Описание
ELSA-2008-0497: sblim security update (IMPORTANT)
[1.31.0.1.el5_2.1]
- Add oracle-enterprise-release.patch
[1.31.el5_2.1]
- Remove RPATH from shared libraries in sblim-cmpi-{dns,fsvol,network, nfsv3,nfsv4,samba,syslog} and create appropriate record in /etc/ld.so.conf.d (CVE-2008-1951) Resolves: #446859
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
sblim-cim-client
1.3.3-31.0.1.el5_2.1
sblim-cim-client-javadoc
1-31.0.1.el5_2.1
sblim-cim-client-manual
1-31.0.1.el5_2.1
sblim-cmpi-base
1.5.5-31.0.1.el5_2.1
sblim-cmpi-base-devel
1.5.5-31.0.1.el5_2.1
sblim-cmpi-base-test
1.5.5-31.0.1.el5_2.1
sblim-cmpi-devel
1.0.4-31.0.1.el5_2.1
sblim-cmpi-dns
0.5.2-31.0.1.el5_2.1
sblim-cmpi-dns-devel
1-31.0.1.el5_2.1
sblim-cmpi-dns-test
1-31.0.1.el5_2.1
sblim-cmpi-fsvol
1.4.4-31.0.1.el5_2.1
sblim-cmpi-fsvol-devel
1.4.4-31.0.1.el5_2.1
sblim-cmpi-fsvol-test
1.4.4-31.0.1.el5_2.1
sblim-cmpi-network
1.3.8-31.0.1.el5_2.1
sblim-cmpi-network-devel
1.3.8-31.0.1.el5_2.1
sblim-cmpi-network-test
1.3.8-31.0.1.el5_2.1
sblim-cmpi-nfsv3
1.0.14-31.0.1.el5_2.1
sblim-cmpi-nfsv3-test
1.0.14-31.0.1.el5_2.1
sblim-cmpi-nfsv4
1.0.12-31.0.1.el5_2.1
sblim-cmpi-nfsv4-test
1.0.12-31.0.1.el5_2.1
sblim-cmpi-params
1.2.6-31.0.1.el5_2.1
sblim-cmpi-params-test
1.2.6-31.0.1.el5_2.1
sblim-cmpi-samba
0.5.2-31.0.1.el5_2.1
sblim-cmpi-samba-devel
1-31.0.1.el5_2.1
sblim-cmpi-samba-test
1-31.0.1.el5_2.1
sblim-cmpi-sysfs
1.1.9-31.0.1.el5_2.1
sblim-cmpi-sysfs-test
1.1.9-31.0.1.el5_2.1
sblim-cmpi-syslog
0.7.11-31.0.1.el5_2.1
sblim-cmpi-syslog-test
0.7.11-31.0.1.el5_2.1
sblim-gather
2.1.2-31.0.1.el5_2.1
sblim-gather-devel
2.1.2-31.0.1.el5_2.1
sblim-gather-provider
2.1.2-31.0.1.el5_2.1
sblim-gather-test
2.1.2-31.0.1.el5_2.1
sblim-testsuite
1.2.4-31.0.1.el5_2.1
sblim-tools-libra
0.2.3-31.0.1.el5_2.1
sblim-tools-libra-devel
0.2.3-31.0.1.el5_2.1
sblim-wbemcli
1.5.1-31.0.1.el5_2.1
Oracle Linux i386
sblim-cim-client
1.3.3-31.0.1.el5_2.1
sblim-cim-client-javadoc
1-31.0.1.el5_2.1
sblim-cim-client-manual
1-31.0.1.el5_2.1
sblim-cmpi-base
1.5.5-31.0.1.el5_2.1
sblim-cmpi-base-devel
1.5.5-31.0.1.el5_2.1
sblim-cmpi-base-test
1.5.5-31.0.1.el5_2.1
sblim-cmpi-devel
1.0.4-31.0.1.el5_2.1
sblim-cmpi-dns
0.5.2-31.0.1.el5_2.1
sblim-cmpi-dns-devel
1-31.0.1.el5_2.1
sblim-cmpi-dns-test
1-31.0.1.el5_2.1
sblim-cmpi-fsvol
1.4.4-31.0.1.el5_2.1
sblim-cmpi-fsvol-devel
1.4.4-31.0.1.el5_2.1
sblim-cmpi-fsvol-test
1.4.4-31.0.1.el5_2.1
sblim-cmpi-network
1.3.8-31.0.1.el5_2.1
sblim-cmpi-network-devel
1.3.8-31.0.1.el5_2.1
sblim-cmpi-network-test
1.3.8-31.0.1.el5_2.1
sblim-cmpi-nfsv3
1.0.14-31.0.1.el5_2.1
sblim-cmpi-nfsv3-test
1.0.14-31.0.1.el5_2.1
sblim-cmpi-nfsv4
1.0.12-31.0.1.el5_2.1
sblim-cmpi-nfsv4-test
1.0.12-31.0.1.el5_2.1
sblim-cmpi-params
1.2.6-31.0.1.el5_2.1
sblim-cmpi-params-test
1.2.6-31.0.1.el5_2.1
sblim-cmpi-samba
0.5.2-31.0.1.el5_2.1
sblim-cmpi-samba-devel
1-31.0.1.el5_2.1
sblim-cmpi-samba-test
1-31.0.1.el5_2.1
sblim-cmpi-sysfs
1.1.9-31.0.1.el5_2.1
sblim-cmpi-sysfs-test
1.1.9-31.0.1.el5_2.1
sblim-cmpi-syslog
0.7.11-31.0.1.el5_2.1
sblim-cmpi-syslog-test
0.7.11-31.0.1.el5_2.1
sblim-gather
2.1.2-31.0.1.el5_2.1
sblim-gather-devel
2.1.2-31.0.1.el5_2.1
sblim-gather-provider
2.1.2-31.0.1.el5_2.1
sblim-gather-test
2.1.2-31.0.1.el5_2.1
sblim-testsuite
1.2.4-31.0.1.el5_2.1
sblim-tools-libra
0.2.3-31.0.1.el5_2.1
sblim-tools-libra-devel
0.2.3-31.0.1.el5_2.1
sblim-wbemcli
1.5.1-31.0.1.el5_2.1
Связанные CVE
Связанные уязвимости
Untrusted search path vulnerability in a certain Red Hat build script for Standards Based Linux Instrumentation for Manageability (sblim) libraries before 1-13a.el4_6.1 in Red Hat Enterprise Linux (RHEL) 4, and before 1-31.el5_2.1 in RHEL 5, allows local users to gain privileges via a malicious library in a certain subdirectory of /var/tmp, related to an incorrect RPATH setting, as demonstrated by a malicious libc.so library for tog-pegasus.
Untrusted search path vulnerability in a certain Red Hat build script for Standards Based Linux Instrumentation for Manageability (sblim) libraries before 1-13a.el4_6.1 in Red Hat Enterprise Linux (RHEL) 4, and before 1-31.el5_2.1 in RHEL 5, allows local users to gain privileges via a malicious library in a certain subdirectory of /var/tmp, related to an incorrect RPATH setting, as demonstrated by a malicious libc.so library for tog-pegasus.
Untrusted search path vulnerability in a certain Red Hat build script for Standards Based Linux Instrumentation for Manageability (sblim) libraries before 1-13a.el4_6.1 in Red Hat Enterprise Linux (RHEL) 4, and before 1-31.el5_2.1 in RHEL 5, allows local users to gain privileges via a malicious library in a certain subdirectory of /var/tmp, related to an incorrect RPATH setting, as demonstrated by a malicious libc.so library for tog-pegasus.
Уязвимость операционной системы CentOS, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Уязвимость операционной системы CentOS, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации