Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.122033
Kategorie:Oracle Linux Local Security Checks
Titel:Oracle: Security Advisory (ELSA-2011-1526)
Zusammenfassung:The remote host is missing an update for the 'glibc' package(s) announced via the ELSA-2011-1526 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'glibc' package(s) announced via the ELSA-2011-1526 advisory.

Vulnerability Insight:
[2.12-1.47]
- Don't start AVC thread until credentials are installed (#700507)

[2.12-1.46]
- Update systemtaparches

[2.12-1.45]
- Update configure script

[2.12-1.44]
- Add gdb hooks (#711927)

[2.12-1.43]
- Don't assume AT_PAGESIZE is always available (#739184)
- Define IP_MULTICAST_ALL (#738763)

[2.12-1.42]
- Avoid race between {,__de}allocate_stack and __reclaim_stacks during
fork (#738665)

[2.12-1.41]
- Locale-independent parsing in libintl (#737778)

[2.12-1.40]
- Change setgroups to affect all the threads in the process (#736346)

[2.12-1.39]
- Make sure AVC thread has capabilities (#700507)
- Fix memory leak in dlopen with RTLD_NOLOAD (#699724)

[2.12-1.38]
- Build libresolv with stack protector (#730379)

[2.12-1.37]
- Maintain stack alignment when cancelling threads (#731042)

[2.12-1.36]
- Fix missing debuginfo (#729036)

[2.12-1.35]
- Report write error in addmnt even for cached streams (#688980,
CVE-2011-1089)
- Handle Lustre filesystem (#712248)

[2.12-1.34]
- Query NIS domain only when needed (#718057)
- Update: Use mmap for allocation of buffers used for __abort_msg
(#676591)

[2.12-1.33]
- Don't use gethostbyaddr to determine canonical name (#714823)

[2.12-1.32]
- ldd: never run file directly (#713134)

[2.12-1.31]
- Support Intel processor model 6 and model 0x2c (#695595)
- Optimize memcpy for SSSE3 (#695812)
- Optimize strlen for SSE2 (#695963)

[2.12-1.30]
- Support f_flags in Linux statfs implementation (#711987)

[2.12-1.29]
- Avoid overriding CFLAGS (#706903)

[2.12-1.28]
- Use mmap for allocation of buffers used for __abort_msg (#676591)

[2.12-1.27]
- Fix PLT use due to __libc_alloca_cutoff
- Schedule nscd cache pruning more accurately from re-added values
(#703481)
- Fix POWER4 optimized strncmp to not read past differing bytes
(#694386)

[2.12-1.26]
- Create debuginfo-common on biarch platforms (#676467)
- Use Rupee sign in Indian locales (#692838)
- Signal temporary host lookup errors in nscd as such to the requester
(#703480)
- Define initgroups callback for nss_files (#705465)

Affected Software/OS:
'glibc' package(s) on Oracle Linux 6.

Solution:
Please install the updated package(s).

CVSS Score:
6.9

CVSS Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2009-5064
http://reverse.lostrealm.com/protect/ldd.html
http://www.catonmat.net/blog/ldd-arbitrary-code-execution/
https://bugzilla.redhat.com/show_bug.cgi?id=531160
https://bugzilla.redhat.com/show_bug.cgi?id=682998
http://openwall.com/lists/oss-security/2011/03/07/10
http://openwall.com/lists/oss-security/2011/03/07/7
http://openwall.com/lists/oss-security/2011/03/08/2
http://openwall.com/lists/oss-security/2011/03/07/13
http://openwall.com/lists/oss-security/2011/03/08/1
http://openwall.com/lists/oss-security/2011/03/08/10
http://openwall.com/lists/oss-security/2011/03/08/3
http://openwall.com/lists/oss-security/2011/03/08/7
http://www.redhat.com/support/errata/RHSA-2011-1526.html
Common Vulnerability Exposure (CVE) ID: CVE-2011-1089
46740
http://www.securityfocus.com/bid/46740
MDVSA-2011:178
http://www.mandriva.com/security/advisories?name=MDVSA-2011:178
MDVSA-2011:179
http://www.mandriva.com/security/advisories?name=MDVSA-2011:179
RHSA-2011:1526
[oss-security] 20110303 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
http://openwall.com/lists/oss-security/2011/03/04/11
[oss-security] 20110303 Suid mount helpers fail to anticipate RLIMIT_FSIZE
http://openwall.com/lists/oss-security/2011/03/04/9
[oss-security] 20110304 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
http://openwall.com/lists/oss-security/2011/03/04/10
http://openwall.com/lists/oss-security/2011/03/04/12
[oss-security] 20110305 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
http://openwall.com/lists/oss-security/2011/03/05/3
http://openwall.com/lists/oss-security/2011/03/05/7
[oss-security] 20110307 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
http://openwall.com/lists/oss-security/2011/03/07/9
[oss-security] 20110314 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
http://openwall.com/lists/oss-security/2011/03/14/16
http://openwall.com/lists/oss-security/2011/03/14/5
http://openwall.com/lists/oss-security/2011/03/14/7
[oss-security] 20110315 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
http://openwall.com/lists/oss-security/2011/03/15/6
[oss-security] 20110322 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
http://openwall.com/lists/oss-security/2011/03/22/4
http://openwall.com/lists/oss-security/2011/03/22/6
[oss-security] 20110331 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
http://openwall.com/lists/oss-security/2011/03/31/3
http://openwall.com/lists/oss-security/2011/03/31/4
[oss-security] 20110401 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
http://openwall.com/lists/oss-security/2011/04/01/2
http://sourceware.org/bugzilla/show_bug.cgi?id=12625
https://bugzilla.redhat.com/show_bug.cgi?id=688980
CopyrightCopyright (C) 2015 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.