support.hpe.com
Open in
urlscan Pro
16.248.72.79
Public Scan
Submitted URL: https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241
Effective URL: https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-c05352241
Submission: On November 25 via api from PL — Scanned from DE
Effective URL: https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-c05352241
Submission: On November 25 via api from PL — Scanned from DE
Form analysis
1 forms found in the DOMName: hpehf-search-form — https://www.hpe.com/us/en/search-results.html?page=1&q=&autocomplete=0
<form name="hpehf-search-form" action="https://www.hpe.com/us/en/search-results.html?page=1&q=&autocomplete=0" class="hpehf-search-form hpehf-centered-content"><input type="text" id="hpehf-search-input"
class="hpehf-search-input js-search-field" placeholder="hpe.com durchsuchen" name="q" autocomplete="off"
spellcheck="false"><a href="javascipt:void(0);" id="hpehf-search-submit" title="Search" aria-label="Search"><svg width="24" height="24" focusable="false" viewBox="0 0 24 24" fill="#000" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M10.5,0C4.7,0,0,4.7,0,10.5C0,16.3,4.7,21,10.5,21c2.5,0,4.8-0.9,6.6-2.3l5.3,5.3l1.6-1.6l-5.3-5.3 c1.5-1.8,2.3-4.1,2.3-6.6C21,4.7,16.3,0,10.5,0z M1.9,10.6c0-4.8,3.8-8.6,8.6-8.6c4.7,0,8.6,3.9,8.6,8.6c0,4.8-3.8,8.6-8.6,8.6 C5.7,19.2,1.9,15.3,1.9,10.6z"></path></svg></a><a href="javascript:void(0);" class="hpehf-srch-menu-close hpehf-close-btn" title="Abschließen" aria-label="Abschließen"><svg width="24" height="24" focusable="false" viewBox="0 0 24 24" fill="#000" xmlns="http://www.w3.org/2000/svg"><polygon points="21.8,23.4 12,13.7 2.2,23.4 0.6,21.8 10.3,12 0.6,2.2 2.2,0.6 12,10.3 21.8,0.6 23.4,2.2 13.7,12 23.4,21.8 "></polygon></svg><span class="hpehf-srch-close-text">Abschließen</span></a>
</form>
Text Content
Diese Website verwendet Cookies. Während einige Cookies für die Funktionsfähigkeit der Website benötigt werden, können Sie weitere nicht-wesentliche Cookies aktivieren, die Ihr Erlebnis personalisieren und verbessern. Weitere Informationen hierzu finden Sie in unserer Datenschutzerklärung. Optionale Cookies Ja Nein * Warenkorb Abschließen Abschließen HPE GreenLake Cloud Services HPE GreenLake Central Cloud-Konsolen Daten-Services Rechenleistung Konnektivität Aruba Central HPE Ressourcen * Support * Financial Services * Entwickler * Communities * www.hpe.com Abschließen * Sign Out Abschließen * Gute Gründe für HPE * Produkte * Automatisierung * Wenden Sie sich an * Deutschland (DE) SUPPORT CENTER Zum Hauptinhalt wechseln Menü-KnopfZurück * Startseite Startseite * HPE Support Center * Arbeitsplatz * Verwalten Verwalten * Supportanfragen * Meine Verträge * Service Credits * Services Services * HPE GreenLake * HPE Pointnext Complete Care * HPE Datacenter Care * HPE Pointnext Tech Care * HPE Proactive Care Advanced * HPE Proactive Care * HPE Foundation Care * Produkte Produkte * Meine Produkte * HPE InfoSight * HPE Active Health System Viewer * HPE GreenLake Central * Meine IT-Umgebung * Für Produkt-Warnmeldungen anmelden * Downloads Downloads * Treiber und Software finden * Wichtige Downloads * Mein HPE Software Center * Patch-Management * Wissen Wissen * Dokumente finden * Top-Lösungen * QuickSpecs * Handbücher * Sicherheitsbulletins * Videos * Foren * Ressourcen Ressourcen * * Garantieüberprüfung * HPE Aruba Support-Portal * Mein Complete Care * Mein Dokument-Archiv * Diagnosekennwörter * Import/Export-Klassifizierungsdaten * HPE Community-Foren * Ausrüstungsteile validieren * Support Support * Sitehilfe * Website-Support * Website-Feedback * Chat-Unterstützung * HPE Produktsupport anrufen * HPE Aruba Produktsupport anrufen * HPE Nimble Produktsupport anrufen * * * * SUPPORT CENTER Sie haben keine neuen Benachrichtigungen. * Deutschland - Deutsch * Anmelden HPE Support durchsuchen Manage privacy and data collection on HPE.com Englisch Englisch status icon Treffer 0 von 0 HPSBGN03681 rev.1 - HPE Helion OpenStack (HOS) and HPE Helion CloudSystem using Linux kernel, Local Elevation of Privilege SECURITY BULLETIN Document ID: c05352241 Version: 1 HPSBGN03681 rev.1 - HPE Helion OpenStack (HOS) and HPE Helion CloudSystem using Linux kernel, Local Elevation of Privilege NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2017-01-11 Last Updated: 2017-02-24 -------------------------------------------------------------------------------- Potential Security Impact: Local: Elevation of Privilege Source: Hewlett Packard Enterprise, HPE Product Security Response Team VULNERABILITY SUMMARY A security vulnerability in Linux kernel, also known as "Dirty COW", has been addressed in HPE Helion OpenStack (HOS) and HPE Helion CloudSystem (which is built on HOS). This vulnerability could be exploited locally to gain privileged access. References: CVE-2016-5195 - Linux kernel vulnerability, "Dirty COW" SUPPORTED SOFTWARE VERSIONS*: ONLY IMPACTED VERSIONS ARE LISTED. * HPE Helion CloudSystem - all versions * HPE Helion OpenStack - all versions BACKGROUND CVSS Version 3.0 and Version 2.0 Base Metrics Reference V3 Vector V3 Base Score V2 Vector V2 Base Score CVE-2016-5195 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 7.8 (AV:L/AC:M/Au:N/C:C/I:C/A:C) 6.9 Information on CVSS is documented in HPE Customer Notice: HPSN-2008-002 RESOLUTION HPE has provided the following updates to resolve this vulnerability in the impacted versions of Helion OpenStack (HOS) and CloudSystem: * For HOS v3.x, please install HOS v3.0.3 * For HOS v4.x, please install HOS v4.0.1 HOS updates can be downloaded using the following link: http://www.hpe.com/software/entitlements * For CloudSystem, please install CloudSystem v10.0.1: CloudSystem update can be downloaded using the following link: https://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumber=Z7550-63210 Note: Security controls built into the Helion OpenStack (HOS) and CloudSystem reduce the risk posed by this vulnerability to low. Since HOS and CloudSystem tenants have access only to virtual machines and not the KVM compute host servers, an attacker would first need to gain access to the KVM compute host server in order to exploit this vulnerability. HISTORY Version:1 (rev.1) - 9 December 2016 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability for any HPE supported product: * Web Form: https://www.hpe.com/info/report-security-vulnerability * Email: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX System management and security procedures must be reviewed frequently to maintain system integrity. HPE is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "HPE is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HPE products the important security information contained in this Bulletin. HPE recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HPE does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HPE will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HPE disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement." ©Copyright 2021 Hewlett Packard Enterprise Development LP Hewlett Packard Enterprise Development shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HPE nor its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise Development and the names of Hewlett Packard Enterprise Development products referenced herein are trademarks of Hewlett Packard Enterprise Development in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. Ähnliche Produkte HPE Helion OpenStack HPE CloudSystem Enterprise HPE Helion CloudSystem Foundation 1-server 1yr Support LTU HPE Helion CloudSystem Enterprise 8-server 3yr Support LTU HPE Helion OpenStack Community Mehr anzeigen Weniger anzeigen Ähnliche Produkte Auf dieser Seite Auf dieser Seite * VULNERABILITY SUMMARY * SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. * BACKGROUND * RESOLUTION Haftungsausschluss: Produkte, die vor dem 1. November 2015 (Datum der Trennung der Hewlett-Packard Company in Hewlett Packard Enterprise Company und HP Inc.) verkauft wurden, tragen möglicherweise ältere Produktnamen und Modellnummern, die von den aktuellen Modellen abweichen. Hewlett Packard Enterprise glaubt daran, bedingungslos inklusiv zu sein. Wir arbeiten daran, nicht-inklusive Bestimmungen in unseren aktiven Produkten zu ersetzen. Waren diese Informationen hilfreich? Vielen Dank! Feedback Firma Über HPEZugänglichkeit (Produkte/Services)StellenangeboteKontaktDuales StudiumUnternehmensverantwortungGlobale Vielfalt & InklusionTransparenz in der Lieferkette (PDF)Hewlett Packard LabsInvestor RelationsUnternehmensleitungPolitische GrundsätzeImpressum Mehr erfahren Künstliche IntelligenzCloud-ComputingContainerMaschinelles LernenEnterprise Glossar Neuigkeiten und Veranstaltungen NewsroomHPE DiscoverVeranstaltungenWebinare PARTNER PartnerprogrammePartner findenZertifizierungen Support ProduktsupportSoftware & TreiberGarantieprüfungErweiterte Support-ServicesSchulungen Communities HPE CommunityAruba AirheadsHPE Tech Pro CommunityHPE DeveloperAlle Blogs und Foren Kundenressourcen KundenberichteKaufenFinancial ServicesExecutive Briefing CenterE-Mail-AbonnementsAnmeldungRessourcenbibliothekVideogalerieStimme der Kunden – Abonnement FOLGEN SIE HPE © Copyright 2021 Hewlett Packard Enterprise Development LP * Datenschutz * Nutzungsbedingungen * Werbung & Cookies