ELSA-2012-1461

ELSA-2012-1461 - libproxy security update

Type:SECURITY
Severity:MODERATE
Release Date:2012-11-14

Description


[0.3.0-3]
- Fix CVE-2012-4505


Related CVEs


CVE-2012-4505

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (i386) libproxy-0.3.0-3.el6_3.src.rpm05a40ac917398c85599529acca56b4deELSA-2013-0271
libproxy-0.3.0-3.el6_3.i686.rpm3a66c27d7350ae33062c8ad72facda3eELSA-2013-0271
libproxy-bin-0.3.0-3.el6_3.i686.rpmbcaeef711fb9fb1bdfbd375a6badacf0ELSA-2013-0271
libproxy-devel-0.3.0-3.el6_3.i686.rpm6fb93d9ddcb2474cd50ba8c20088eb4aELSA-2013-0271
libproxy-gnome-0.3.0-3.el6_3.i686.rpm4eb99f4f5fba8d89d8d726db267df0d2ELSA-2013-0271
libproxy-kde-0.3.0-3.el6_3.i686.rpmbe41e149d3c64efded841ed02041b866ELSA-2013-0271
libproxy-mozjs-0.3.0-3.el6_3.i686.rpm7b957af2eae259242ecba79ca3a95f42ELSA-2013-0271
libproxy-python-0.3.0-3.el6_3.i686.rpme8ec81a2e784af1c2eb87dd7928ed7c1ELSA-2013-0271
libproxy-webkit-0.3.0-3.el6_3.i686.rpm91b7229a74fe974e9ffc460e5c232047ELSA-2013-0271
Oracle Linux 6 (x86_64) libproxy-0.3.0-3.el6_3.src.rpm05a40ac917398c85599529acca56b4deELSA-2013-0271
libproxy-0.3.0-3.el6_3.i686.rpm3a66c27d7350ae33062c8ad72facda3eELSA-2013-0271
libproxy-0.3.0-3.el6_3.x86_64.rpm752c548ac449c8531c5c03baedb4efd0ELSA-2013-0271
libproxy-bin-0.3.0-3.el6_3.x86_64.rpmdcb9299d9e95e1421d4484387f3b3dd9ELSA-2013-0271
libproxy-devel-0.3.0-3.el6_3.i686.rpm6fb93d9ddcb2474cd50ba8c20088eb4aELSA-2013-0271
libproxy-devel-0.3.0-3.el6_3.x86_64.rpm1a65b9185f12a0824e8ec3e89eba1305ELSA-2013-0271
libproxy-gnome-0.3.0-3.el6_3.x86_64.rpmf19cd04266b7f2ed0d2b4fd254d36c0cELSA-2013-0271
libproxy-kde-0.3.0-3.el6_3.x86_64.rpm0df8e6c964bbc1d08539214c876aa38cELSA-2013-0271
libproxy-mozjs-0.3.0-3.el6_3.x86_64.rpmd04a19c318de82b8aa824bcfc85a7121ELSA-2013-0271
libproxy-python-0.3.0-3.el6_3.x86_64.rpmb5fc9bdcb64d38485b3beb3a9abad25bELSA-2013-0271
libproxy-webkit-0.3.0-3.el6_3.x86_64.rpmc88703a94695988e9ddacf7b16266472ELSA-2013-0271



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete