Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.122201
Categoría:Oracle Linux Local Security Checks
Título:Oracle: Security Advisory (ELSA-2011-0414)
Resumen:The remote host is missing an update for the 'policycoreutils, selinux-policy' package(s) announced via the ELSA-2011-0414 advisory.
Descripción:Summary:
The remote host is missing an update for the 'policycoreutils, selinux-policy' package(s) announced via the ELSA-2011-0414 advisory.

Vulnerability Insight:
policycoreutils:

[2.0.83-19.8]
- Fix seunshare to work with /tmp content when SELinux context is not provided
Resolves: #679689

[2.0.83-19.7]
- put back correct chcon
- Latest fixes for seunshare

[2.0.83-19.6]
- Fix rsync command to work if the directory is old.
- Fix all tests
Resolves: #679689

[2.0.83-19.5]
- Add requires rsync and fix man page for seunshare

[2.0.83-19.4]
- fix to sandbox
- Fix seunshare to use more secure handling of /tmp
- Rewrite seunshare to make sure /tmp is mounted stickybit owned by root
- Change to allow sandbox to run on nfs homedirs, add start python script
- change default location of HOMEDIR in sandbox to /tmp/.sandbox_home_*
- Move seunshare to sandbox package
- Fix sandbox to show correct types in usage statement

selinux-policy:

[3.7.19-54.0.1.el6_0.5]
- Allow ocfs2 to be mounted with file_t type.

[3.7.19-54.el6_0.5]
- seunshare needs to be able to mounton nfs/cifs/fusefs homedirs
Resolves: #684918

[3.7.19-54.el6_0.4]
- Fix to sandbox
* selinux-policy fixes for policycoreutils sandbox changes
- Fix seunshare to use more secure handling of /tmp
- Change to allow sandbox to run on nfs homedirs, add start python script

Affected Software/OS:
'policycoreutils, selinux-policy' package(s) on Oracle Linux 6.

Solution:
Please install the updated package(s).

CVSS Score:
6.9

CVSS Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2011-1011
1025291
http://www.securitytracker.com/id?1025291
20110222 Developers should not rely on the stickiness of /tmp on Red Hat Linux
http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0585.html
43415
http://secunia.com/advisories/43415
43844
http://secunia.com/advisories/43844
44034
http://secunia.com/advisories/44034
46510
http://www.securityfocus.com/bid/46510
ADV-2011-0701
http://www.vupen.com/english/advisories/2011/0701
ADV-2011-0864
http://www.vupen.com/english/advisories/2011/0864
FEDORA-2011-3043
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056227.html
RHSA-2011:0414
http://www.redhat.com/support/errata/RHSA-2011-0414.html
[oss-security] 20110222 CVE Request
http://openwall.com/lists/oss-security/2011/02/23/1
[oss-security] 20110223 Re: CVE Request
http://openwall.com/lists/oss-security/2011/02/23/2
http://pkgs.fedoraproject.org/gitweb/?p=policycoreutils.git%3Ba=blob%3Bf=policycoreutils-rhat.patch%3Bh=d4db5bc06027de23d12a4b3f18fa6f9b1517df27%3Bhb=HEAD#l2197
https://bugzilla.redhat.com/show_bug.cgi?id=633544
policycoreutils-seunshare-symlink(65641)
https://exchange.xforce.ibmcloud.com/vulnerabilities/65641
CopyrightCopyright (C) 2015 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.