![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.122171 |
Kategorie: | Oracle Linux Local Security Checks |
Titel: | Oracle: Security Advisory (ELSA-2011-0554) |
Zusammenfassung: | The remote host is missing an update for the 'python, python-docs' package(s) announced via the ELSA-2011-0554 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'python, python-docs' package(s) announced via the ELSA-2011-0554 advisory. Vulnerability Insight: python: [2.6.6-20] Resolves: CVE-2010-3493 [2.6.6-19] Resolves: CVE-2011-1015 [2.6.6-18] Resolves: CVE-2011-1521 [2.6.6-17] - recompile against systemtap 1.4 Related: rhbz#569695 [2.6.6-16] - recompile against systemtap 1.4 Related: rhbz#569695 [2.6.6-15] - fix race condition that sometimes breaks the build with parallel make Resolves: rhbz#690315 [2.6.6-14] - backport pre-canned ways of salting a password to the 'crypt' module Resolves: rhbz#681878 [2.6.6-13] - move lib2to3/tests to the python-test subpackage Related: rhbz#625395 [2.6.6-12] - fix a new test in 2.6.6 that was failing on 64-bit big-endian architectures Resolves: rhbz#677392 [2.6.6-11] - fix incompatibility between 2.6.6 and our non-standard M2Crypto.SSL.SSLTimeoutError Resolves: rhbz#681811 [2.6.6-10] - add workaround for bug in rhythmbox-0.12 exposed by python 2.6.6 Resolves: rhbz#684991 [2.6.6-9] - prevent tracebacks for the 'py-bt' gdb command on x86_64 Resolves: rhbz#639392 [2.6.6-8] - fix a regression in 2.6.6 relative to 2.6.5 in urllib2 Resolves: rhbz#669847 [2.6.6-7] - add an optional 'timeout' argument to the subprocess module (patch 131) Resolves: rhbz#567229 [2.6.6-6] - prevent _sqlite3.so being built with a redundant RPATH of _libdir (patch 130) - remove DOS batch file 'idle.bat' - remove shebang lines from .py files that aren't executable, and remove executability from .py files that don't have a shebang line Related: rhbz#634944 - add 'Obsoletes: python-ssl' to core package, as 2.6 contains the ssl module Resolves: rhbz#529274 [2.6.6-5] - allow the 'no_proxy' environment variable to override 'ftp_proxy' in urllib2 (patch 128) Resolves: rhbz#637895 - make garbage-collection assertion failures more informative (patch 129) Resolves: rhbz#614680 [2.6.6-4] - backport subprocess fixes to use the 'poll' system call, rather than 'select' Resolves: rhbz#650588 [2.6.6-3] - use an ephemeral port for IDLE, enabling multiple instances to be run Resolves: rhbz#639222 - add systemtap static markers, tapsets, and example scripts Resolves: rhbz#569695 [2.6.6-2] - fix dbm.release on ppc64/s390x Resolves: rhbz#626756 - fix missing lib2to3 test files Resolves: rhbz#625395 - fix test.test_commands SELinux incompatibility Resolves: rhbz#625393 - make 'pydoc -k' more robust in the face of broken modules Resolves: rhbz#603073 [2.6.6-1] - rebase to 2.6.6: (which contains the big whitespace cleanup of r81031) [link moved to references] - fixup patch 102, patch 11, patch 52, patch 110 - drop upstreamed patches: patch 113 (CVE-2010-1634), patch 114 (CVE-2010-2089), patch 115 (CVE-2008-5983), patch 116 (rhbz598564), patch 118 (rhbz540518) - add fix for upstream bug in test_posix.py introduced in 2.6.6 (patch 120) Resolves: rhbz#627301 python-docs: [2.6.6-2] - rebuild [2.6.6-1] - rebase to 2.6.6 to track the main python package Related: rhbz#627301 Affected Software/OS: 'python, python-docs' package(s) on Oracle Linux 6. Solution: Please install the updated package(s). CVSS Score: 6.4 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2010-3493 BugTraq ID: 44533 http://www.securityfocus.com/bid/44533 http://www.mandriva.com/security/advisories?name=MDVSA-2010:215 http://www.mandriva.com/security/advisories?name=MDVSA-2010:216 http://bugs.python.org/issue6706 https://bugs.launchpad.net/zodb/+bug/135108 http://www.openwall.com/lists/oss-security/2010/09/09/6 http://www.openwall.com/lists/oss-security/2010/09/11/2 http://www.openwall.com/lists/oss-security/2010/09/22/3 http://www.openwall.com/lists/oss-security/2010/09/24/3 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12210 http://secunia.com/advisories/43068 http://secunia.com/advisories/50858 http://secunia.com/advisories/51024 http://secunia.com/advisories/51040 SuSE Security Announcement: SUSE-SR:2010:024 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html SuSE Security Announcement: SUSE-SR:2011:002 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html http://www.ubuntu.com/usn/USN-1596-1 http://www.ubuntu.com/usn/USN-1613-1 http://www.ubuntu.com/usn/USN-1613-2 http://www.vupen.com/english/advisories/2011/0212 Common Vulnerability Exposure (CVE) ID: CVE-2011-1015 1025489 http://securitytracker.com/id?1025489 46541 http://www.securityfocus.com/bid/46541 50858 51024 51040 MDVSA-2011:096 http://www.mandriva.com/security/advisories?name=MDVSA-2011:096 USN-1596-1 USN-1613-1 USN-1613-2 [oss-security] 20110223 CVE request: Information disclosure in CGIHTTPServer from Python http://openwall.com/lists/oss-security/2011/02/23/27 [oss-security] 20110224 Re: CVE request: Information disclosure in CGIHTTPServer from Python http://openwall.com/lists/oss-security/2011/02/24/10 http://bugs.python.org/issue2254 http://hg.python.org/cpython/rev/c6c4398293bd/ http://svn.python.org/view?view=revision&revision=71303 https://bugzilla.redhat.com/show_bug.cgi?id=680094 Common Vulnerability Exposure (CVE) ID: CVE-2011-1521 http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html http://openwall.com/lists/oss-security/2011/03/24/5 http://openwall.com/lists/oss-security/2011/03/28/2 http://openwall.com/lists/oss-security/2011/09/11/1 http://openwall.com/lists/oss-security/2011/09/13/2 http://openwall.com/lists/oss-security/2011/09/15/5 http://securitytracker.com/id?1025488 SuSE Security Announcement: SUSE-SR:2011:009 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html http://www.ubuntu.com/usn/USN-1592-1 |
Copyright | Copyright (C) 2015 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |