Описание
ELSA-2015-0729: setroubleshoot security update (IMPORTANT)
[3.2.17-4.1.0.1]
- Add setroubleshoot-oracle-enterprise.patch to change bug reporting URL to linux.oracle.com
[3.2.17-4.1]
- Fix get_rpm_nvr_*_temporary functions Resolves:#1203352
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
setroubleshoot
2.0.5-7.0.1.el5_11
setroubleshoot-server
2.0.5-7.0.1.el5_11
Oracle Linux x86_64
setroubleshoot
2.0.5-7.0.1.el5_11
setroubleshoot-server
2.0.5-7.0.1.el5_11
Oracle Linux i386
setroubleshoot
2.0.5-7.0.1.el5_11
setroubleshoot-server
2.0.5-7.0.1.el5_11
Oracle Linux 6
Oracle Linux x86_64
setroubleshoot
3.0.47-6.0.1.el6_6.1
setroubleshoot-doc
3.0.47-6.0.1.el6_6.1
setroubleshoot-server
3.0.47-6.0.1.el6_6.1
Oracle Linux i686
setroubleshoot
3.0.47-6.0.1.el6_6.1
setroubleshoot-doc
3.0.47-6.0.1.el6_6.1
setroubleshoot-server
3.0.47-6.0.1.el6_6.1
Oracle Linux 7
Oracle Linux x86_64
setroubleshoot
3.2.17-4.1.0.1.el7_1
setroubleshoot-server
3.2.17-4.1.0.1.el7_1
Связанные CVE
Связанные уязвимости
The get_rpm_nvr_by_file_path_temporary function in util.py in setroubleshoot before 3.2.22 allows remote attackers to execute arbitrary commands via shell metacharacters in a file name.
The get_rpm_nvr_by_file_path_temporary function in util.py in setroubleshoot before 3.2.22 allows remote attackers to execute arbitrary commands via shell metacharacters in a file name.
The get_rpm_nvr_by_file_path_temporary function in util.py in setroubleshoot before 3.2.22 allows remote attackers to execute arbitrary commands via shell metacharacters in a file name.
The get_rpm_nvr_by_file_path_temporary function in util.py in setroubleshoot before 3.2.22 allows remote attackers to execute arbitrary commands via shell metacharacters in a file name.
Уязвимость системы контроля доступа SELinux, позволяющая нарушителю выполнить произвольные команды