
- [MM] Fix alloc_pages_node() static nid' race made kernel crash (Joe Jin) [ORA 6187457]
- [splice] Fix bad unlock_page() in error case (Jens Axboe) [ORA 6263574]
- [dio] fix error-path crashes (Linux Torvalds) [ORA 6242289]

[2.6.18-53.1.19.el5]
- [xen] check num of segments in block backend driver (Bill Burns ) [378281]
- [x86_64] update IO-APIC dest field to 8-bit for xAPIC (Dave Anderson ) [442922]
- Update: [fs] fix race condition in dnotify (Alexander Viro ) [439758] {CVE-2008-1375}
- Update: [xen] ia64: ftp stress test fixes between HVM/Dom0 (Tetsu Yamamoto ) [427400] {CVE-2008-1619}

[2.6.18-53.1.18.el5]
- Update: [fs] fix race condition in dnotify (Alexander Viro ) [439758] {CVE-2008-1375}

[2.6.18-53.1.17.el5]
- [fs] fix race condition in dnotify (Alexander Viro ) [439758] {CVE-2008-1375}
- [pci] hotplug: PCI Express problems with bad DLLPs (Kei Tokunaga ) [440438]
- [nfs] stop sillyrenames and unmounts from racing (Steve Dickson ) [440447]
- [x86] clear df flag for signal handlers (Jason Baron ) [437316] {CVE-2008-1367}
- [xen] ia64: ftp stress test fixes between HVM/Dom0 (Tetsu Yamamoto ) [427400] {CVE-2008-1619}
- [xen] ia64: fix ssm_i emulation barrier and vdso pv (Tetsu Yamamoto ) [427400] {CVE-2008-1619}

[2.6.18-53.1.16.el5]
- [misc] fix range check in fault handlers with mremap (Vitaly Mayatskikh ) [428970]
- [video] neofb: avoid overwriting fb_info fields (Anton Arapov ) [430253]

[2.6.18-53.1.15.el5]
- [libata] sata_nv: un-blacklist hitachi drives (David Milburn ) [433617]
- [libata] sata_nv: may send cmds with duplicate tags (David Milburn ) [433617]
- [s390] qdio: output queue stall on FCP and net devs (Hans-Joachim Picht ) [412071]
- [xen] ia64: guest has bad network performance (Tetsu Yamamoto ) [433616]

Affected Software/OS:
'kernel, ocfs2-2.6.18-53.1.19.0.1.el5, oracleasm-2.6.18-53.1.19.0.1.el5' package(s) on Oracle Linux 5.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2007-5498
29082
http://www.securityfocus.com/bid/29082
30116
http://secunia.com/advisories/30116
32918
http://secunia.com/advisories/32918
RHSA-2008:0233
http://www.redhat.com/support/errata/RHSA-2008-0233.html
USN-679-1
http://www.ubuntu.com/usn/usn-679-1
https://bugzilla.redhat.com/show_bug.cgi?id=369531
linux-kernel-xen-hypervisor-dos(42274)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42274
oval:org.mitre.oval:def:9452
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9452
Common Vulnerability Exposure (CVE) ID: CVE-2008-0007
1019357
http://securitytracker.com/id?1019357
20080208 rPSA-2008-0048-1 kernel
http://www.securityfocus.com/archive/1/487808/100/0/threaded
27686
http://www.securityfocus.com/bid/27686
27705
http://www.securityfocus.com/bid/27705
28806
http://secunia.com/advisories/28806
28826
http://secunia.com/advisories/28826
29058
http://secunia.com/advisories/29058
29570
http://secunia.com/advisories/29570
30018
http://secunia.com/advisories/30018
30110
http://secunia.com/advisories/30110
30112
http://secunia.com/advisories/30112
30769
http://secunia.com/advisories/30769
31246
http://secunia.com/advisories/31246
33280
http://secunia.com/advisories/33280
ADV-2008-0445
http://www.vupen.com/english/advisories/2008/0445/references
ADV-2008-2222
http://www.vupen.com/english/advisories/2008/2222/references
DSA-1503
http://www.debian.org/security/2008/dsa-1503
DSA-1504
http://www.debian.org/security/2008/dsa-1504
DSA-1565
http://www.debian.org/security/2008/dsa-1565
MDVSA-2008:044
http://www.mandriva.com/security/advisories?name=MDVSA-2008:044
MDVSA-2008:072
http://www.mandriva.com/security/advisories?name=MDVSA-2008:072
MDVSA-2008:112
http://www.mandriva.com/security/advisories?name=MDVSA-2008:112
MDVSA-2008:174
http://www.mandriva.com/security/advisories?name=MDVSA-2008:174
RHSA-2008:0211
http://www.redhat.com/support/errata/RHSA-2008-0211.html
RHSA-2008:0237
http://www.redhat.com/support/errata/RHSA-2008-0237.html
RHSA-2008:0787
http://www.redhat.com/support/errata/RHSA-2008-0787.html
SUSE-SA:2008:006
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html
SUSE-SA:2008:017
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00007.html
USN-618-1
http://www.ubuntu.com/usn/usn-618-1
[Security-announce] 20080728 VMSA-2008-00011 Updated ESX service console packages for Samba and vmnix
http://lists.vmware.com/pipermail/security-announce/2008/000023.html
[linux-kernel] 20080206 [patch 60/73] vm audit: add VM_DONTEXPAND to mmap for drivers that need it (CVE-2008-0007)
http://lkml.org/lkml/2008/2/6/457
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0048
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.17
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.1
oval:org.mitre.oval:def:9412
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9412
Common Vulnerability Exposure (CVE) ID: CVE-2008-1367
BugTraq ID: 29084
http://www.securityfocus.com/bid/29084
http://lwn.net/Articles/272048/#Comments
http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00428.html
http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00432.html
http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00417.html
http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00499.html
http://marc.info/?l=git-commits-head&m=120492000901739&w=2
http://lkml.org/lkml/2008/3/5/207
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11108
RedHat Security Advisories: RHSA-2008:0508
http://rhn.redhat.com/errata/RHSA-2008-0508.html
http://secunia.com/advisories/30818
http://secunia.com/advisories/30850
http://secunia.com/advisories/30890
http://secunia.com/advisories/30962
SuSE Security Announcement: SUSE-SA:2008:030 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
SuSE Security Announcement: SUSE-SA:2008:031 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00000.html
SuSE Security Announcement: SUSE-SA:2008:032 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html
XForce ISS Database: gcc-cld-dos(41340)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41340
Common Vulnerability Exposure (CVE) ID: CVE-2008-1375
1019959
http://www.securitytracker.com/id?1019959
20080502 rPSA-2008-0157-1 kernel
http://www.securityfocus.com/archive/1/491566/100/0/threaded
20080507 rPSA-2008-0157-1 kernel
http://www.securityfocus.com/archive/1/491732/100/0/threaded
29003
http://www.securityfocus.com/bid/29003
30017
http://secunia.com/advisories/30017
30044
http://secunia.com/advisories/30044
30108
http://secunia.com/advisories/30108
30260
http://secunia.com/advisories/30260
30515
http://secunia.com/advisories/30515
30818
30890
30962
ADV-2008-1406
http://www.vupen.com/english/advisories/2008/1406/references
ADV-2008-1452
http://www.vupen.com/english/advisories/2008/1452/references
FEDORA-2008-3873
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00232.html
MDVSA-2008:104
http://www.mandriva.com/security/advisories?name=MDVSA-2008:104
MDVSA-2008:105
http://www.mandriva.com/security/advisories?name=MDVSA-2008:105
MDVSA-2008:167
http://www.mandriva.com/security/advisories?name=MDVSA-2008:167
SUSE-SA:2008:030
SUSE-SA:2008:031
SUSE-SA:2008:032
USN-614-1
https://usn.ubuntu.com/614-1/
[linux-kernel] 20080501 Linux 2.6.24.6
http://marc.info/?l=linux-kernel&m=120967963803205&w=2
[linux-kernel] 20080501 Linux 2.6.25.1
http://marc.info/?l=linux-kernel&m=120967964303224&w=2
http://wiki.rpath.com/Advisories:rPSA-2008-0157
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0157
http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.4
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.6
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.1
https://issues.rpath.com/browse/RPL-2501
linux-kernel-dnotify-privilege-escalation(42131)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42131
oval:org.mitre.oval:def:11843
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11843
Common Vulnerability Exposure (CVE) ID: CVE-2008-1619
BugTraq ID: 29085
http://www.securityfocus.com/bid/29085
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10226
XForce ISS Database: xen-ssmiemulation-dos(41633)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41633
Common Vulnerability Exposure (CVE) ID: CVE-2008-1669
1019974
http://www.securitytracker.com/id?1019974
20080507 rPSA-2008-0162-1 kernel
http://www.securityfocus.com/archive/1/491740/100/0/threaded
29076
http://www.securityfocus.com/bid/29076
30077
http://secunia.com/advisories/30077
30101
http://secunia.com/advisories/30101
30164
http://secunia.com/advisories/30164
30252
http://secunia.com/advisories/30252
30276
http://secunia.com/advisories/30276
30982
http://secunia.com/advisories/30982
ADV-2008-1451
http://www.vupen.com/english/advisories/2008/1451/references
DSA-1575
http://www.debian.org/security/2008/dsa-1575
FEDORA-2008-3949
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00294.html
FEDORA-2008-4043
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00357.html
SUSE-SA:2008:035
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html
SUSE-SA:2008:038
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0162
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.2
https://issues.rpath.com/browse/RPL-2518
linux-kernel-fcntlsetlk-dos(42242)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42242
oval:org.mitre.oval:def:10065
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10065
CopyrightCopyright (C) 2015 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.