![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.123875 |
Category: | Oracle Linux Local Security Checks |
Title: | Oracle: Security Advisory (ELSA-2012-2022) |
Summary: | The remote host is missing an update for the 'kernel-uek' package(s) announced via the ELSA-2012-2022 advisory. |
Description: | Summary: The remote host is missing an update for the 'kernel-uek' package(s) announced via the ELSA-2012-2022 advisory. Vulnerability Insight: [2.6.39-200.24.1.el5uek] - Revert 'Add Oracle VM guest messaging driver' (Guru Anbalagane) [Orabug: 14233627} [2.6.39-200.23.1.el5uek] - SPEC: add block/net modules to list used by installer (Guru Anbalagane) [Orabug: 14224837] [2.6.39-200.22.1.el5uek] - NFSv4: include bitmap in nfsv4 get acl data (Andy Adamson) {CVE-2011-4131} - ocfs2:btrfs: aio-dio-loop changes broke setrlimit behavior [orabug 14207636] (Dave Kleikamp) - Add Oracle VM guest messaging driver (Zhigang Wang) - thp: avoid atomic64_read in pmd_read_atomic for 32bit PAE (Andrea Arcangeli) [Orabug: 14217003] [2.6.39-200.21.0.el5uek] - KVM: Fix buffer overflow in kvm_set_irq() (Avi Kivity) [Bugdb: 13966] {CVE-2012-2137} - net: sock: validate data_len before allocating skb in sock_alloc_send_pskb() (Jason Wang) [Bugdb: 13966] {CVE-2012-2136} - mm: pmd_read_atomic: fix 32bit PAE pmd walk vs pmd_populate SMP race condition (Andrea Arcangeli) [Bugdb: 13966] {CVE-2012-2373} - KVM: lock slots_lock around device assignment (Alex Williamson) [Bugdb: 13966] {CVE-2012-2121} - KVM: unmap pages from the iommu when slots are removed (Alex Williamson) [Bugdb: 13966] {CVE-2012-2121} - KVM: introduce kvm_for_each_memslot macro (Xiao Guangrong) [Bugdb: 13966] - fcaps: clear the same personality flags as suid when fcaps are used (Eric Paris) [Bugdb: 13966] {CVE-2012-2123} [2.6.39-200.20.0.el5uek] - Update lpfc version for 8.3.5.68.6p driver release (Martin K. Petersen) - Fix system hang due to bad protection module parameters (CR 130769) (Martin K. Petersen) - oracleasm: Data integrity support (Martin K. Petersen) - sd: Allow protection_type to be overridden (Martin K. Petersen) - SCSI: Fix two bugs in DIX retry handling (Martin K. Petersen) - sd: Avoid remapping bad reference tags (Martin K. Petersen) - block: Fix bad range check in bio_sector_offset (Martin K. Petersen) [2.6.39-200.19.0.el5uek] - xen/netback: Calculate the number of SKB slots required correctly (Simon Graham) [2.6.39-200.18.0.el5uek] - e1000e: disable rxhash when try to enable jumbo frame also rxhash and rxcsum have enabled (Joe Jin) [2.6.39-200.17.0.el5uek] - mm: reduce the amount of work done when updating min_free_kbytes (Mel Gorman) [Orabug: 14073214] - ocfs2: clear unaligned io flag when dio fails (Junxiao Bi) [Orabug: 14063941] - aio: make kiocb->private NUll in init_sync_kiocb() (Junxiao Bi) [Orabug: 14063941] - vmxnet3: cap copy length at size of skb to prevent dropped frames on tx (Neil Horman) [Orabug: 14159701] - mm/mempolicy.c: refix mbind_range() vma issue (KOSAKI Motohiro) [Orabug: 14149364] - mm/mempolicy.c: fix pgoff in mbind vma merge (Caspar Zhang) [Orabug:14149364] [2.6.39-200.16.0.el5uek] - xen/gntdev: Fix merge error. (Konrad Rzeszutek Wilk) [2.6.39-200.15.0.el5uek] - xen: expose host uuid via sysfs. (Zhigang Wang) [2.6.39-200.14.0.el5uek] - SPEC: upgrade preserve rhck as a boot kernel (Kevin Lyons) [Orabug: ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'kernel-uek' package(s) on Oracle Linux 5, Oracle Linux 6. Solution: Please install the updated package(s). CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Copyright | Copyright (C) 2015 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |