Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.122298
Category:Oracle Linux Local Security Checks
Title:Oracle: Security Advisory (ELSA-2010-0839)
Summary:The remote host is missing an update for the 'kernel, ocfs2-2.6.18-194.26.1.0.1.el5, oracleasm-2.6.18-194.26.1.0.1.el5' package(s) announced via the ELSA-2010-0839 advisory.
Description:Summary:
The remote host is missing an update for the 'kernel, ocfs2-2.6.18-194.26.1.0.1.el5, oracleasm-2.6.18-194.26.1.0.1.el5' package(s) announced via the ELSA-2010-0839 advisory.

Vulnerability Insight:
[2.6.18-194.26.1.0.1.el5]
- [xen] check to see if hypervisor supports memory reservation change
(Chuck Anderson) [orabug 7556514]
- Add entropy support to igb (John Sobecki) [orabug 7607479]
- [nfs] convert ENETUNREACH to ENOTCONN [orabug 7689332]
- [NET] Add xen pv/bonding netconsole support (Tina Yang) [orabug 6993043]
[bz 7258]
- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]
- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]
- [nfsd] fix failure of file creation from hpux client (Wen gang Wang)
[orabug 7579314]
- [qla] fix qla not to query hccr (Guru Anbalagane) [Orabug 8746702]
- [net] bonding: fix xen+bonding+netconsole panic issue (Joe Jin)
[orabug 9504524]
- [rds] Patch rds to 1.4.2-14 (Andy Grover) [orabug 9471572, 9344105]
RDS: Fix BUG_ONs to not fire when in a tasklet
ipoib: Fix lockup of the tx queue
RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)
RDS: Properly unmap when getting a remote access error (Tina Yang)
RDS: Fix locking in rds_send_drop_to()
- [mm] Enhance shrink_zone patch allow full swap utilization, and also be
NUMA-aware (John Sobecki, Chris Mason, Herbert van den Bergh)
[orabug 9245919]
- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)
[orabug 9107465]
- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)
[orabug 9764220]
- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]
- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,
Guru Anbalagane) [orabug 6124033]
- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]
- [ib] fix memory corruption (Andy Grover) [orabug 9972346]

[2.6.18-194.26.1.el5]
- [net] mlx4: bump max log_mtts_per_seg memory reservation (Jay Fenlason) [643806 636198]

[2.6.18-194.25.1.el5]
- [fs] nfs: fix regression in NFS Direct I/O path (Steve Dickson) [647601 647297]

[2.6.18-194.24.1.el5]
- Changelog fix

[2.6.18-194.23.1.el5]
- [net] bonding: correctly process non-linear skbs (Andy Gospodarek) [644822 619070]
- Syncing following patch from branched build:
- [net] rds: fix local privilege escalation (Eugene Teo) [642897 642898] {CVE-2010-3904}

[2.6.18-194.22.1.el5]
- [fs] xfs: fix speculative allocation beyond eof (Dave Chinner) [643571 638753]

[2.6.18-194.21.1.el5]
- [scsi] qla2xxx: Correct use-after-free issue in terminate_rport_io callback
(Chad Dupuis) [643135 567428]
- [misc] futex: replace LOCK_PREFIX in futex.h (Peter Zijlstra) [633175 633176]
{CVE-2010-3086}
- [v4l] remove compat code for VIDIOCSMICROCODE (Mauro Carvalho Chehab) [642470
642471] {CVE-2010-2963}
- [xen] hvm: correct accuracy of pmtimer (Andrew Jones) [641915 633028]
- [net] bonding: fix IGMP report on slave during failover (Flavio Leitner) [640973
637764]
- [fs] nfsv4: fix bug when server returns NFS4ERR_RESOURCE (Steve Dickson) [628889
620502]
- [fs] nfsv4: ensure lockowners are labelled ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'kernel, ocfs2-2.6.18-194.26.1.0.1.el5, oracleasm-2.6.18-194.26.1.0.1.el5' package(s) on Oracle Linux 5.

Solution:
Please install the updated package(s).

CVSS Score:
4.9

CVSS Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-3066
1024708
http://securitytracker.com/id?1024708
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
http://www.securityfocus.com/archive/1/520102/100/0/threaded
46397
http://secunia.com/advisories/46397
RHSA-2010:0839
http://www.redhat.com/support/errata/RHSA-2010-0839.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87e2831c3fa39cbf6f7ab676bb5aef039b9659e2
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23
http://www.vmware.com/security/advisories/VMSA-2011-0012.html
https://bugzilla.redhat.com/show_bug.cgi?id=631716
Common Vulnerability Exposure (CVE) ID: CVE-2010-3067
42778
http://secunia.com/advisories/42778
42801
http://secunia.com/advisories/42801
42890
http://secunia.com/advisories/42890
43291
http://secunia.com/advisories/43291
ADV-2011-0012
http://www.vupen.com/english/advisories/2011/0012
ADV-2011-0298
http://www.vupen.com/english/advisories/2011/0298
ADV-2011-0375
http://www.vupen.com/english/advisories/2011/0375
DSA-2126
http://www.debian.org/security/2010/dsa-2126
MDVSA-2010:257
http://www.mandriva.com/security/advisories?name=MDVSA-2010:257
MDVSA-2011:029
http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
MDVSA-2011:051
http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
RHSA-2010:0758
http://www.redhat.com/support/errata/RHSA-2010-0758.html
RHSA-2010:0779
http://www.redhat.com/support/errata/RHSA-2010-0779.html
RHSA-2011:0007
http://www.redhat.com/support/errata/RHSA-2011-0007.html
SUSE-SA:2010:060
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
SUSE-SA:2011:001
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
SUSE-SA:2011:002
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
SUSE-SA:2011:007
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
SUSE-SA:2011:008
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
USN-1000-1
http://www.ubuntu.com/usn/USN-1000-1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478
http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2
https://bugzilla.redhat.com/show_bug.cgi?id=629441
kernel-doiosubmit-dos(61884)
https://exchange.xforce.ibmcloud.com/vulnerabilities/61884
Common Vulnerability Exposure (CVE) ID: CVE-2010-3078
1024418
http://securitytracker.com/id?1024418
41284
http://secunia.com/advisories/41284
41512
http://secunia.com/advisories/41512
43022
http://www.securityfocus.com/bid/43022
ADV-2010-2430
http://www.vupen.com/english/advisories/2010/2430
SUSE-SA:2010:041
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html
SUSE-SA:2010:050
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html
SUSE-SA:2010:054
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html
[oss-security] 20100907 CVE request: kernel: xfs: XFS_IOC_FSGETXATTR ioctl memory leak
http://www.openwall.com/lists/oss-security/2010/09/07/1
[oss-security] 20100907 Re: CVE request: kernel: xfs: XFS_IOC_FSGETXATTR ioctl memory leak
http://www.openwall.com/lists/oss-security/2010/09/07/12
[xfs-masters] 20100906 [PATCH] xfs: prevent reading uninitialized stack memory
http://www.linux.sgi.com/archives/xfs-masters/2010-09/msg00002.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a122eb2fdfd78b58c6dd992d6f4b1aaef667eef9
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc4
https://bugzilla.redhat.com/show_bug.cgi?id=630804
Common Vulnerability Exposure (CVE) ID: CVE-2010-3086
1024709
http://securitytracker.com/id?1024709
[oss-security] 20101110 CVE-2010-3086 kernel panic via futex
http://marc.info/?l=oss-security&m=128935856605589&w=2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9d55b9923a1b7ea8193b8875c57ec940dc2ff027
http://kerneltrap.org/mailarchive/linux-kernel/2008/2/6/752194/thread
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25
https://bugzilla.redhat.com/show_bug.cgi?id=429412
https://bugzilla.redhat.com/show_bug.cgi?id=633170
Common Vulnerability Exposure (CVE) ID: CVE-2010-3448
[oss-security] 20100623 kernel: thinkpad-acpi: lock down video output state access
http://openwall.com/lists/oss-security/2010/06/23/2
[oss-security] 20100928 Re: CVE requests: POE::Component::IRC, Alien Arena, Babiloo, Typo3, abcm2ps, ModSecurity, Linux kernel
http://openwall.com/lists/oss-security/2010/09/28/1
[oss-security] 20100929 Re: CVE requests: POE::Component::IRC, Alien Arena, Babiloo, Typo3, abcm2ps, ModSecurity, Linux kernel
http://openwall.com/lists/oss-security/2010/09/29/7
[oss-security] 20100930 Re: CVE requests: POE::Component::IRC, Alien Arena, Babiloo, Typo3, abcm2ps, ModSecurity, Linux kernel
http://openwall.com/lists/oss-security/2010/09/30/1
http://openwall.com/lists/oss-security/2010/09/30/6
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=565790
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b525c06cdbd8a3963f0173ccd23f9147d4c384b5
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34
https://bugzilla.redhat.com/show_bug.cgi?id=652122
kernel-thinkpad-dos(64580)
https://exchange.xforce.ibmcloud.com/vulnerabilities/64580
Common Vulnerability Exposure (CVE) ID: CVE-2010-3477
Bugtraq: 20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (Google Search)
Debian Security Information: DSA-2126 (Google Search)
http://www.securitytracker.com/id?1024603
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.