Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2010-0348

Опубликовано: 14 апр. 2010
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2010-0348: kdebase security update (IMPORTANT)

[6:3.5.4-21.0.1.el5_5.1]

  • Update definition of KONQUEROR_VERSION in specfile

[6:3.5.4-21.1]

  • Resolves: #570622, CVE-2010-0436 kdm privilege escalation flaw

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

kdebase

3.5.4-21.0.1.el5_5.1

kdebase-devel

3.5.4-21.0.1.el5_5.1

Oracle Linux x86_64

kdebase

3.5.4-21.0.1.el5_5.1

kdebase-devel

3.5.4-21.0.1.el5_5.1

Oracle Linux i386

kdebase

3.5.4-21.0.1.el5_5.1

kdebase-devel

3.5.4-21.0.1.el5_5.1

Связанные CVE

Связанные уязвимости

ubuntu
около 15 лет назад

Race condition in backend/ctrl.c in KDM in KDE Software Compilation (SC) 2.2.0 through 4.4.2 allows local users to change the permissions of arbitrary files, and consequently gain privileges, by blocking the removal of a certain directory that contains a control socket, related to improper interaction with ksm.

redhat
около 15 лет назад

Race condition in backend/ctrl.c in KDM in KDE Software Compilation (SC) 2.2.0 through 4.4.2 allows local users to change the permissions of arbitrary files, and consequently gain privileges, by blocking the removal of a certain directory that contains a control socket, related to improper interaction with ksm.

nvd
около 15 лет назад

Race condition in backend/ctrl.c in KDM in KDE Software Compilation (SC) 2.2.0 through 4.4.2 allows local users to change the permissions of arbitrary files, and consequently gain privileges, by blocking the removal of a certain directory that contains a control socket, related to improper interaction with ksm.

debian
около 15 лет назад

Race condition in backend/ctrl.c in KDM in KDE Software Compilation (S ...

github
около 3 лет назад

Race condition in backend/ctrl.c in KDM in KDE Software Compilation (SC) 2.2.0 through 4.4.2 allows local users to change the permissions of arbitrary files, and consequently gain privileges, by blocking the removal of a certain directory that contains a control socket, related to improper interaction with ksm.