![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.123514 |
Kategorie: | Oracle Linux Local Security Checks |
Titel: | Oracle: Security Advisory (ELSA-2013-1635) |
Zusammenfassung: | The remote host is missing an update for the 'pacemaker' package(s) announced via the ELSA-2013-1635 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'pacemaker' package(s) announced via the ELSA-2013-1635 advisory. Vulnerability Insight: [1.1.10-14] - Log: crmd: Supply arguments in the correct order Resolves: rhbz#996850 - Fix: Invalid formatting of log message causes crash Resolves: rhbz#996850 [1.1.10-13] - Fix: cman: Start clvmd and friends from the init script if enabled [1.1.10-12] - Fix: Consistently use 'Slave' as the role for unpromoted master/slave resources Resolves: rhbz#1011618 - Fix: pengine: Location constraints with role=Started should prevent masters from running at all Resolves: rhbz#902407 - Fix: crm_resource: Observe --master modifier for --move Resolves: rhbz#902407 [1.1.10-11] + Fix: cman: Do not start pacemaker if cman startup fails + Fix: Fencing: Observe pcmk_host_list during automatic unfencing Resolves: rhbz#996850 [1.1.10-10] - Remove unsupported resource agent Resolves: rhbz#1005678 - Provide a meaningful error if --master is used for primitives and groups [1.1.10-9] + Fix: xml: Location constraints are allowed to specify a role + Bug rhbz#902407 - crm_resource: Handle --ban for master/slave resources as advertised Resolves: rhbz#902407 [1.1.10-8] + Fix: mcp: Remove LSB hints that instruct chkconfig to start pacemaker at boot time Resolves: rhbz#997346 [1.1.10-7] + Fencing: Support agents that need the host to be unfenced at startup Resolves: rhbz#996850 + Fix: crm_report: Collect corosync quorum data Resolves: rhbz#989292 [1.1.10-6] - Regenerate patches to have meaningful names [1.1.10-5] + Fix: systemd: Prevent glib assertion - only call g_error_free with non-NULL arguments + Fix: systemd: Prevent additional use-of-NULL assertions in g_error_free + Fix: logging: glib CRIT messages should not produce core files in the background + Fix: crmd: Correctly update the history cache when recurring ops change their return code + Log: crm_mon: Unmangle the output for failed operations + Log: cib: Correctly log short-form xml diffs + Log: pengine: Better indicate when a resource has failed [1.1.10-4] + Fix: crmd: Prevent crash by passing log arguments in the correct order + Fix: pengine: Do not re-allocate clone instances that are blocked in the Stopped state + Fix: pengine: Do not allow colocation with blocked clone instances [1.1.10-3] + Fix: pengine: Do not restart resources that depend on unmanaged resources + Fix: crmd: Prevent recurring monitors being cancelled due to notify operations [1.1.10-2] - Drop rgmanager 'provides' directive [1.1.10-1] - Update source tarball to revision: Pacemaker-1.1.10 - See included ChangeLog file or [link moved to references] for full details - Resolves: rhbz#891766 - Resolves: rhbz#902407 - Resolves: rhbz#908450 - Resolves: rhbz#913093 - Resolves: rhbz#951340 - Resolves: rhbz#951371 - Related: rhbz#987355 Affected Software/OS: 'pacemaker' package(s) on Oracle Linux 6. Solution: Please install the updated package(s). CVSS Score: 4.3 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-0281 RHSA-2013:1635 http://rhn.redhat.com/errata/RHSA-2013-1635.html https://bugzilla.redhat.com/show_bug.cgi?id=891922 https://github.com/ClusterLabs/pacemaker/commit/564f7cc2a51dcd2f28ab12a13394f31be5aa3c93 |
Copyright | Copyright (C) 2015 Greenbone AG |
Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |