![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.833299 |
Category: | SuSE Local Security Checks |
Title: | openSUSE: Security Advisory for wdiff (openSUSE-SU-2022:10031-1) |
Summary: | The remote host is missing an update for the 'wdiff'; package(s) announced via the openSUSE-SU-2022:10031-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'wdiff' package(s) announced via the openSUSE-SU-2022:10031-1 advisory. Vulnerability Insight: This update for wdiff fixes the following issues: This update ships wdiff. Updated to 1.2.2: * Updated Vietnamese, Swedish, Estonian, Chinese (traditional), Brazilian Portuguese and Russian translations. * Updated gnulib. * Used more recent autotools: autoconf 2.69 and automake 1.14.1. updated to 1.2.1: * Added Esperanto translation. * Updated Czech, German, Spanish, Finnish, Galician, Italian, Dutch, Polish, Slovenian, Serbian, Swedish, Ukrainian and Vietnamese translations. * Updated gnulib. * Recreated build system using recent versions of autotools. This will avoid security issues in 'make distcheck' target. (CVE-2012-3386) updated to 1.1.2: * Backport gnulib change to deal with removal of gets function. This is a build-time-only fix. (Mentioned in Fedora bug #821791) * Added Serbian translation. * Updated Danish and Vietnamese translations. * Work around a bug in the formatting of the man page. (Debian bug #669340) * Updated Czech, German, Spanish, Finnish, Dutch, Polish, Slovenian, Swedish and Ukrainian translations. * Fix several issue with the use of screen in the test suite. * Allow WDIFF_PAGER to override PAGER environment variable. * Do not autodetect less, so we don't auto-enable less-mode. This should improve things for UTF8 text. (Savannah bug #34224) Less-mode is considered deprecated, as it isn't fit for multi-byte encodings. Nevertheless it can still be enabled on the command line. * Introduces use of ngettext to allow correct handling of plural forms updated to 1.0.1: * Updated Polish, Ukrainian, Slovenian, Dutch, Finnish, Swedish and Czech translations * Changed major version to 1 to reflect maturity of the package * Updated Dutch, French, Danish and Slovenian translations * Added Ukrainian translation * Improved error reporting in case a child process has problems * Added tests to the test suite * Updated gnulib updated to 0.6.5: * Never initialize or deinitialize terminals, as we do no cursor movement * Deprecated --no-init-term (-K) command line option * Avoid relative path in man pages * Updated gnulib, might be particularly important for uClibc users updated to 0.6.4: * Updated Catalan translations * Updated gnulib update to 0.6.3: * `wdiff -d' to read input from single unified diff, perhaps stdin. * Updated texinfo documentation taking experimental switch ... Description truncated. Please see the references for more information. Affected Software/OS: 'wdiff' package(s) on openSUSE Backports SLE-15-SP4. Solution: Please install the updated package(s). CVSS Score: 4.4 CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-3386 FEDORA-2012-14297 http://lists.fedoraproject.org/pipermail/package-announce/2012-September/087665.html FEDORA-2012-14349 http://lists.fedoraproject.org/pipermail/package-announce/2012-September/087538.html FEDORA-2012-14770 http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089187.html MDVSA-2012:103 http://www.mandriva.com/security/advisories?name=MDVSA-2012:103 RHSA-2013:0526 http://rhn.redhat.com/errata/RHSA-2013-0526.html [automake] 20120709 CVE-2012-3386 Automake security fix for 'make distcheck' https://lists.gnu.org/archive/html/automake/2012-07/msg00023.html [automake] 20120709 GNU Automake 1.11.6 released (fixes a SECURITY VULNERABILITY!) https://lists.gnu.org/archive/html/automake/2012-07/msg00021.html [automake] 20120709 GNU Automake 1.12.2 released (fixes a SECURITY VULNERABILITY!) https://lists.gnu.org/archive/html/automake/2012-07/msg00022.html http://git.savannah.gnu.org/cgit/automake.git/commit/?id=784b3e6ccc7c72a1c95c340cbbe8897d6b689d76 openSUSE-SU-2012:1519 http://lists.opensuse.org/opensuse-updates/2012-11/msg00038.html |
Copyright | Copyright (C) 2024 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |