Executive Summary
Summary | |
---|---|
Title | Red Hat OpenShift Enterprise 1.1.1 update |
Informations | |||
---|---|---|---|
Name | RHSA-2013:0582 | First vendor Publication | 2013-02-28 |
Vendor | RedHat | Last vendor Modification | 2013-02-28 |
Severity (Vendor) | Moderate | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Red Hat OpenShift Enterprise 1.1.1 is now available. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat OpenShift Enterprise Infrastructure - noarch, x86_64 Red Hat OpenShift Enterprise JBoss EAP add-on - noarch Red Hat OpenShift Enterprise Node - noarch, x86_64 3. Description: OpenShift Enterprise is a cloud computing Platform-as-a-Service (PaaS) solution from Red Hat, and is designed for on-premise or private cloud deployments. Installing the updated packages and restarting the OpenShift services are the only requirements for this update. However, if you are updating your system to Red Hat Enterprise Linux 6.4 while applying OpenShift Enterprise 1.1.1 updates, it is recommended that you restart your system. For further information about this release, refer to the OpenShift Enterprise 1.1.1 Technical Notes, available shortly from https://access.redhat.com/knowledge/docs/ This update also fixes the following security issues: Multiple cross-site scripting (XSS) flaws were found in rubygem-actionpack. A remote attacker could use these flaws to conduct XSS attacks against users of an application using rubygem-actionpack. (CVE-2012-3463, CVE-2012-3464, CVE-2012-3465) It was found that certain methods did not sanitize file names before passing them to lower layer routines in Ruby. If a Ruby application created files with names based on untrusted input, it could result in the creation of files with different names than expected. (CVE-2012-4522) A denial of service flaw was found in the implementation of associative arrays (hashes) in Ruby. An attacker able to supply a large number of inputs to a Ruby application (such as HTTP POST request parameters sent to a web application) that are used as keys when inserting data into an array could trigger multiple hash function collisions, making array operations take an excessive amount of CPU time. To mitigate this issue, a new, more collision resistant algorithm has been used to reduce the chance of an attacker successfully causing intentional collisions. (CVE-2012-5371) Input validation vulnerabilities were discovered in rubygem-activerecord. A remote attacker could possibly use these flaws to perform an SQL injection attack against an application using rubygem-activerecord. (CVE-2012-2661, CVE-2012-2695, CVE-2013-0155) Input validation vulnerabilities were discovered in rubygem-actionpack. A remote attacker could possibly use these flaws to perform an SQL injection attack against an application using rubygem-actionpack and rubygem-activerecord. (CVE-2012-2660, CVE-2012-2694) A flaw was found in the HTTP digest authentication implementation in rubygem-actionpack. A remote attacker could use this flaw to cause a denial of service of an application using rubygem-actionpack and digest authentication. (CVE-2012-3424) A flaw was found in the handling of strings in Ruby safe level 4. A remote attacker can use Exception#to_s to destructively modify an untainted string so that it is tainted, the string can then be arbitrarily modified. (CVE-2012-4466) A flaw was found in the method for translating an exception message into a string in the Ruby Exception class. A remote attacker could use this flaw to bypass safe level 4 restrictions, allowing untrusted (tainted) code to modify arbitrary, trusted (untainted) strings, which safe level 4 restrictions would otherwise prevent. (CVE-2012-4464) It was found that ruby_parser from rubygem-ruby_parser created a temporary file in an insecure way. A local attacker could use this flaw to perform a symbolic link attack, overwriting arbitrary files accessible to the application using ruby_parser. (CVE-2013-0162) The CVE-2013-0162 issue was discovered by Michael Scherer of the Red Hat Regional IT team. Users are advised to upgrade to Red Hat OpenShift Enterprise 1.1.1. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 827353 - CVE-2012-2660 rubygem-actionpack: Unsafe query generation 827363 - CVE-2012-2661 rubygem-activerecord: SQL injection when processing nested query paramaters 831573 - CVE-2012-2695 rubygem-activerecord: SQL injection when processing nested query paramaters (a different flaw than CVE-2012-2661) 831581 - CVE-2012-2694 rubygem-actionpack: Unsafe query generation (a different flaw than CVE-2012-2660) 843711 - CVE-2012-3424 rubygem-actionpack: DoS vulnerability in authenticate_or_request_with_http_digest 847196 - CVE-2012-3463 rubygem-actionpack: potential XSS vulnerability in select_tag prompt 847199 - CVE-2012-3464 rubygem-actionpack: potential XSS vulnerability 847200 - CVE-2012-3465 rubygem-actionpack: XSS Vulnerability in strip_tags 862598 - CVE-2012-4464 ruby 1.9.3: Possibility to bypass Ruby's $SAFE (level 4) semantics 862614 - CVE-2012-4466 ruby: safe level bypass via name_err_mesg_to_str() 865940 - CVE-2012-4522 ruby: unintentional file creation caused by inserting an illegal NUL character 875236 - CVE-2012-5371 ruby: Murmur hash-flooding DoS flaw in ruby 1.9 (oCERT-2012-001) 887353 - [Cartridge] Removing a cartridge leaves its info directory in place 889426 - The "scale your application" page for scalable app displayed not well 892806 - CVE-2013-0162 rubygem-ruby_parser: incorrect temporary file usage 892866 - CVE-2013-0155 rubygem-actionpack, rubygem-activerecord: Unsafe Query Generation Risk in Ruby on Rails 895347 - Should delete all the mongodb cartridge pages and the links about mongodb 895355 - Lack of a dot in domain create and update page 902412 - Warning message is seen when update rubygem-openshift-origin-auth-remote-user package. 902630 - Failed to reload openshift-broker service 903526 - Display overlaps when adding sshkey using long name in IE 9 903546 - Links to ruby-lang.org redirects to wrong url 905021 - Can not get environment variables from scalable php local gear. 905656 - [broker-util] oo-accept-broker doesn't summarize errors and set return code 906227 - The "Follow these steps to install the client" link on get started page of application will redirect to a page which has no expected content. 906845 - create default resource settings for AS/EAP/EWS carts |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2013-0582.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-264 | Permissions, Privileges, and Access Controls |
21 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
14 % | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25) |
7 % | CWE-310 | Cryptographic Issues |
7 % | CWE-287 | Improper Authentication |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:17422 | |||
Oval ID: | oval:org.mitre.oval:def:17422 | ||
Title: | USN-1602-1 -- ruby1.9.1 vulnerabilities | ||
Description: | Ruby could allow excessive access in untrusted programs. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1602-1 CVE-2012-4464 CVE-2012-4466 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | ruby1.9.1 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17800 | |||
Oval ID: | oval:org.mitre.oval:def:17800 | ||
Title: | DSA-2609-1 rails - SQL query manipulation | ||
Description: | An interpretation conflict can cause the Active Record component of Rails, a web framework for the Ruby programming language, to truncate queries in unexpected ways. This may allow attackers to elevate their privileges. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2609-1 CVE-2013-0155 | Version: | 7 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | rails |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18024 | |||
Oval ID: | oval:org.mitre.oval:def:18024 | ||
Title: | USN-1614-1 -- ruby1.9.1 vulnerabilities | ||
Description: | Several security issues were fixed in Ruby. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1614-1 CVE-2012-4464 CVE-2012-4466 CVE-2012-4522 | Version: | 7 |
Platform(s): | Ubuntu 12.10 Ubuntu 12.04 | Product(s): | ruby1.9.1 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20949 | |||
Oval ID: | oval:org.mitre.oval:def:20949 | ||
Title: | RHSA-2013:0129: ruby security and bug fix update (Moderate) | ||
Description: | The rb_get_path_check function in file.c in Ruby 1.9.3 before patchlevel 286 and Ruby 2.0.0 before r37163 allows context-dependent attackers to create files in unexpected locations or with unexpected names via a NUL byte in a file path. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2013:0129-00 CESA-2013:0129 CVE-2012-4481 CVE-2012-4522 | Version: | 31 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | ruby |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23147 | |||
Oval ID: | oval:org.mitre.oval:def:23147 | ||
Title: | ELSA-2013:0129: ruby security and bug fix update (Moderate) | ||
Description: | The rb_get_path_check function in file.c in Ruby 1.9.3 before patchlevel 286 and Ruby 2.0.0 before r37163 allows context-dependent attackers to create files in unexpected locations or with unexpected names via a NUL byte in a file path. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:0129-00 CVE-2012-4481 CVE-2012-4522 | Version: | 13 |
Platform(s): | Oracle Linux 5 | Product(s): | ruby |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27340 | |||
Oval ID: | oval:org.mitre.oval:def:27340 | ||
Title: | DEPRECATED: ELSA-2013-0129 -- ruby security and bug fix update (moderate) | ||
Description: | [1.8.5-27] - unintentional file creation caused by inserting an illegal NUL character * ruby-1.8.6-CVE-2012-4522-io.c-pipe_open-command-name-should-not-contain-null-.patch - Related: rhbz#867750 [1.8.5-26] - escaping vulnerability about Exception#to_s / NameError#to_s * ruby-1.8.7-p371-CVE-2012-4481.patch - Resolves: rhbz#867750 - unintentional file creation caused by inserting an illegal NUL character * ruby-1.8.6-CVE-2012-4522-io.c-rb_open_file-should-check-NUL-in-path.patch - Resolves: rhbz#867750 [1.8.5-25] - Resolve buffer overflow causing gem installation issues. * ruby-1.8.7-syck-avoid-buffer-overflow.patch - Resolves: rhbz#834381 | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-0129 CVE-2012-4481 CVE-2012-4522 | Version: | 4 |
Platform(s): | Oracle Linux 5 | Product(s): | ruby |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-12-13 | Name : SuSE Update for rubygem-actionpack/activerecord-2_3 openSUSE-SU-2012:0978-1 (... File : nvt/gb_suse_2012_0978_1.nasl |
2012-11-26 | Name : FreeBSD Ports: ruby File : nvt/freebsd_ruby14.nasl |
2012-11-26 | Name : FreeBSD Ports: ruby File : nvt/freebsd_ruby15.nasl |
2012-11-26 | Name : FreeBSD Ports: ruby File : nvt/freebsd_ruby13.nasl |
2012-11-19 | Name : Fedora Update for ruby FEDORA-2012-18017 File : nvt/gb_fedora_2012_18017_ruby_fc17.nasl |
2012-10-31 | Name : Ubuntu Update for ruby1.8 USN-1603-2 File : nvt/gb_ubuntu_USN_1603_2.nasl |
2012-10-23 | Name : Ubuntu Update for ruby1.9.1 USN-1614-1 File : nvt/gb_ubuntu_USN_1614_1.nasl |
2012-10-23 | Name : Fedora Update for ruby FEDORA-2012-16086 File : nvt/gb_fedora_2012_16086_ruby_fc17.nasl |
2012-10-16 | Name : Fedora Update for ruby FEDORA-2012-15395 File : nvt/gb_fedora_2012_15395_ruby_fc17.nasl |
2012-10-16 | Name : Fedora Update for ruby FEDORA-2012-15507 File : nvt/gb_fedora_2012_15507_ruby_fc16.nasl |
2012-10-11 | Name : Ubuntu Update for ruby1.8 USN-1603-1 File : nvt/gb_ubuntu_USN_1603_1.nasl |
2012-10-11 | Name : Ubuntu Update for ruby1.9.1 USN-1602-1 File : nvt/gb_ubuntu_USN_1602_1.nasl |
2012-08-30 | Name : Fedora Update for rubygem-activerecord FEDORA-2012-8901 File : nvt/gb_fedora_2012_8901_rubygem-activerecord_fc17.nasl |
2012-08-30 | Name : Fedora Update for rubygem-activerecord FEDORA-2012-9635 File : nvt/gb_fedora_2012_9635_rubygem-activerecord_fc17.nasl |
2012-08-30 | Name : Fedora Update for rubygem-actionpack FEDORA-2012-9606 File : nvt/gb_fedora_2012_9606_rubygem-actionpack_fc17.nasl |
2012-08-30 | Name : Fedora Update for rubygem-actionpack FEDORA-2012-8868 File : nvt/gb_fedora_2012_8868_rubygem-actionpack_fc17.nasl |
2012-08-30 | Name : Fedora Update for rubygem-activesupport FEDORA-2012-11888 File : nvt/gb_fedora_2012_11888_rubygem-activesupport_fc17.nasl |
2012-08-30 | Name : Fedora Update for rubygem-actionpack FEDORA-2012-11885 File : nvt/gb_fedora_2012_11885_rubygem-actionpack_fc17.nasl |
2012-08-30 | Name : Fedora Update for rubygem-actionpack FEDORA-2012-11363 File : nvt/gb_fedora_2012_11363_rubygem-actionpack_fc17.nasl |
2012-08-24 | Name : Fedora Update for rubygem-activesupport FEDORA-2012-11880 File : nvt/gb_fedora_2012_11880_rubygem-activesupport_fc16.nasl |
2012-08-24 | Name : Fedora Update for rubygem-actionpack FEDORA-2012-11870 File : nvt/gb_fedora_2012_11870_rubygem-actionpack_fc16.nasl |
2012-08-14 | Name : Fedora Update for rubygem-actionpack FEDORA-2012-11353 File : nvt/gb_fedora_2012_11353_rubygem-actionpack_fc16.nasl |
2012-08-10 | Name : FreeBSD Ports: rubygem-activemodel File : nvt/freebsd_rubygem-activemodel.nasl |
2012-08-10 | Name : FreeBSD Ports: rubygem-rails File : nvt/freebsd_rubygem-rails4.nasl |
2012-08-10 | Name : FreeBSD Ports: rubygem-actionpack File : nvt/freebsd_rubygem-actionpack.nasl |
2012-07-03 | Name : Fedora Update for rubygem-actionpack FEDORA-2012-9636 File : nvt/gb_fedora_2012_9636_rubygem-actionpack_fc16.nasl |
2012-07-03 | Name : Fedora Update for rubygem-activerecord FEDORA-2012-9639 File : nvt/gb_fedora_2012_9639_rubygem-activerecord_fc16.nasl |
2012-06-19 | Name : Fedora Update for rubygem-actionpack FEDORA-2012-8912 File : nvt/gb_fedora_2012_8912_rubygem-actionpack_fc15.nasl |
2012-06-19 | Name : Fedora Update for rubygem-activerecord FEDORA-2012-8972 File : nvt/gb_fedora_2012_8972_rubygem-activerecord_fc15.nasl |
2012-06-19 | Name : Fedora Update for rubygem-activerecord FEDORA-2012-8982 File : nvt/gb_fedora_2012_8982_rubygem-activerecord_fc16.nasl |
2012-06-15 | Name : Fedora Update for rubygem-actionpack FEDORA-2012-8883 File : nvt/gb_fedora_2012_8883_rubygem-actionpack_fc16.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Ruby on Rails SQL injection attempt RuleID : 23216 - Revision : 3 - Type : SERVER-WEBAPP |
2014-01-10 | Ruby on rails injection attempt RuleID : 23213 - Revision : 6 - Type : SQL |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-10-17 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_7e61cf44654911e6828600248c0c745d.nasl - Type : ACT_GATHER_INFO |
2015-07-02 | Name : The remote Debian host is missing a security update. File : debian_DLA-263.nasl - Type : ACT_GATHER_INFO |
2015-06-01 | Name : The remote Debian host is missing a security update. File : debian_DLA-235.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201412-28.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201412-27.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-988.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-508.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-536.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-624.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-763.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-106.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-167.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-989.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-990.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-1.nasl - Type : ACT_GATHER_INFO |
2014-03-11 | Name : The remote Fedora host is missing a security update. File : fedora_2014-3232.nasl - Type : ACT_GATHER_INFO |
2014-03-07 | Name : The remote Fedora host is missing a security update. File : fedora_2013-23636.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2012-139.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0129.nasl - Type : ACT_GATHER_INFO |
2013-06-05 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_SecUpd2013-002.nasl - Type : ACT_GATHER_INFO |
2013-04-20 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-124.nasl - Type : ACT_GATHER_INFO |
2013-04-04 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_ruby-8524.nasl - Type : ACT_GATHER_INFO |
2013-03-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2655.nasl - Type : ACT_GATHER_INFO |
2013-03-13 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_ruby-130221.nasl - Type : ACT_GATHER_INFO |
2013-03-10 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0544.nasl - Type : ACT_GATHER_INFO |
2013-02-25 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_e1aa3bdd839a4a778617cca439a8f9fc.nasl - Type : ACT_GATHER_INFO |
2013-02-22 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1733-1.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0154.nasl - Type : ACT_GATHER_INFO |
2013-01-23 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2013-0635.nasl - Type : ACT_GATHER_INFO |
2013-01-23 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2013-0686.nasl - Type : ACT_GATHER_INFO |
2013-01-21 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2013-0568.nasl - Type : ACT_GATHER_INFO |
2013-01-17 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0129.nasl - Type : ACT_GATHER_INFO |
2013-01-17 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130108_ruby_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-01-17 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2609.nasl - Type : ACT_GATHER_INFO |
2013-01-09 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_ca5d327259e311e2853b00262d5ed8ee.nasl - Type : ACT_GATHER_INFO |
2013-01-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0129.nasl - Type : ACT_GATHER_INFO |
2012-12-07 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2012-341-04.nasl - Type : ACT_GATHER_INFO |
2012-11-26 | Name : The remote Fedora host is missing a security update. File : fedora_2012-17949.nasl - Type : ACT_GATHER_INFO |
2012-11-19 | Name : The remote Fedora host is missing a security update. File : fedora_2012-18017.nasl - Type : ACT_GATHER_INFO |
2012-11-12 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_5e647ca32aea11e2b745001fd0af1a4c.nasl - Type : ACT_GATHER_INFO |
2012-11-02 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_3decc87d249811e2b0c7000d601460a4.nasl - Type : ACT_GATHER_INFO |
2012-11-02 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_2a093853249511e2b0c7000d601460a4.nasl - Type : ACT_GATHER_INFO |
2012-10-23 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1614-1.nasl - Type : ACT_GATHER_INFO |
2012-10-23 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1603-2.nasl - Type : ACT_GATHER_INFO |
2012-10-22 | Name : The remote Fedora host is missing a security update. File : fedora_2012-16086.nasl - Type : ACT_GATHER_INFO |
2012-10-18 | Name : The remote Fedora host is missing a security update. File : fedora_2012-16071.nasl - Type : ACT_GATHER_INFO |
2012-10-15 | Name : The remote Fedora host is missing a security update. File : fedora_2012-15395.nasl - Type : ACT_GATHER_INFO |
2012-10-15 | Name : The remote Fedora host is missing a security update. File : fedora_2012-15507.nasl - Type : ACT_GATHER_INFO |
2012-10-11 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1602-1.nasl - Type : ACT_GATHER_INFO |
2012-10-11 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1603-1.nasl - Type : ACT_GATHER_INFO |
2012-10-09 | Name : The remote Fedora host is missing a security update. File : fedora_2012-15376.nasl - Type : ACT_GATHER_INFO |
2012-08-23 | Name : The remote Fedora host is missing a security update. File : fedora_2012-11885.nasl - Type : ACT_GATHER_INFO |
2012-08-23 | Name : The remote Fedora host is missing a security update. File : fedora_2012-11888.nasl - Type : ACT_GATHER_INFO |
2012-08-23 | Name : The remote Fedora host is missing a security update. File : fedora_2012-11880.nasl - Type : ACT_GATHER_INFO |
2012-08-23 | Name : The remote Fedora host is missing a security update. File : fedora_2012-11870.nasl - Type : ACT_GATHER_INFO |
2012-08-10 | Name : The remote Fedora host is missing a security update. File : fedora_2012-11363.nasl - Type : ACT_GATHER_INFO |
2012-08-10 | Name : The remote Fedora host is missing a security update. File : fedora_2012-11353.nasl - Type : ACT_GATHER_INFO |
2012-08-10 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_31db9a18e28911e1a57d080027a27dbf.nasl - Type : ACT_GATHER_INFO |
2012-07-27 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_ae2fa87c4bca41388be167ce2a19b3a8.nasl - Type : ACT_GATHER_INFO |
2012-07-24 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_748aa89fd52911e182ab001fd0af1a4c.nasl - Type : ACT_GATHER_INFO |
2012-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2012-9606.nasl - Type : ACT_GATHER_INFO |
2012-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2012-9635.nasl - Type : ACT_GATHER_INFO |
2012-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2012-9636.nasl - Type : ACT_GATHER_INFO |
2012-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2012-9639.nasl - Type : ACT_GATHER_INFO |
2012-06-18 | Name : The remote Fedora host is missing a security update. File : fedora_2012-8972.nasl - Type : ACT_GATHER_INFO |
2012-06-18 | Name : The remote Fedora host is missing a security update. File : fedora_2012-8982.nasl - Type : ACT_GATHER_INFO |
2012-06-18 | Name : The remote Fedora host is missing a security update. File : fedora_2012-8912.nasl - Type : ACT_GATHER_INFO |
2012-06-18 | Name : The remote Fedora host is missing a security update. File : fedora_2012-8901.nasl - Type : ACT_GATHER_INFO |
2012-06-15 | Name : The remote Fedora host is missing a security update. File : fedora_2012-8883.nasl - Type : ACT_GATHER_INFO |
2012-06-15 | Name : The remote Fedora host is missing a security update. File : fedora_2012-8868.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2013-04-26 13:20:19 |
|
2013-03-01 13:20:43 |
|
2013-02-28 21:18:13 |
|