Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.123764
Kategorie:Oracle Linux Local Security Checks
Titel:Oracle: Security Advisory (ELSA-2013-0132)
Zusammenfassung:The remote host is missing an update for the 'autofs' package(s) announced via the ELSA-2013-0132 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'autofs' package(s) announced via the ELSA-2013-0132 advisory.

Vulnerability Insight:
[5.0.1-0.rc2.177.0.1.el5]
- apply fix from NetApp to use tcp before udp
[link moved to references]
(Bert Barbe) [orabug 6827898]

[5.0.1-0.rc2.177.el5]
- bz714766 - autofs /net maps do not refresh list of shares exported on the NFS server
- disable hosts map HUP signal update.
- Related: rhbz#714766

[5.0.1-0.rc2.176.el5]
- bz859890 - no --timeout option usage demonstrated in auto.master FORMAT
options man page section
- add timeout option description to man page.
- Resolves: rhbz#859890

[5.0.1-0.rc2.175.el5]
- bz845503 - autofs initscript problems
- fix status() return code now gets lost due to adding lock file check.
- Related: rhbz#845503

[5.0.1-0.rc2.174.el5]
- bz585058 - autofs5 init script times out before automount exits and
incorrectly shows that autofs5 stop failed
- fix don't wait forever for shutdown.
- bz845503 - autofs initscript problems
- don't unconditionally call stop on restart.
- fix usage message.
- fix status return code when daemon is dead but lock file exists.
- Related: rhbz#585058 rhbz#845503

[5.0.1-0.rc2.173.el5]
- bz845503 - autofs initscript problems
- don't use status() function in restart, it can't be relied upon.
- Related: rhbz#845503

[5.0.1-0.rc2.172.el5]
- bz845503 - autofs initscript problems
- fix status call in restart must specify pid file name.
- Related: rhbz#845503

[5.0.1-0.rc2.171.el5]
- bz845503 - autofs initscript problems
- make redhat init script more lsb compliant.
- Resolves: rhbz#845503

[5.0.1-0.rc2.170.el5]
- bz847101 - System unresponsiveness and CPU starvation when launching source code script
- check negative cache much earlier.
- don't use pthread_rwlock_tryrdlock().
- remove state machine timed wait.
- Related: rhbz#847101

[5.0.1-0.rc2.169.el5]
- bz714766 - autofs /net maps do not refresh list of shares exported on the NFS server
- fix offset dir removal.
- Related: rhbz#714766

[5.0.1-0.rc2.168.el5]
- bz585058 - autofs5 init script times out before automount exits and
incorrectly shows that autofs5 stop failed
- make autofs wait longer for shutdown.
- Resolves: rhbz#585058

[5.0.1-0.rc2.167.el5]
- bz714766 - autofs /net maps do not refresh list of shares exported on the NFS server
- fix expire race.
- fix remount deadlock.
- fix umount recovery of busy direct mount.
- fix offset mount point directory removal.
- remove move mount code.
- fix remount of multi mount.
- fix device ioctl alloc path check.
- refactor hosts lookup module.
- remove cache update from parse_mount().
- add function to delete offset cache entry.
- allow update of multi mount offset entries.
- add hup signal handling to hosts map.
- Resolves: rhbz#714766

[5.0.1-0.rc2.166.el5]
- bz826633 - autofs crashes on lookup of a key containing a backslash
- fix fix LDAP result leaks on error paths.
- fix result null check in read_one_map().
- Resolves: ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'autofs' package(s) on Oracle Linux 5.

Solution:
Please install the updated package(s).

CVSS Score:
4.9

CVSS Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2012-2697
57183
http://www.securityfocus.com/bid/57183
89878
http://www.osvdb.org/89878
RHSA-2013:0132
http://rhn.redhat.com/errata/RHSA-2013-0132.html
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
https://bugzilla.redhat.com/show_bug.cgi?id=831772
CopyrightCopyright (C) 2015 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.