![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.123895 |
Categoría: | Oracle Linux Local Security Checks |
Título: | Oracle: Security Advisory (ELSA-2012-0841) |
Resumen: | The remote host is missing an update for the 'abrt, btparser, libreport, python-meh' package(s) announced via the ELSA-2012-0841 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'abrt, btparser, libreport, python-meh' package(s) announced via the ELSA-2012-0841 advisory. Vulnerability Insight: abrt [2.0.8-6.0.1.el6] - Add abrt-oracle-enterprise.patch to be product neutral - Remove abrt-plugin-rhtsupport dependency for cli and desktop - Make abrt Obsoletes/Provides abrt-plugin-rhtsupprot [2.0.8-6] - enable plugin services after install rhbz#820515 - Resolves: #820515 [2.0.8-5] - removed the 'report problem with ABRT btn' rhbz#809587 - fixed double free - fixed ccpp-install man page - Resolves: #809587, #796216, #799027 [2.0.8-4] - don't mark reports reported in post-create by mailx as reported - Resolves: #803618 [2.0.8-3] - fixed remote crash handling rhbz#800828 - Resolves: #800828 [2.0.8-2] - updated translation - added man page for a-a-analyze-vmcore - minor fixes in kernel oops parser - Related: #759375 [2.0.8-1] - rebase to the latest upstream - partly fixed problems with suided cores - fixed confusing message about 'moved copy' - properly enable daemons on update from previous version - added default config file for mailx - cli doesn't depend on python plugin - properly init i18n all plugins - added missing man page to abrt-cli - added warning when user tries to report already reported problem again - added vmcores plugin - Resolves: #759375, #783450, #773242, #771597, #770357, #751068, #749100, #747624, #727494 btparser [0.16-3] - Report correct crash_function in the crash summary Resolves: rhbz#811147 [0.16-1] - New upstream release Resolves: #768377 libreport [2.0.9-5.0.1.el6] - Add oracle-enterprise.patch - Remove libreport-plugin-rhtsupport pkg [2.0.9-5] - rebuild due to rpmdiff - Resolves: #823411 [2.0.9-4] - fixed compatibility with bugzilla 4.2 - Resolves: #823411 [2.0.9-3] - added notify-only option to mailx rhbz#803618 - Resolves: #803618 [2.0.9-2] - minor fix in debuginfo downloader - updated translations - Related: #759377 [2.0.9-1] - new upstream release - fixed typos in man - fixed handling of anaconda-tb file - generate valid xml file - Resolves: #759377, #758366, #746727 python-meh [0.12.1-3] - Add dbus-python and libreport to BuildRequires (vpodzime). Related: rhbz#796176 [0.12.1-2] - Add %check unset DISPLAY section to spec file (vpodzime). Resolves: rhbz#796176 [0.12.1-1] - Adapt to new libreport API (vpodzime). Resolves: rhbz#769821 - Add info about environment variables (vpodzime). Resolves: rhbz#788577 [0.11-3] - Move 'import rpm' to where its needed to avoid nameserver problems. Resolves: rhbz#749330 [0.11-2] - Change dependency to libreport-* (mtoman) Resolves: rhbz#730924 - Add abrt-like information to bug reports (vpodzime). Resolves: rhbz#728871 Affected Software/OS: 'abrt, btparser, libreport, python-meh' package(s) on Oracle Linux 6. Solution: Please install the updated package(s). CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-4088 http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071027.html https://exchange.xforce.ibmcloud.com/vulnerabilities/71871 Common Vulnerability Exposure (CVE) ID: CVE-2012-1106 54121 http://www.securityfocus.com/bid/54121 RHSA-2012:0841 http://rhn.redhat.com/errata/RHSA-2012-0841.html abrt-info-disc(76524) https://exchange.xforce.ibmcloud.com/vulnerabilities/76524 https://fedorahosted.org/abrt/changeset/23d6997d7886abe118c28254f7f73f0b19b2d4e0 |
Copyright | Copyright (C) 2015 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |