Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.123933
Category:Oracle Linux Local Security Checks
Title:Oracle: Security Advisory (ELSA-2012-2007)
Summary:The remote host is missing an update for the 'kernel-uek, mlnx_en-2.6.32-300.21.1.el5uek, mlnx_en-2.6.32-300.21.1.el6uek, ofa-2.6.32-300.21.1.el5uek, ofa-2.6.32-300.21.1.el6uek' package(s) announced via the ELSA-2012-2007 advisory.
Description:Summary:
The remote host is missing an update for the 'kernel-uek, mlnx_en-2.6.32-300.21.1.el5uek, mlnx_en-2.6.32-300.21.1.el6uek, ofa-2.6.32-300.21.1.el5uek, ofa-2.6.32-300.21.1.el6uek' package(s) announced via the ELSA-2012-2007 advisory.

Vulnerability Insight:
[2.6.32-300.21.1.el6uek]
- regset: Return -EFAULT, not -EIO, on host-side memory fault (H. Peter Anvin)
CVE-2012-1097
- regset: Prevent null pointer reference on readonly regsets (H. Peter Anvin)
CVE-2012-1097
- cifs: fix dentry refcount leak when opening a FIFO on lookup (Jeff Layton)
CVE-2012-1090
- block: Fix io_context leak after failure of clone with CLONE_IO (Louis
Rilling) CVE-2012-0879

Affected Software/OS:
'kernel-uek, mlnx_en-2.6.32-300.21.1.el5uek, mlnx_en-2.6.32-300.21.1.el6uek, ofa-2.6.32-300.21.1.el5uek, ofa-2.6.32-300.21.1.el6uek' package(s) on Oracle Linux 5, Oracle Linux 6.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2012-0879
1027086
http://www.securitytracker.com/id?1027086
48545
http://secunia.com/advisories/48545
48842
http://secunia.com/advisories/48842
DSA-2469
http://www.debian.org/security/2012/dsa-2469
HPSBGN02970
http://marc.info/?l=bugtraq&m=139447903326211&w=2
RHSA-2012:0481
http://rhn.redhat.com/errata/RHSA-2012-0481.html
RHSA-2012:0531
http://rhn.redhat.com/errata/RHSA-2012-0531.html
SUSE-SU-2012:0616
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html
USN-1408-1
http://www.ubuntu.com/usn/USN-1408-1
USN-1410-1
http://www.ubuntu.com/usn/USN-1410-1
USN-1411-1
http://www.ubuntu.com/usn/USN-1411-1
[oss-security] 20120223 Re: CVE request -- kernel: block: CLONE_IO io_context refcounting issues
http://www.openwall.com/lists/oss-security/2012/02/23/5
http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.33
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=61cc74fbb87af6aa551a06a370590c9bc07e29d9
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b69f2292063d2caf37ca9aec7d63ded203701bf3
https://bugzilla.redhat.com/show_bug.cgi?id=796829
https://github.com/torvalds/linux/commit/61cc74fbb87af6aa551a06a370590c9bc07e29d9
https://github.com/torvalds/linux/commit/b69f2292063d2caf37ca9aec7d63ded203701bf3
Common Vulnerability Exposure (CVE) ID: CVE-2012-1090
48964
http://secunia.com/advisories/48964
SUSE-SU-2012:0554
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html
[oss-security] 20120228 Re: CVE request -- kernel: cifs: dentry refcount leak when opening a FIFO on lookup leads to panic on unmount
http://www.openwall.com/lists/oss-security/2012/02/28/4
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10
https://bugzilla.redhat.com/show_bug.cgi?id=798293
https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08
Common Vulnerability Exposure (CVE) ID: CVE-2012-1097
48898
http://secunia.com/advisories/48898
[oss-security] 20120305 CVE-2012-1097 kernel: regset: Prevent null pointer reference on readonly regsets
http://www.openwall.com/lists/oss-security/2012/03/05/1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c8e252586f8d5de906385d8cf6385fee289a825e
https://bugzilla.redhat.com/show_bug.cgi?id=799209
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.