Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.122171
Kategorie:Oracle Linux Local Security Checks
Titel:Oracle: Security Advisory (ELSA-2011-0554)
Zusammenfassung:The remote host is missing an update for the 'python, python-docs' package(s) announced via the ELSA-2011-0554 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'python, python-docs' package(s) announced via the ELSA-2011-0554 advisory.

Vulnerability Insight:
python:
[2.6.6-20]
Resolves: CVE-2010-3493

[2.6.6-19]
Resolves: CVE-2011-1015

[2.6.6-18]
Resolves: CVE-2011-1521

[2.6.6-17]
- recompile against systemtap 1.4
Related: rhbz#569695

[2.6.6-16]
- recompile against systemtap 1.4
Related: rhbz#569695

[2.6.6-15]
- fix race condition that sometimes breaks the build with parallel make
Resolves: rhbz#690315

[2.6.6-14]
- backport pre-canned ways of salting a password to the 'crypt' module
Resolves: rhbz#681878

[2.6.6-13]
- move lib2to3/tests to the python-test subpackage
Related: rhbz#625395

[2.6.6-12]
- fix a new test in 2.6.6 that was failing on 64-bit big-endian architectures
Resolves: rhbz#677392

[2.6.6-11]
- fix incompatibility between 2.6.6 and our non-standard M2Crypto.SSL.SSLTimeoutError
Resolves: rhbz#681811

[2.6.6-10]
- add workaround for bug in rhythmbox-0.12 exposed by python 2.6.6
Resolves: rhbz#684991

[2.6.6-9]
- prevent tracebacks for the 'py-bt' gdb command on x86_64
Resolves: rhbz#639392

[2.6.6-8]
- fix a regression in 2.6.6 relative to 2.6.5 in urllib2
Resolves: rhbz#669847

[2.6.6-7]
- add an optional 'timeout' argument to the subprocess module (patch 131)
Resolves: rhbz#567229

[2.6.6-6]
- prevent _sqlite3.so being built with a redundant RPATH of _libdir (patch 130)
- remove DOS batch file 'idle.bat'
- remove shebang lines from .py files that aren't executable, and remove
executability from .py files that don't have a shebang line
Related: rhbz#634944
- add 'Obsoletes: python-ssl' to core package, as 2.6 contains the ssl module
Resolves: rhbz#529274

[2.6.6-5]
- allow the 'no_proxy' environment variable to override 'ftp_proxy' in
urllib2 (patch 128)
Resolves: rhbz#637895
- make garbage-collection assertion failures more informative (patch 129)
Resolves: rhbz#614680

[2.6.6-4]
- backport subprocess fixes to use the 'poll' system call, rather than 'select'
Resolves: rhbz#650588

[2.6.6-3]
- use an ephemeral port for IDLE, enabling multiple instances to be run
Resolves: rhbz#639222
- add systemtap static markers, tapsets, and example scripts
Resolves: rhbz#569695

[2.6.6-2]
- fix dbm.release on ppc64/s390x
Resolves: rhbz#626756
- fix missing lib2to3 test files
Resolves: rhbz#625395
- fix test.test_commands SELinux incompatibility
Resolves: rhbz#625393
- make 'pydoc -k' more robust in the face of broken modules
Resolves: rhbz#603073

[2.6.6-1]
- rebase to 2.6.6: (which contains the big whitespace cleanup of r81031)
[link moved to references]
- fixup patch 102, patch 11, patch 52, patch 110
- drop upstreamed patches: patch 113 (CVE-2010-1634), patch 114
(CVE-2010-2089), patch 115 (CVE-2008-5983), patch 116 (rhbz598564),
patch 118 (rhbz540518)
- add fix for upstream bug in test_posix.py introduced in 2.6.6 (patch 120)
Resolves: rhbz#627301

python-docs:

[2.6.6-2]
- rebuild

[2.6.6-1]
- rebase to 2.6.6 to track the main python package
Related: rhbz#627301

Affected Software/OS:
'python, python-docs' package(s) on Oracle Linux 6.

Solution:
Please install the updated package(s).

CVSS Score:
6.4

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2010-3493
BugTraq ID: 44533
http://www.securityfocus.com/bid/44533
http://www.mandriva.com/security/advisories?name=MDVSA-2010:215
http://www.mandriva.com/security/advisories?name=MDVSA-2010:216
http://bugs.python.org/issue6706
https://bugs.launchpad.net/zodb/+bug/135108
http://www.openwall.com/lists/oss-security/2010/09/09/6
http://www.openwall.com/lists/oss-security/2010/09/11/2
http://www.openwall.com/lists/oss-security/2010/09/22/3
http://www.openwall.com/lists/oss-security/2010/09/24/3
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12210
http://secunia.com/advisories/43068
http://secunia.com/advisories/50858
http://secunia.com/advisories/51024
http://secunia.com/advisories/51040
SuSE Security Announcement: SUSE-SR:2010:024 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
SuSE Security Announcement: SUSE-SR:2011:002 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://www.ubuntu.com/usn/USN-1596-1
http://www.ubuntu.com/usn/USN-1613-1
http://www.ubuntu.com/usn/USN-1613-2
http://www.vupen.com/english/advisories/2011/0212
Common Vulnerability Exposure (CVE) ID: CVE-2011-1015
1025489
http://securitytracker.com/id?1025489
46541
http://www.securityfocus.com/bid/46541
50858
51024
51040
MDVSA-2011:096
http://www.mandriva.com/security/advisories?name=MDVSA-2011:096
USN-1596-1
USN-1613-1
USN-1613-2
[oss-security] 20110223 CVE request: Information disclosure in CGIHTTPServer from Python
http://openwall.com/lists/oss-security/2011/02/23/27
[oss-security] 20110224 Re: CVE request: Information disclosure in CGIHTTPServer from Python
http://openwall.com/lists/oss-security/2011/02/24/10
http://bugs.python.org/issue2254
http://hg.python.org/cpython/rev/c6c4398293bd/
http://svn.python.org/view?view=revision&revision=71303
https://bugzilla.redhat.com/show_bug.cgi?id=680094
Common Vulnerability Exposure (CVE) ID: CVE-2011-1521
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
http://openwall.com/lists/oss-security/2011/03/24/5
http://openwall.com/lists/oss-security/2011/03/28/2
http://openwall.com/lists/oss-security/2011/09/11/1
http://openwall.com/lists/oss-security/2011/09/13/2
http://openwall.com/lists/oss-security/2011/09/15/5
http://securitytracker.com/id?1025488
SuSE Security Announcement: SUSE-SR:2011:009 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
http://www.ubuntu.com/usn/USN-1592-1
CopyrightCopyright (C) 2015 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.