![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.123895 |
Kategorie: | Oracle Linux Local Security Checks |
Titel: | Oracle: Security Advisory (ELSA-2012-0841) |
Zusammenfassung: | The remote host is missing an update for the 'abrt, btparser, libreport, python-meh' package(s) announced via the ELSA-2012-0841 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'abrt, btparser, libreport, python-meh' package(s) announced via the ELSA-2012-0841 advisory. Vulnerability Insight: abrt [2.0.8-6.0.1.el6] - Add abrt-oracle-enterprise.patch to be product neutral - Remove abrt-plugin-rhtsupport dependency for cli and desktop - Make abrt Obsoletes/Provides abrt-plugin-rhtsupprot [2.0.8-6] - enable plugin services after install rhbz#820515 - Resolves: #820515 [2.0.8-5] - removed the 'report problem with ABRT btn' rhbz#809587 - fixed double free - fixed ccpp-install man page - Resolves: #809587, #796216, #799027 [2.0.8-4] - don't mark reports reported in post-create by mailx as reported - Resolves: #803618 [2.0.8-3] - fixed remote crash handling rhbz#800828 - Resolves: #800828 [2.0.8-2] - updated translation - added man page for a-a-analyze-vmcore - minor fixes in kernel oops parser - Related: #759375 [2.0.8-1] - rebase to the latest upstream - partly fixed problems with suided cores - fixed confusing message about 'moved copy' - properly enable daemons on update from previous version - added default config file for mailx - cli doesn't depend on python plugin - properly init i18n all plugins - added missing man page to abrt-cli - added warning when user tries to report already reported problem again - added vmcores plugin - Resolves: #759375, #783450, #773242, #771597, #770357, #751068, #749100, #747624, #727494 btparser [0.16-3] - Report correct crash_function in the crash summary Resolves: rhbz#811147 [0.16-1] - New upstream release Resolves: #768377 libreport [2.0.9-5.0.1.el6] - Add oracle-enterprise.patch - Remove libreport-plugin-rhtsupport pkg [2.0.9-5] - rebuild due to rpmdiff - Resolves: #823411 [2.0.9-4] - fixed compatibility with bugzilla 4.2 - Resolves: #823411 [2.0.9-3] - added notify-only option to mailx rhbz#803618 - Resolves: #803618 [2.0.9-2] - minor fix in debuginfo downloader - updated translations - Related: #759377 [2.0.9-1] - new upstream release - fixed typos in man - fixed handling of anaconda-tb file - generate valid xml file - Resolves: #759377, #758366, #746727 python-meh [0.12.1-3] - Add dbus-python and libreport to BuildRequires (vpodzime). Related: rhbz#796176 [0.12.1-2] - Add %check unset DISPLAY section to spec file (vpodzime). Resolves: rhbz#796176 [0.12.1-1] - Adapt to new libreport API (vpodzime). Resolves: rhbz#769821 - Add info about environment variables (vpodzime). Resolves: rhbz#788577 [0.11-3] - Move 'import rpm' to where its needed to avoid nameserver problems. Resolves: rhbz#749330 [0.11-2] - Change dependency to libreport-* (mtoman) Resolves: rhbz#730924 - Add abrt-like information to bug reports (vpodzime). Resolves: rhbz#728871 Affected Software/OS: 'abrt, btparser, libreport, python-meh' package(s) on Oracle Linux 6. Solution: Please install the updated package(s). CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-4088 http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071027.html https://exchange.xforce.ibmcloud.com/vulnerabilities/71871 Common Vulnerability Exposure (CVE) ID: CVE-2012-1106 54121 http://www.securityfocus.com/bid/54121 RHSA-2012:0841 http://rhn.redhat.com/errata/RHSA-2012-0841.html abrt-info-disc(76524) https://exchange.xforce.ibmcloud.com/vulnerabilities/76524 https://fedorahosted.org/abrt/changeset/23d6997d7886abe118c28254f7f73f0b19b2d4e0 |
Copyright | Copyright (C) 2015 Greenbone AG |
Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |