![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.122447 |
Category: | Oracle Linux Local Security Checks |
Title: | Oracle: Security Advisory (ELSA-2009-1307) |
Summary: | The remote host is missing an update for the 'ecryptfs-utils' package(s) announced via the ELSA-2009-1307 advisory. |
Description: | Summary: The remote host is missing an update for the 'ecryptfs-utils' package(s) announced via the ELSA-2009-1307 advisory. Vulnerability Insight: [75-4] - fix EOF handling (#499367) - add icon to gui desktop file [75-3] - ask for password confirmation when creating openssl key (#500850) - removed executable permission from ecryptfs-dot-private (#500817) - ecryptfs-rewrite-file: improve of progress output (#500813) - don't error out when unwrapping and adding a key that already exists (#500810) - fix typo in ecryptfs-rewrite-file(1) (#500804) - add error message about full keyring (#501460) - gui sub-package must requires pygtk2-libglade (#500997) - require cryptsetup-luks for encrypted swap (#500824) - use blkid instead of vol_id (#500820) - don't rely on cryptdisks service (#500829) [75-2] - don't hang when used with wrong/missing stdin (#499367) - don't print error when key already removed (#499167) - refuse mounting with too small rsa key (#499175) - don't error out when adding key that already exists (#500361) - allow only working key sizes (#500352) - return nonzero when fnek is not supported (#500566) - add icon for Access-Your-Private-Data.desktop file (#500623) - fix information about openssl_passwd in openssl_passwd_file (#499128) - don't list mount.ecryptfs_private twice [75-1] - update to 75 and drop some patches [74-24] - add suid mount.ecryptfs_private, restrict it to ecryptfs group [74-23] - skip releases -2 - -22 to be sure its always newer nvr [74-22] - drop setuid for mount.ecryptfs_private - resolves: #482834 [74-1] - update to 74 - fix difference between apps. real names and names in usage messages (#475969) - describe verobse and verbosity=X in man page (#470444) - adding passphrase to keyring is fixed (#469662) - mount won't fail with wrong/empty input to yes/no questions (#466210) - try to load modules instead of failing when its missing (#460496) - fix wrong return codes (#479429) - resolves: #482834 Affected Software/OS: 'ecryptfs-utils' package(s) on Oracle Linux 5. Solution: Please install the updated package(s). CVSS Score: 7.2 CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2008-5188 http://www.openwall.com/lists/oss-security/2008/10/23/3 http://www.openwall.com/lists/oss-security/2008/10/29/4 http://www.openwall.com/lists/oss-security/2008/10/29/7 http://osvdb.org/49334 http://osvdb.org/50353 http://osvdb.org/50354 http://osvdb.org/50355 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9607 RedHat Security Advisories: RHSA-2009:1307 http://rhn.redhat.com/errata/RHSA-2009-1307.html http://secunia.com/advisories/32382 http://secunia.com/advisories/36552 XForce ISS Database: ecryptfsutils-setupprivate-info-disclosure(46073) https://exchange.xforce.ibmcloud.com/vulnerabilities/46073 |
Copyright | Copyright (C) 2015 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |