Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.70440
Category:CentOS Local Security Checks
Title:CentOS Security Advisory CESA-2011:1349 (rpm)
Summary:NOSUMMARY
Description:Description:
The remote host is missing updates to rpm announced in
advisory CESA-2011:1349.

For details on the issues addressed in this update,
please visit the referenced security advisories.

Solution:
Update the appropriate packages on your system.

http://www.securityspace.com/smysecure/catid.html?in=CESA-2011:1349
http://www.securityspace.com/smysecure/catid.html?in=RHSA-2011:1349
https://rhn.redhat.com/errata/RHSA-2011-1349.html

Risk factor : High

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-3378
MDVSA-2011:143
http://www.mandriva.com/security/advisories?name=MDVSA-2011:143
RHSA-2011:1349
http://www.redhat.com/support/errata/RHSA-2011-1349.html
SUSE-SU-2011:1140
http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00002.html
USN-1695-1
http://www.ubuntu.com/usn/USN-1695-1
[oss-security] 20110927 rpm/librpm/rpm-python memory corruption pre-verification
http://www.openwall.com/lists/oss-security/2011/09/27/3
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691
http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=11a7e5d95a8ca8c7d4eaff179094afd8bb74fc3f
http://rpm.org/gitweb?p=rpm.git%3Ba=commitdiff%3Bh=a48f0e20cbe2ababc88b2fc52fb7a281d6fc1656
http://rpm.org/wiki/Releases/4.9.1.2#Security
https://bugzilla.redhat.com/show_bug.cgi?id=741606
https://bugzilla.redhat.com/show_bug.cgi?id=741612
openSUSE-SU-2011:1203
http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00000.html
CopyrightCopyright (c) 2012 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.