Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.123531
Categoría:Oracle Linux Local Security Checks
Título:Oracle: Security Advisory (ELSA-2013-1652)
Resumen:The remote host is missing an update for the 'coreutils' package(s) announced via the ELSA-2013-1652 advisory.
Descripción:Summary:
The remote host is missing an update for the 'coreutils' package(s) announced via the ELSA-2013-1652 advisory.

Vulnerability Insight:
[8.4-31.0.1]
- clean up empty file if cp is failed [Orabug 15973168]

[8.4-31]
- adjust the fix for the du bindmounts failure(#836557)

* Mon Oct 07 2013 Ondrej Oprala - Fix su retvals (once again)
[8.4-29]
- CVE-2013-0221 CVE-2013-0223 CVE-2013-0222 - fix various
segmentation faults in sort, uniq and join(#1015019)
[8.4-28]
- su now returns correct retvals for all cases
[8.4-27]
- tail -F now disables inotify when encountering a symlink.
Polling is used instead.
* Mon Sep 16 2013 Ondrej Oprala - df now properly dereferences long FS names(again)
[8.4-25]
- pr -n no longer crashes when passed values >= 32.
Also line numbers are consistently padded with spaces,
rather than with zeros for certain widths. (#997537)
[8.4-24]
- fix su return codes when NOT killed by a signal (#996190)
[8.4-23]
- fix several newly introduced defects found by Coverity
check
[8.4-22]
- wait for su child to prevent erroneous execution of some
commands (#749679)
- correct return values after signal termination (#889531)
and propagation of child core dump info (#747592)
- dd now accepts 'status=none' to suppress all
informational output(#965654)
- cut --output-delimiter option was ignored for multibyte
locales (#867984)
- remove redundant setpwent() and setgrent () syscalls
from stat -U/-G to improve NIS performance (#911206)
- date: deal correctly with invalid input with special
characters (#960160)
- dd: provide support for the conv=sparse (#908980)
- su/runuser: clarify which envvars are preserved/initialized
in -p/-m and -l help/man documentation (#967623)
- du: properly detect bindmounts (#836557)
- df: fix alignment of columns (#842040)
- id,groups: fix correct group printing (#816708)
- mv : replace empty directories in cross file
system move (#980061)
[8.4-21]
- fix parsing of field regression in sort command
(introduced between RHEL5 and RHEL6 upstream) (#956143)
[8.4-20]
- revert to polling for unknown filesystems, update
known fs for tail and stat based on coreutils-8.21 (#827199)

Affected Software/OS:
'coreutils' package(s) on Oracle Linux 6.

Solution:
Please install the updated package(s).

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2013-0221
RHSA-2013:1652
http://rhn.redhat.com/errata/RHSA-2013-1652.html
https://bugzilla.novell.com/show_bug.cgi?id=798538
https://bugzilla.redhat.com/show_bug.cgi?id=903464
https://build.opensuse.org/request/show/149348#diff_headline_coreutils-i18n-patch_diff_action_0_submit_0_19
Common Vulnerability Exposure (CVE) ID: CVE-2013-0222
https://bugzilla.novell.com/show_bug.cgi?id=796243
https://bugzilla.redhat.com/show_bug.cgi?id=903465
Common Vulnerability Exposure (CVE) ID: CVE-2013-0223
https://bugzilla.novell.com/show_bug.cgi?id=798541
https://bugzilla.redhat.com/show_bug.cgi?id=903466
CopyrightCopyright (C) 2015 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.