Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.123895
Categoría:Oracle Linux Local Security Checks
Título:Oracle: Security Advisory (ELSA-2012-0841)
Resumen:The remote host is missing an update for the 'abrt, btparser, libreport, python-meh' package(s) announced via the ELSA-2012-0841 advisory.
Descripción:Summary:
The remote host is missing an update for the 'abrt, btparser, libreport, python-meh' package(s) announced via the ELSA-2012-0841 advisory.

Vulnerability Insight:
abrt
[2.0.8-6.0.1.el6]
- Add abrt-oracle-enterprise.patch to be product neutral
- Remove abrt-plugin-rhtsupport dependency for cli and desktop
- Make abrt Obsoletes/Provides abrt-plugin-rhtsupprot

[2.0.8-6]
- enable plugin services after install rhbz#820515
- Resolves: #820515

[2.0.8-5]
- removed the 'report problem with ABRT btn' rhbz#809587
- fixed double free
- fixed ccpp-install man page
- Resolves: #809587, #796216, #799027

[2.0.8-4]
- don't mark reports reported in post-create by mailx as reported
- Resolves: #803618

[2.0.8-3]
- fixed remote crash handling rhbz#800828
- Resolves: #800828

[2.0.8-2]
- updated translation
- added man page for a-a-analyze-vmcore
- minor fixes in kernel oops parser
- Related: #759375

[2.0.8-1]
- rebase to the latest upstream
- partly fixed problems with suided cores
- fixed confusing message about 'moved copy'
- properly enable daemons on update from previous version
- added default config file for mailx
- cli doesn't depend on python plugin
- properly init i18n all plugins
- added missing man page to abrt-cli
- added warning when user tries to report already reported problem again
- added vmcores plugin
- Resolves: #759375, #783450, #773242, #771597, #770357, #751068, #749100, #747624, #727494

btparser
[0.16-3]
- Report correct crash_function in the crash summary
Resolves: rhbz#811147

[0.16-1]
- New upstream release
Resolves: #768377

libreport
[2.0.9-5.0.1.el6]
- Add oracle-enterprise.patch
- Remove libreport-plugin-rhtsupport pkg

[2.0.9-5]
- rebuild due to rpmdiff
- Resolves: #823411

[2.0.9-4]
- fixed compatibility with bugzilla 4.2
- Resolves: #823411

[2.0.9-3]
- added notify-only option to mailx rhbz#803618
- Resolves: #803618

[2.0.9-2]
- minor fix in debuginfo downloader
- updated translations
- Related: #759377

[2.0.9-1]
- new upstream release
- fixed typos in man
- fixed handling of anaconda-tb file
- generate valid xml file
- Resolves: #759377, #758366, #746727

python-meh
[0.12.1-3]
- Add dbus-python and libreport to BuildRequires (vpodzime).
Related: rhbz#796176

[0.12.1-2]
- Add %check
unset DISPLAY
section to spec file (vpodzime).
Resolves: rhbz#796176

[0.12.1-1]
- Adapt to new libreport API (vpodzime).
Resolves: rhbz#769821
- Add info about environment variables (vpodzime).
Resolves: rhbz#788577

[0.11-3]
- Move 'import rpm' to where its needed to avoid nameserver problems.
Resolves: rhbz#749330

[0.11-2]
- Change dependency to libreport-* (mtoman)
Resolves: rhbz#730924
- Add abrt-like information to bug reports (vpodzime).
Resolves: rhbz#728871

Affected Software/OS:
'abrt, btparser, libreport, python-meh' package(s) on Oracle Linux 6.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2011-4088
http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071027.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/71871
Common Vulnerability Exposure (CVE) ID: CVE-2012-1106
54121
http://www.securityfocus.com/bid/54121
RHSA-2012:0841
http://rhn.redhat.com/errata/RHSA-2012-0841.html
abrt-info-disc(76524)
https://exchange.xforce.ibmcloud.com/vulnerabilities/76524
https://fedorahosted.org/abrt/changeset/23d6997d7886abe118c28254f7f73f0b19b2d4e0
CopyrightCopyright (C) 2015 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.