![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.123895 |
Category: | Oracle Linux Local Security Checks |
Title: | Oracle: Security Advisory (ELSA-2012-0841) |
Summary: | The remote host is missing an update for the 'abrt, btparser, libreport, python-meh' package(s) announced via the ELSA-2012-0841 advisory. |
Description: | Summary: The remote host is missing an update for the 'abrt, btparser, libreport, python-meh' package(s) announced via the ELSA-2012-0841 advisory. Vulnerability Insight: abrt [2.0.8-6.0.1.el6] - Add abrt-oracle-enterprise.patch to be product neutral - Remove abrt-plugin-rhtsupport dependency for cli and desktop - Make abrt Obsoletes/Provides abrt-plugin-rhtsupprot [2.0.8-6] - enable plugin services after install rhbz#820515 - Resolves: #820515 [2.0.8-5] - removed the 'report problem with ABRT btn' rhbz#809587 - fixed double free - fixed ccpp-install man page - Resolves: #809587, #796216, #799027 [2.0.8-4] - don't mark reports reported in post-create by mailx as reported - Resolves: #803618 [2.0.8-3] - fixed remote crash handling rhbz#800828 - Resolves: #800828 [2.0.8-2] - updated translation - added man page for a-a-analyze-vmcore - minor fixes in kernel oops parser - Related: #759375 [2.0.8-1] - rebase to the latest upstream - partly fixed problems with suided cores - fixed confusing message about 'moved copy' - properly enable daemons on update from previous version - added default config file for mailx - cli doesn't depend on python plugin - properly init i18n all plugins - added missing man page to abrt-cli - added warning when user tries to report already reported problem again - added vmcores plugin - Resolves: #759375, #783450, #773242, #771597, #770357, #751068, #749100, #747624, #727494 btparser [0.16-3] - Report correct crash_function in the crash summary Resolves: rhbz#811147 [0.16-1] - New upstream release Resolves: #768377 libreport [2.0.9-5.0.1.el6] - Add oracle-enterprise.patch - Remove libreport-plugin-rhtsupport pkg [2.0.9-5] - rebuild due to rpmdiff - Resolves: #823411 [2.0.9-4] - fixed compatibility with bugzilla 4.2 - Resolves: #823411 [2.0.9-3] - added notify-only option to mailx rhbz#803618 - Resolves: #803618 [2.0.9-2] - minor fix in debuginfo downloader - updated translations - Related: #759377 [2.0.9-1] - new upstream release - fixed typos in man - fixed handling of anaconda-tb file - generate valid xml file - Resolves: #759377, #758366, #746727 python-meh [0.12.1-3] - Add dbus-python and libreport to BuildRequires (vpodzime). Related: rhbz#796176 [0.12.1-2] - Add %check unset DISPLAY section to spec file (vpodzime). Resolves: rhbz#796176 [0.12.1-1] - Adapt to new libreport API (vpodzime). Resolves: rhbz#769821 - Add info about environment variables (vpodzime). Resolves: rhbz#788577 [0.11-3] - Move 'import rpm' to where its needed to avoid nameserver problems. Resolves: rhbz#749330 [0.11-2] - Change dependency to libreport-* (mtoman) Resolves: rhbz#730924 - Add abrt-like information to bug reports (vpodzime). Resolves: rhbz#728871 Affected Software/OS: 'abrt, btparser, libreport, python-meh' package(s) on Oracle Linux 6. Solution: Please install the updated package(s). CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-4088 http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071027.html https://exchange.xforce.ibmcloud.com/vulnerabilities/71871 Common Vulnerability Exposure (CVE) ID: CVE-2012-1106 54121 http://www.securityfocus.com/bid/54121 RHSA-2012:0841 http://rhn.redhat.com/errata/RHSA-2012-0841.html abrt-info-disc(76524) https://exchange.xforce.ibmcloud.com/vulnerabilities/76524 https://fedorahosted.org/abrt/changeset/23d6997d7886abe118c28254f7f73f0b19b2d4e0 |
Copyright | Copyright (C) 2015 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |