Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.122447
Category:Oracle Linux Local Security Checks
Title:Oracle: Security Advisory (ELSA-2009-1307)
Summary:The remote host is missing an update for the 'ecryptfs-utils' package(s) announced via the ELSA-2009-1307 advisory.
Description:Summary:
The remote host is missing an update for the 'ecryptfs-utils' package(s) announced via the ELSA-2009-1307 advisory.

Vulnerability Insight:
[75-4]
- fix EOF handling (#499367)
- add icon to gui desktop file

[75-3]
- ask for password confirmation when creating openssl key (#500850)
- removed executable permission from ecryptfs-dot-private (#500817)
- ecryptfs-rewrite-file: improve of progress output (#500813)
- don't error out when unwrapping and adding a key that already exists (#500810)
- fix typo in ecryptfs-rewrite-file(1) (#500804)
- add error message about full keyring (#501460)
- gui sub-package must requires pygtk2-libglade (#500997)
- require cryptsetup-luks for encrypted swap (#500824)
- use blkid instead of vol_id (#500820)
- don't rely on cryptdisks service (#500829)

[75-2]
- don't hang when used with wrong/missing stdin (#499367)
- don't print error when key already removed (#499167)
- refuse mounting with too small rsa key (#499175)
- don't error out when adding key that already exists (#500361)
- allow only working key sizes (#500352)
- return nonzero when fnek is not supported (#500566)
- add icon for Access-Your-Private-Data.desktop file (#500623)
- fix information about openssl_passwd in openssl_passwd_file (#499128)
- don't list mount.ecryptfs_private twice

[75-1]
- update to 75 and drop some patches

[74-24]
- add suid mount.ecryptfs_private, restrict it to ecryptfs group

[74-23]
- skip releases -2 - -22 to be sure its always newer nvr

[74-22]
- drop setuid for mount.ecryptfs_private
- resolves: #482834

[74-1]
- update to 74
- fix difference between apps. real names and names in usage messages (#475969)
- describe verobse and verbosity=X in man page (#470444)
- adding passphrase to keyring is fixed (#469662)
- mount won't fail with wrong/empty input to yes/no questions (#466210)
- try to load modules instead of failing when its missing (#460496)
- fix wrong return codes (#479429)
- resolves: #482834

Affected Software/OS:
'ecryptfs-utils' package(s) on Oracle Linux 5.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-5188
http://www.openwall.com/lists/oss-security/2008/10/23/3
http://www.openwall.com/lists/oss-security/2008/10/29/4
http://www.openwall.com/lists/oss-security/2008/10/29/7
http://osvdb.org/49334
http://osvdb.org/50353
http://osvdb.org/50354
http://osvdb.org/50355
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9607
RedHat Security Advisories: RHSA-2009:1307
http://rhn.redhat.com/errata/RHSA-2009-1307.html
http://secunia.com/advisories/32382
http://secunia.com/advisories/36552
XForce ISS Database: ecryptfsutils-setupprivate-info-disclosure(46073)
https://exchange.xforce.ibmcloud.com/vulnerabilities/46073
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.