Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2018-0913

Опубликовано: 16 апр. 2018
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2018-0913: policycoreutils security, bug fix, and enhancement update (LOW)

[2.5-22.0.1]

  • Lazy unmount private, shared entry (Joe Jin) [orabug 12560705]

[2.5-22]

  • semanage: Fix fcontext help message (#1499259)
  • semanage: Improve semanage-user.8 man page (#1079946)
  • semodule: Improve man page (#1337192)

[2.5-21]

  • Update translations

[2.5-20]

  • setfiles: Mention customizable types in restorecon man page (#1260238)
  • sepolicy: do not fail when file_contexts.local or .subs do not exist (#1512590)
  • semanage: Fix export of ibendport entries (#1471809)

[2.5-19]

  • semanage: Call semanage_set_reload only if -N is used (#1421160)

[2.5-18]

  • semanage: Enable listing file_contexts.homedirs
  • semanage: Fix manpage author for ibpkey and ibendport pages.
  • semanage: Update man pages for infiniband
  • semanage: Update semanage to allow runtime labeling of ibendports
  • semanage: Update semanage to allow runtime labeling of Infiniband Pkeys
  • semanage: Improve semanage-port man page
  • fixfiles: do not dereference link files in tmp

Обновленные пакеты

Oracle Linux 7

Oracle Linux aarch64

policycoreutils

2.5-22.0.1.el7

policycoreutils-devel

2.5-22.0.1.el7

policycoreutils-gui

2.5-22.0.1.el7

policycoreutils-newrole

2.5-22.0.1.el7

policycoreutils-python

2.5-22.0.1.el7

policycoreutils-restorecond

2.5-22.0.1.el7

policycoreutils-sandbox

2.5-22.0.1.el7

Oracle Linux x86_64

policycoreutils

2.5-22.0.1.el7

policycoreutils-devel

2.5-22.0.1.el7

policycoreutils-gui

2.5-22.0.1.el7

policycoreutils-newrole

2.5-22.0.1.el7

policycoreutils-python

2.5-22.0.1.el7

policycoreutils-restorecond

2.5-22.0.1.el7

policycoreutils-sandbox

2.5-22.0.1.el7

Связанные CVE

Связанные уязвимости

CVSS3: 4.4
ubuntu
больше 7 лет назад

Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.

CVSS3: 3.9
redhat
больше 7 лет назад

Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.

CVSS3: 4.4
nvd
больше 7 лет назад

Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.

CVSS3: 4.4
debian
больше 7 лет назад

Context relabeling of filesystems is vulnerable to symbolic link attac ...

suse-cvrf
больше 7 лет назад

Security update for policycoreutils