Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.123895
Category:Oracle Linux Local Security Checks
Title:Oracle: Security Advisory (ELSA-2012-0841)
Summary:The remote host is missing an update for the 'abrt, btparser, libreport, python-meh' package(s) announced via the ELSA-2012-0841 advisory.
Description:Summary:
The remote host is missing an update for the 'abrt, btparser, libreport, python-meh' package(s) announced via the ELSA-2012-0841 advisory.

Vulnerability Insight:
abrt
[2.0.8-6.0.1.el6]
- Add abrt-oracle-enterprise.patch to be product neutral
- Remove abrt-plugin-rhtsupport dependency for cli and desktop
- Make abrt Obsoletes/Provides abrt-plugin-rhtsupprot

[2.0.8-6]
- enable plugin services after install rhbz#820515
- Resolves: #820515

[2.0.8-5]
- removed the 'report problem with ABRT btn' rhbz#809587
- fixed double free
- fixed ccpp-install man page
- Resolves: #809587, #796216, #799027

[2.0.8-4]
- don't mark reports reported in post-create by mailx as reported
- Resolves: #803618

[2.0.8-3]
- fixed remote crash handling rhbz#800828
- Resolves: #800828

[2.0.8-2]
- updated translation
- added man page for a-a-analyze-vmcore
- minor fixes in kernel oops parser
- Related: #759375

[2.0.8-1]
- rebase to the latest upstream
- partly fixed problems with suided cores
- fixed confusing message about 'moved copy'
- properly enable daemons on update from previous version
- added default config file for mailx
- cli doesn't depend on python plugin
- properly init i18n all plugins
- added missing man page to abrt-cli
- added warning when user tries to report already reported problem again
- added vmcores plugin
- Resolves: #759375, #783450, #773242, #771597, #770357, #751068, #749100, #747624, #727494

btparser
[0.16-3]
- Report correct crash_function in the crash summary
Resolves: rhbz#811147

[0.16-1]
- New upstream release
Resolves: #768377

libreport
[2.0.9-5.0.1.el6]
- Add oracle-enterprise.patch
- Remove libreport-plugin-rhtsupport pkg

[2.0.9-5]
- rebuild due to rpmdiff
- Resolves: #823411

[2.0.9-4]
- fixed compatibility with bugzilla 4.2
- Resolves: #823411

[2.0.9-3]
- added notify-only option to mailx rhbz#803618
- Resolves: #803618

[2.0.9-2]
- minor fix in debuginfo downloader
- updated translations
- Related: #759377

[2.0.9-1]
- new upstream release
- fixed typos in man
- fixed handling of anaconda-tb file
- generate valid xml file
- Resolves: #759377, #758366, #746727

python-meh
[0.12.1-3]
- Add dbus-python and libreport to BuildRequires (vpodzime).
Related: rhbz#796176

[0.12.1-2]
- Add %check
unset DISPLAY
section to spec file (vpodzime).
Resolves: rhbz#796176

[0.12.1-1]
- Adapt to new libreport API (vpodzime).
Resolves: rhbz#769821
- Add info about environment variables (vpodzime).
Resolves: rhbz#788577

[0.11-3]
- Move 'import rpm' to where its needed to avoid nameserver problems.
Resolves: rhbz#749330

[0.11-2]
- Change dependency to libreport-* (mtoman)
Resolves: rhbz#730924
- Add abrt-like information to bug reports (vpodzime).
Resolves: rhbz#728871

Affected Software/OS:
'abrt, btparser, libreport, python-meh' package(s) on Oracle Linux 6.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-4088
http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071027.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/71871
Common Vulnerability Exposure (CVE) ID: CVE-2012-1106
54121
http://www.securityfocus.com/bid/54121
RHSA-2012:0841
http://rhn.redhat.com/errata/RHSA-2012-0841.html
abrt-info-disc(76524)
https://exchange.xforce.ibmcloud.com/vulnerabilities/76524
https://fedorahosted.org/abrt/changeset/23d6997d7886abe118c28254f7f73f0b19b2d4e0
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.