Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.123895
Kategorie:Oracle Linux Local Security Checks
Titel:Oracle: Security Advisory (ELSA-2012-0841)
Zusammenfassung:The remote host is missing an update for the 'abrt, btparser, libreport, python-meh' package(s) announced via the ELSA-2012-0841 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'abrt, btparser, libreport, python-meh' package(s) announced via the ELSA-2012-0841 advisory.

Vulnerability Insight:
abrt
[2.0.8-6.0.1.el6]
- Add abrt-oracle-enterprise.patch to be product neutral
- Remove abrt-plugin-rhtsupport dependency for cli and desktop
- Make abrt Obsoletes/Provides abrt-plugin-rhtsupprot

[2.0.8-6]
- enable plugin services after install rhbz#820515
- Resolves: #820515

[2.0.8-5]
- removed the 'report problem with ABRT btn' rhbz#809587
- fixed double free
- fixed ccpp-install man page
- Resolves: #809587, #796216, #799027

[2.0.8-4]
- don't mark reports reported in post-create by mailx as reported
- Resolves: #803618

[2.0.8-3]
- fixed remote crash handling rhbz#800828
- Resolves: #800828

[2.0.8-2]
- updated translation
- added man page for a-a-analyze-vmcore
- minor fixes in kernel oops parser
- Related: #759375

[2.0.8-1]
- rebase to the latest upstream
- partly fixed problems with suided cores
- fixed confusing message about 'moved copy'
- properly enable daemons on update from previous version
- added default config file for mailx
- cli doesn't depend on python plugin
- properly init i18n all plugins
- added missing man page to abrt-cli
- added warning when user tries to report already reported problem again
- added vmcores plugin
- Resolves: #759375, #783450, #773242, #771597, #770357, #751068, #749100, #747624, #727494

btparser
[0.16-3]
- Report correct crash_function in the crash summary
Resolves: rhbz#811147

[0.16-1]
- New upstream release
Resolves: #768377

libreport
[2.0.9-5.0.1.el6]
- Add oracle-enterprise.patch
- Remove libreport-plugin-rhtsupport pkg

[2.0.9-5]
- rebuild due to rpmdiff
- Resolves: #823411

[2.0.9-4]
- fixed compatibility with bugzilla 4.2
- Resolves: #823411

[2.0.9-3]
- added notify-only option to mailx rhbz#803618
- Resolves: #803618

[2.0.9-2]
- minor fix in debuginfo downloader
- updated translations
- Related: #759377

[2.0.9-1]
- new upstream release
- fixed typos in man
- fixed handling of anaconda-tb file
- generate valid xml file
- Resolves: #759377, #758366, #746727

python-meh
[0.12.1-3]
- Add dbus-python and libreport to BuildRequires (vpodzime).
Related: rhbz#796176

[0.12.1-2]
- Add %check
unset DISPLAY
section to spec file (vpodzime).
Resolves: rhbz#796176

[0.12.1-1]
- Adapt to new libreport API (vpodzime).
Resolves: rhbz#769821
- Add info about environment variables (vpodzime).
Resolves: rhbz#788577

[0.11-3]
- Move 'import rpm' to where its needed to avoid nameserver problems.
Resolves: rhbz#749330

[0.11-2]
- Change dependency to libreport-* (mtoman)
Resolves: rhbz#730924
- Add abrt-like information to bug reports (vpodzime).
Resolves: rhbz#728871

Affected Software/OS:
'abrt, btparser, libreport, python-meh' package(s) on Oracle Linux 6.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2011-4088
http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071027.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/71871
Common Vulnerability Exposure (CVE) ID: CVE-2012-1106
54121
http://www.securityfocus.com/bid/54121
RHSA-2012:0841
http://rhn.redhat.com/errata/RHSA-2012-0841.html
abrt-info-disc(76524)
https://exchange.xforce.ibmcloud.com/vulnerabilities/76524
https://fedorahosted.org/abrt/changeset/23d6997d7886abe118c28254f7f73f0b19b2d4e0
CopyrightCopyright (C) 2015 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.