Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2008-0497

Опубликовано: 24 июн. 2008
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2008-0497: sblim security update (IMPORTANT)

[1.31.0.1.el5_2.1]

  • Add oracle-enterprise-release.patch

[1.31.el5_2.1]

  • Remove RPATH from shared libraries in sblim-cmpi-{dns,fsvol,network, nfsv3,nfsv4,samba,syslog} and create appropriate record in /etc/ld.so.conf.d (CVE-2008-1951) Resolves: #446859

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

sblim-cim-client

1.3.3-31.0.1.el5_2.1

sblim-cim-client-javadoc

1-31.0.1.el5_2.1

sblim-cim-client-manual

1-31.0.1.el5_2.1

sblim-cmpi-base

1.5.5-31.0.1.el5_2.1

sblim-cmpi-base-devel

1.5.5-31.0.1.el5_2.1

sblim-cmpi-base-test

1.5.5-31.0.1.el5_2.1

sblim-cmpi-devel

1.0.4-31.0.1.el5_2.1

sblim-cmpi-dns

0.5.2-31.0.1.el5_2.1

sblim-cmpi-dns-devel

1-31.0.1.el5_2.1

sblim-cmpi-dns-test

1-31.0.1.el5_2.1

sblim-cmpi-fsvol

1.4.4-31.0.1.el5_2.1

sblim-cmpi-fsvol-devel

1.4.4-31.0.1.el5_2.1

sblim-cmpi-fsvol-test

1.4.4-31.0.1.el5_2.1

sblim-cmpi-network

1.3.8-31.0.1.el5_2.1

sblim-cmpi-network-devel

1.3.8-31.0.1.el5_2.1

sblim-cmpi-network-test

1.3.8-31.0.1.el5_2.1

sblim-cmpi-nfsv3

1.0.14-31.0.1.el5_2.1

sblim-cmpi-nfsv3-test

1.0.14-31.0.1.el5_2.1

sblim-cmpi-nfsv4

1.0.12-31.0.1.el5_2.1

sblim-cmpi-nfsv4-test

1.0.12-31.0.1.el5_2.1

sblim-cmpi-params

1.2.6-31.0.1.el5_2.1

sblim-cmpi-params-test

1.2.6-31.0.1.el5_2.1

sblim-cmpi-samba

0.5.2-31.0.1.el5_2.1

sblim-cmpi-samba-devel

1-31.0.1.el5_2.1

sblim-cmpi-samba-test

1-31.0.1.el5_2.1

sblim-cmpi-sysfs

1.1.9-31.0.1.el5_2.1

sblim-cmpi-sysfs-test

1.1.9-31.0.1.el5_2.1

sblim-cmpi-syslog

0.7.11-31.0.1.el5_2.1

sblim-cmpi-syslog-test

0.7.11-31.0.1.el5_2.1

sblim-gather

2.1.2-31.0.1.el5_2.1

sblim-gather-devel

2.1.2-31.0.1.el5_2.1

sblim-gather-provider

2.1.2-31.0.1.el5_2.1

sblim-gather-test

2.1.2-31.0.1.el5_2.1

sblim-testsuite

1.2.4-31.0.1.el5_2.1

sblim-tools-libra

0.2.3-31.0.1.el5_2.1

sblim-tools-libra-devel

0.2.3-31.0.1.el5_2.1

sblim-wbemcli

1.5.1-31.0.1.el5_2.1

Oracle Linux i386

sblim-cim-client

1.3.3-31.0.1.el5_2.1

sblim-cim-client-javadoc

1-31.0.1.el5_2.1

sblim-cim-client-manual

1-31.0.1.el5_2.1

sblim-cmpi-base

1.5.5-31.0.1.el5_2.1

sblim-cmpi-base-devel

1.5.5-31.0.1.el5_2.1

sblim-cmpi-base-test

1.5.5-31.0.1.el5_2.1

sblim-cmpi-devel

1.0.4-31.0.1.el5_2.1

sblim-cmpi-dns

0.5.2-31.0.1.el5_2.1

sblim-cmpi-dns-devel

1-31.0.1.el5_2.1

sblim-cmpi-dns-test

1-31.0.1.el5_2.1

sblim-cmpi-fsvol

1.4.4-31.0.1.el5_2.1

sblim-cmpi-fsvol-devel

1.4.4-31.0.1.el5_2.1

sblim-cmpi-fsvol-test

1.4.4-31.0.1.el5_2.1

sblim-cmpi-network

1.3.8-31.0.1.el5_2.1

sblim-cmpi-network-devel

1.3.8-31.0.1.el5_2.1

sblim-cmpi-network-test

1.3.8-31.0.1.el5_2.1

sblim-cmpi-nfsv3

1.0.14-31.0.1.el5_2.1

sblim-cmpi-nfsv3-test

1.0.14-31.0.1.el5_2.1

sblim-cmpi-nfsv4

1.0.12-31.0.1.el5_2.1

sblim-cmpi-nfsv4-test

1.0.12-31.0.1.el5_2.1

sblim-cmpi-params

1.2.6-31.0.1.el5_2.1

sblim-cmpi-params-test

1.2.6-31.0.1.el5_2.1

sblim-cmpi-samba

0.5.2-31.0.1.el5_2.1

sblim-cmpi-samba-devel

1-31.0.1.el5_2.1

sblim-cmpi-samba-test

1-31.0.1.el5_2.1

sblim-cmpi-sysfs

1.1.9-31.0.1.el5_2.1

sblim-cmpi-sysfs-test

1.1.9-31.0.1.el5_2.1

sblim-cmpi-syslog

0.7.11-31.0.1.el5_2.1

sblim-cmpi-syslog-test

0.7.11-31.0.1.el5_2.1

sblim-gather

2.1.2-31.0.1.el5_2.1

sblim-gather-devel

2.1.2-31.0.1.el5_2.1

sblim-gather-provider

2.1.2-31.0.1.el5_2.1

sblim-gather-test

2.1.2-31.0.1.el5_2.1

sblim-testsuite

1.2.4-31.0.1.el5_2.1

sblim-tools-libra

0.2.3-31.0.1.el5_2.1

sblim-tools-libra-devel

0.2.3-31.0.1.el5_2.1

sblim-wbemcli

1.5.1-31.0.1.el5_2.1

Связанные CVE

Связанные уязвимости

redhat
почти 17 лет назад

Untrusted search path vulnerability in a certain Red Hat build script for Standards Based Linux Instrumentation for Manageability (sblim) libraries before 1-13a.el4_6.1 in Red Hat Enterprise Linux (RHEL) 4, and before 1-31.el5_2.1 in RHEL 5, allows local users to gain privileges via a malicious library in a certain subdirectory of /var/tmp, related to an incorrect RPATH setting, as demonstrated by a malicious libc.so library for tog-pegasus.

nvd
почти 17 лет назад

Untrusted search path vulnerability in a certain Red Hat build script for Standards Based Linux Instrumentation for Manageability (sblim) libraries before 1-13a.el4_6.1 in Red Hat Enterprise Linux (RHEL) 4, and before 1-31.el5_2.1 in RHEL 5, allows local users to gain privileges via a malicious library in a certain subdirectory of /var/tmp, related to an incorrect RPATH setting, as demonstrated by a malicious libc.so library for tog-pegasus.

github
около 3 лет назад

Untrusted search path vulnerability in a certain Red Hat build script for Standards Based Linux Instrumentation for Manageability (sblim) libraries before 1-13a.el4_6.1 in Red Hat Enterprise Linux (RHEL) 4, and before 1-31.el5_2.1 in RHEL 5, allows local users to gain privileges via a malicious library in a certain subdirectory of /var/tmp, related to an incorrect RPATH setting, as demonstrated by a malicious libc.so library for tog-pegasus.

fstec
почти 17 лет назад

Уязвимость операционной системы CentOS, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

fstec
почти 17 лет назад

Уязвимость операционной системы CentOS, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации