![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.123886 |
Category: | Oracle Linux Local Security Checks |
Title: | Oracle: Security Advisory (ELSA-2012-0774) |
Summary: | The remote host is missing an update for the 'libguestfs' package(s) announced via the ELSA-2012-0774 advisory. |
Description: | Summary: The remote host is missing an update for the 'libguestfs' package(s) announced via the ELSA-2012-0774 advisory. Vulnerability Insight: [1:1.16.19-1] - Rebase to libguestfs 1.16.19 resolves: rhbz#719879 - Rebuild against augeas 0.9.0-3.el6 related: rhbz#808662 - Fix: Don't abort inspection if mdadm.conf ARRAY doesn't have a uuid. - Switch back to git for patch management. [1:1.16.18-2] - Rebase to libguestfs 1.16.18 resolves: rhbz#719879 - Fix: guestfs_last_error not set when qemu fails early during launch resolves: rhbz#811673 - Fix: RFE: virt-sysprep: hostname can not be changed on rhel system (RHBZ#811112) - Fix: RFE: virt-sysprep: net-hwaddr not removed from ifcfg-* files on rhel (RHBZ#811117) - Fix: inspection fails on ubuntu 10.04 guest with encrypted swap (RHBZ#811872) - Fix: cannot open disk images which are symlinks to files that contain ':' (colon) character (RHBZ#812092) - BR gettext-devel so we can rerun autoconf. [1:1.16.15-1] - Rebase to libguestfs 1.16.15 resolves: rhbz#719879 - Fix: inspection doesn't recognize Fedora 17+ (RHBZ#809401) [1:1.16.14-1] - Rebase to libguestfs 1.16.14 resolves: rhbz#719879 - virt-sysprep should use virt-inspector2 resolves: rhbz#807557 - Fix: mkfs blocksize option breaks when creating btrfs resolves: rhbz#807905 [1:1.16.12-1] - Rebase to libguestfs 1.16.12 resolves: rhbz#719879 - Fix: could not locate HKLM\SYSTEM\MountedDevices resolves: rhbz#803699 [1:1.16.10-1] - Rebase to libguestfs 1.16.10 resolves: rhbz#719879 - Fix: libguestfs holds open file descriptors when handle is launched resolves: rhbz#801788 - Fix: Document for set-pgroup need to be updated resolves: rhbz#801273 - Fix: Possible null dereference and resource leaks resolves: rhbz#801298 [1:1.16.8-1] - Rebase to libguestfs 1.16.8 resolves: rhbz#719879 - Fix set_autosync function so it is not 'ConfigOnly' resolves: rhbz#796520 - Fix header compilation for C++ resolves: rhbz#799695 [1:1.16.6-1] - Rebase to libguesfs 1.16.6 resolves: rhbz#798197, rhbz#797760,rhbz#790958,rhbz#798980,rhbz#795322,rhbz#796520 - Fix virt-inspector2 man page. [1:1.16.5-1] - Rebase to libguestfs 1.16.5 resolves: rhbz#679737, rhbz#789960 [1:1.16.4-1] - Rebase to libguestfs 1.16.4 resolves: rhbz#788642 [1:1.16.3-1] - Rebase to libguestfs 1.16.3 resolves: rhbz#679737, rhbz#769359, rhbz#785305 [1:1.16.2-1] - Rebase to libguestfs 1.16.2 resolves: rhbz#719879 [1:1.16.1-1] - Rebase to libguestfs 1.16.1 - Disable tests (probably because we are hitting [link moved to references] ) resolves: rhbz#719879 [1:1.14.7-4] - Continue with rebase to libguestfs 1.14.7 resolves: rhbz#719879 [1:1.14.7-1] - Rebase to libguestfs 1.14.7 resolves: rhbz#719879 Affected Software/OS: 'libguestfs' package(s) on Oracle Linux 6. Solution: Please install the updated package(s). CVSS Score: 2.1 CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-2690 49431 http://secunia.com/advisories/49431 49545 http://secunia.com/advisories/49545 53932 http://www.securityfocus.com/bid/53932 RHSA-2012:0774 http://rhn.redhat.com/errata/RHSA-2012-0774.html [Libguestfs] 20120521 [ANNOUNCE] libguestfs 1.18 released - tools for managing virtual machines and disk images https://www.redhat.com/archives/libguestfs/2012-May/msg00104.html libguestfs-virtedit-info-disc(76220) https://exchange.xforce.ibmcloud.com/vulnerabilities/76220 |
Copyright | Copyright (C) 2015 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |