Description: | Summary: The remote host is missing an update for the 'kernel-uek, mlnx_en-2.6.32-300.7.1.el6uek, ofa-2.6.32-300.7.1.el5uek, ofa-2.6.32-300.7.1.el6uek' package(s) announced via the ELSA-2012-2001 advisory.
Vulnerability Insight: [2.6.32-300.7.1.el6uek] - Revert 'proc: enable writing to /proc/pid/mem' [orabug 13619701] {CVE-2012-0056} - [PATCH] x86, tsc: Skip TSC synchronization checks for tsc=reliable (Suresh Siddha)
[2.6.32-300.6.1.el6uek] - tracing: Fix null pointer deref with SEND_SIG_FORCED (Oleg Nesterov) [orabug 13611655]
[2.6.32-300.5.1.el6uek] - sched, x86: Avoid unnecessary overflow in sched_clock (Salman Qazi) [orabug 13604567] - [x86]: Don't resume/restore cpu if not of the expected cpu (Joe Jin) [orabug 13492670] - drm/i915: Rephrase pwrite bounds checking to avoid any potential overflow (Chris Wilson) [CVE-2010-296] - x2apic: Enable the bios request for x2apic optout (Suresh Siddha) [orabug 13565303] - fuse: split queues to scale I/O throughput (Srinivas Eeda) [orabug 10004611] - fuse: break fc spinlock (Srinivas Eeda) [orabug 10004611]
Affected Software/OS: 'kernel-uek, mlnx_en-2.6.32-300.7.1.el6uek, ofa-2.6.32-300.7.1.el5uek, ofa-2.6.32-300.7.1.el6uek' package(s) on Oracle Linux 5, Oracle Linux 6.
Solution: Please install the updated package(s).
CVSS Score: 7.2
CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
|