Описание
ELSA-2018-0913: policycoreutils security, bug fix, and enhancement update (LOW)
[2.5-22.0.1]
- Lazy unmount private, shared entry (Joe Jin) [orabug 12560705]
[2.5-22]
- semanage: Fix fcontext help message (#1499259)
- semanage: Improve semanage-user.8 man page (#1079946)
- semodule: Improve man page (#1337192)
[2.5-21]
- Update translations
[2.5-20]
- setfiles: Mention customizable types in restorecon man page (#1260238)
- sepolicy: do not fail when file_contexts.local or .subs do not exist (#1512590)
- semanage: Fix export of ibendport entries (#1471809)
[2.5-19]
- semanage: Call semanage_set_reload only if -N is used (#1421160)
[2.5-18]
- semanage: Enable listing file_contexts.homedirs
- semanage: Fix manpage author for ibpkey and ibendport pages.
- semanage: Update man pages for infiniband
- semanage: Update semanage to allow runtime labeling of ibendports
- semanage: Update semanage to allow runtime labeling of Infiniband Pkeys
- semanage: Improve semanage-port man page
- fixfiles: do not dereference link files in tmp
Обновленные пакеты
Oracle Linux 7
Oracle Linux aarch64
policycoreutils
2.5-22.0.1.el7
policycoreutils-devel
2.5-22.0.1.el7
policycoreutils-gui
2.5-22.0.1.el7
policycoreutils-newrole
2.5-22.0.1.el7
policycoreutils-python
2.5-22.0.1.el7
policycoreutils-restorecond
2.5-22.0.1.el7
policycoreutils-sandbox
2.5-22.0.1.el7
Oracle Linux x86_64
policycoreutils
2.5-22.0.1.el7
policycoreutils-devel
2.5-22.0.1.el7
policycoreutils-gui
2.5-22.0.1.el7
policycoreutils-newrole
2.5-22.0.1.el7
policycoreutils-python
2.5-22.0.1.el7
policycoreutils-restorecond
2.5-22.0.1.el7
policycoreutils-sandbox
2.5-22.0.1.el7
Связанные CVE
Связанные уязвимости
Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.
Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.
Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.
Context relabeling of filesystems is vulnerable to symbolic link attac ...