![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.123514 |
Categoría: | Oracle Linux Local Security Checks |
Título: | Oracle: Security Advisory (ELSA-2013-1635) |
Resumen: | The remote host is missing an update for the 'pacemaker' package(s) announced via the ELSA-2013-1635 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'pacemaker' package(s) announced via the ELSA-2013-1635 advisory. Vulnerability Insight: [1.1.10-14] - Log: crmd: Supply arguments in the correct order Resolves: rhbz#996850 - Fix: Invalid formatting of log message causes crash Resolves: rhbz#996850 [1.1.10-13] - Fix: cman: Start clvmd and friends from the init script if enabled [1.1.10-12] - Fix: Consistently use 'Slave' as the role for unpromoted master/slave resources Resolves: rhbz#1011618 - Fix: pengine: Location constraints with role=Started should prevent masters from running at all Resolves: rhbz#902407 - Fix: crm_resource: Observe --master modifier for --move Resolves: rhbz#902407 [1.1.10-11] + Fix: cman: Do not start pacemaker if cman startup fails + Fix: Fencing: Observe pcmk_host_list during automatic unfencing Resolves: rhbz#996850 [1.1.10-10] - Remove unsupported resource agent Resolves: rhbz#1005678 - Provide a meaningful error if --master is used for primitives and groups [1.1.10-9] + Fix: xml: Location constraints are allowed to specify a role + Bug rhbz#902407 - crm_resource: Handle --ban for master/slave resources as advertised Resolves: rhbz#902407 [1.1.10-8] + Fix: mcp: Remove LSB hints that instruct chkconfig to start pacemaker at boot time Resolves: rhbz#997346 [1.1.10-7] + Fencing: Support agents that need the host to be unfenced at startup Resolves: rhbz#996850 + Fix: crm_report: Collect corosync quorum data Resolves: rhbz#989292 [1.1.10-6] - Regenerate patches to have meaningful names [1.1.10-5] + Fix: systemd: Prevent glib assertion - only call g_error_free with non-NULL arguments + Fix: systemd: Prevent additional use-of-NULL assertions in g_error_free + Fix: logging: glib CRIT messages should not produce core files in the background + Fix: crmd: Correctly update the history cache when recurring ops change their return code + Log: crm_mon: Unmangle the output for failed operations + Log: cib: Correctly log short-form xml diffs + Log: pengine: Better indicate when a resource has failed [1.1.10-4] + Fix: crmd: Prevent crash by passing log arguments in the correct order + Fix: pengine: Do not re-allocate clone instances that are blocked in the Stopped state + Fix: pengine: Do not allow colocation with blocked clone instances [1.1.10-3] + Fix: pengine: Do not restart resources that depend on unmanaged resources + Fix: crmd: Prevent recurring monitors being cancelled due to notify operations [1.1.10-2] - Drop rgmanager 'provides' directive [1.1.10-1] - Update source tarball to revision: Pacemaker-1.1.10 - See included ChangeLog file or [link moved to references] for full details - Resolves: rhbz#891766 - Resolves: rhbz#902407 - Resolves: rhbz#908450 - Resolves: rhbz#913093 - Resolves: rhbz#951340 - Resolves: rhbz#951371 - Related: rhbz#987355 Affected Software/OS: 'pacemaker' package(s) on Oracle Linux 6. Solution: Please install the updated package(s). CVSS Score: 4.3 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-0281 RHSA-2013:1635 http://rhn.redhat.com/errata/RHSA-2013-1635.html https://bugzilla.redhat.com/show_bug.cgi?id=891922 https://github.com/ClusterLabs/pacemaker/commit/564f7cc2a51dcd2f28ab12a13394f31be5aa3c93 |
Copyright | Copyright (C) 2015 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |