![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.123531 |
Category: | Oracle Linux Local Security Checks |
Title: | Oracle: Security Advisory (ELSA-2013-1652) |
Summary: | The remote host is missing an update for the 'coreutils' package(s) announced via the ELSA-2013-1652 advisory. |
Description: | Summary: The remote host is missing an update for the 'coreutils' package(s) announced via the ELSA-2013-1652 advisory. Vulnerability Insight: [8.4-31.0.1] - clean up empty file if cp is failed [Orabug 15973168] [8.4-31] - adjust the fix for the du bindmounts failure(#836557) * Mon Oct 07 2013 Ondrej Oprala - Fix su retvals (once again) [8.4-29] - CVE-2013-0221 CVE-2013-0223 CVE-2013-0222 - fix various segmentation faults in sort, uniq and join(#1015019) [8.4-28] - su now returns correct retvals for all cases [8.4-27] - tail -F now disables inotify when encountering a symlink. Polling is used instead. * Mon Sep 16 2013 Ondrej Oprala - df now properly dereferences long FS names(again) [8.4-25] - pr -n no longer crashes when passed values >= 32. Also line numbers are consistently padded with spaces, rather than with zeros for certain widths. (#997537) [8.4-24] - fix su return codes when NOT killed by a signal (#996190) [8.4-23] - fix several newly introduced defects found by Coverity check [8.4-22] - wait for su child to prevent erroneous execution of some commands (#749679) - correct return values after signal termination (#889531) and propagation of child core dump info (#747592) - dd now accepts 'status=none' to suppress all informational output(#965654) - cut --output-delimiter option was ignored for multibyte locales (#867984) - remove redundant setpwent() and setgrent () syscalls from stat -U/-G to improve NIS performance (#911206) - date: deal correctly with invalid input with special characters (#960160) - dd: provide support for the conv=sparse (#908980) - su/runuser: clarify which envvars are preserved/initialized in -p/-m and -l help/man documentation (#967623) - du: properly detect bindmounts (#836557) - df: fix alignment of columns (#842040) - id,groups: fix correct group printing (#816708) - mv : replace empty directories in cross file system move (#980061) [8.4-21] - fix parsing of field regression in sort command (introduced between RHEL5 and RHEL6 upstream) (#956143) [8.4-20] - revert to polling for unknown filesystems, update known fs for tail and stat based on coreutils-8.21 (#827199) Affected Software/OS: 'coreutils' package(s) on Oracle Linux 6. Solution: Please install the updated package(s). CVSS Score: 4.3 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-0221 RHSA-2013:1652 http://rhn.redhat.com/errata/RHSA-2013-1652.html https://bugzilla.novell.com/show_bug.cgi?id=798538 https://bugzilla.redhat.com/show_bug.cgi?id=903464 https://build.opensuse.org/request/show/149348#diff_headline_coreutils-i18n-patch_diff_action_0_submit_0_19 Common Vulnerability Exposure (CVE) ID: CVE-2013-0222 https://bugzilla.novell.com/show_bug.cgi?id=796243 https://bugzilla.redhat.com/show_bug.cgi?id=903465 Common Vulnerability Exposure (CVE) ID: CVE-2013-0223 https://bugzilla.novell.com/show_bug.cgi?id=798541 https://bugzilla.redhat.com/show_bug.cgi?id=903466 |
Copyright | Copyright (C) 2015 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |