Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.122782
Category:Oracle Linux Local Security Checks
Title:Oracle: Security Advisory (ELSA-2015-2315)
Summary:The remote host is missing an update for the 'ModemManager, NetworkManager, NetworkManager-libreswan, network-manager-applet' package(s) announced via the ELSA-2015-2315 advisory.
Description:Summary:
The remote host is missing an update for the 'ModemManager, NetworkManager, NetworkManager-libreswan, network-manager-applet' package(s) announced via the ELSA-2015-2315 advisory.

Vulnerability Insight:
ModemManager
[1.1.0-8.git20130913]
- rfcomm: don't open the ttys until NetworkManager connects them (rh #1251954)

[1.1.0-7.git20130913]
- iface-modem: fix MODEM_STATE_IS_INTERMEDIATE macro (rh #1200958)

NetworkManager
[1.0.6-27.0.1]
- fix build error on i386

[1:1.0.6-27]
* build: update vala-tools build requirement (rh #1274000)

[1:1.0.6-26]
- wifi: emit NEW_BSS on ScanDone to update APs in Wi-Fi device (rh #1267327)

[1:1.0.6-25]
- vpn: cancel the secrets request on agent timeout (rh #1272023)
- vpn: cancel the connect timer when vpn reconnects (rh #1272023)

[1:1.0.6-24]
- device: fix problem in not managing software devices (rh #1273879)

[1:1.0.6-23]
- wake-on-lan: ignore by default existing settings (rh #1270194)

[1:1.0.6-22]
- platform: fix detection of s390 CTC device (rh #1272974)
- core: fix queuing activation while waiting for carrier (rh #1079353)

[1:1.0.6-21]
- core: fix invalid assertion in nm_clear_g_signal_handler() (rh #1183444)

[1:1.0.6-20]
- rebuild package

[1:1.0.6-19]
- device: fix race wrongly managing external-down device (2) (rh #1269199)

[1:1.0.6-18]
- device/vlan: update VLAN MAC address when parent's one changes

[1:1.0.6-17]
- dhcp6: destroy the lease when destroying a client (rh #1260727)
- device: fix race wrongly managing external-down device (rh #1269199)

[1:1.0.6-16]
- device: silence spurious errors about activation schedule (rh #1269520)

[1:1.0.6-15]
- core: really fix enslaving team device to bridge (rh #1183444)

[1:1.0.6-14]
- platform: updating link cache when moving link to other netns (rh #1264361)
- nmtui: fix possible crash during secret request (rh #1267672)
- vpn: increase the plugin inactivity quit timer (rh #1268030)
- core: fix enslaving team device to bridge (rh #1183444)

[1:1.0.6-13]
- vpn-connection: set the MTU for the VPN IP interface (rh #1267004)
- modem-broadband: update modem's supported-ip-families (rh #1263959)
- wifi: fix a crash in on_bss_proxy_acquired() (rh #1267462)

[1:1.0.6-12]
- core: increase IPv6LL DAD timeout to 15 seconds (rh #1101809)

[1:1.0.6-11]
- platform: better handle devices without permanent address (rh #1264024)

[1:1.0.6-10]
- dhcp: fix crash in internal DHCP client (rh #1260727)

[1:1.0.6-9]
- build: fix installing language files (rh #1265117)

[1:1.0.6-8]
- nmcli: allow creating ADSL connections with 'nmcli connection add' (rh #1264089)

[1:1.0.6-7]
- ifcfg-rh: ignore GATEWAY from network file for DHCP connections (rh #1262972)

[1:1.0.6-6]
- device: retry DHCP after timeout/expiration for assumed connections (rh #1246496)
- device: retry creation of default connection after link is initialized (rh #1254089)

[1:1.0.6-5]
- config: add code comments to NetworkManager.conf file
- iface-helper: enabled slaac/dhcp4 based on connection setting only (rh #1260243)
- utils: avoid generation of duplicated assumed connection for veth devices (rh #1256430)
- nmcli: improve handling of ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'ModemManager, NetworkManager, NetworkManager-libreswan, network-manager-applet' package(s) on Oracle Linux 7.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-0272
76814
http://www.securityfocus.com/bid/76814
SUSE-SU-2015:2108
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
SUSE-SU-2015:2194
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
SUSE-SU-2015:2292
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html
SUSE-SU-2015:2339
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
SUSE-SU-2015:2350
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
SUSE-SU-2016:0354
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
SUSE-SU-2016:2074
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
USN-2792-1
http://www.ubuntu.com/usn/USN-2792-1
http://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=d5fc88e573fa58b93034b04d35a2454f5d28cad9
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
https://bugzilla.redhat.com/show_bug.cgi?id=1192132
Common Vulnerability Exposure (CVE) ID: CVE-2015-2924
BugTraq ID: 76879
http://www.securityfocus.com/bid/76879
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158103.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157803.html
https://security.gentoo.org/glsa/201509-05
http://openwall.com/lists/oss-security/2015/04/04/2
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.