![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.122123 |
Category: | Oracle Linux Local Security Checks |
Title: | Oracle: Security Advisory (ELSA-2011-1073) |
Summary: | The remote host is missing an update for the 'bash' package(s) announced via the ELSA-2011-1073 advisory. |
Description: | Summary: The remote host is missing an update for the 'bash' package(s) announced via the ELSA-2011-1073 advisory. Vulnerability Insight: [3.2-32] - Don't include backup files Resolves: #700157 [3.2-31] - Use 'mktemp' for temporary files Resolves: #700157 [3.2-30] - Added man page references to systemwide .bash_logout Resolves: #592979 [3.2-29] - Readline glitch, when editing line with more spaces and resizing window Resolves: #525474 [3.2-28] - Fix the memory leak in read builtin Resolves: #618393 - Don't append slash to non-directories Resolves: #583919 [3.2-27] - Test .dynamic section if has PROGBITS or NOBITS Resolves: #484809 - Better random number generator Resolves: #492908 - Allow to source scripts with embedded NULL chars Resolves: #503701 [3.2-26] - vi mode redo insert fixed Resolves: #575076 - Don't show broken pipe messages for builtins Resolves: #546529 - Don't include loadables in doc dir Resolves: #663656 - Enable system-wide .bash_logout for login shells Resolves: #592979 [3.2-25] - Don't abort source builtin Resolves: #448508 - Correctly place cursor Resolves: #463880 - Minor man page clarification for trap builtin Resolves: #504904 Affected Software/OS: 'bash' package(s) on Oracle Linux 5. Solution: Please install the updated package(s). CVSS Score: 6.9 CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2008-5374 BugTraq ID: 32733 http://www.securityfocus.com/bid/32733 http://security.gentoo.org/glsa/glsa-201210-05.xml http://www.mandriva.com/security/advisories?name=MDVSA-2010:004 http://uvw.ru/report.sid.txt http://lists.debian.org/debian-devel/2008/08/msg00347.html http://www.redhat.com/support/errata/RHSA-2011-0261.html http://www.redhat.com/support/errata/RHSA-2011-1073.html http://secunia.com/advisories/43365 http://secunia.com/advisories/51086 http://www.vupen.com/english/advisories/2011/0414 |
Copyright | Copyright (C) 2015 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |