Summary
The remote host is missing an update to bugzilla
announced via advisory FEDORA-2009-2417.
Solution
Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update bugzilla' at the command line.
For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-2417
Insight
ChangeLog:
* Thu Mar 5 2009 Itamar Reis Peixoto 3.2.2-2
- fix from BZ #474250 Comment #16, from Chris Eveleigh --> - add python BR for contrib subpackage
- fix description
- change Requires perl-SOAP-Lite to perl(SOAP::Lite) according guidelines * Sun Mar 1 2009 Itamar Reis Peixoto 3.2.2-1
- thanks to Chris Eveleigh
- for contributing with patches :-)
- Upgrade to upstream 3.2.2 to fix multiple security vulns - Removed old perl_requires exclusions, added new ones for RADIUS, Oracle and sanitycheck.cgi - Added Oracle to supported DBs in description (and moved line breaks) - Include a patch to fix max_allowed_packet warnin when using with mysql * Sat Feb 28 2009 Itamar Reis Peixoto 3.0.8-1
- Upgrade to 3.0.8, fix #466077 #438080
- fix macro in changelog rpmlint warning
- fix files-attr-not-set rpmlint warning for doc and contrib sub-packages * Mon Feb 23 2009 Fedora Release Engineering - 3.0.4-4 - Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild
References
- https://bugzilla.redhat.com/show_bug.cgi?id=465956
- https://bugzilla.redhat.com/show_bug.cgi?id=484755
- https://bugzilla.redhat.com/show_bug.cgi?id=484805
- https://bugzilla.redhat.com/show_bug.cgi?id=484806
- https://bugzilla.redhat.com/show_bug.cgi?id=484807
- https://bugzilla.redhat.com/show_bug.cgi?id=484811
- https://bugzilla.redhat.com/show_bug.cgi?id=484812
- https://bugzilla.redhat.com/show_bug.cgi?id=484813
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2008-4437, CVE-2008-6098, CVE-2009-0481, CVE-2009-0482, CVE-2009-0483, CVE-2009-0484, CVE-2009-0485, CVE-2009-0486 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities