![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.122201 |
Category: | Oracle Linux Local Security Checks |
Title: | Oracle: Security Advisory (ELSA-2011-0414) |
Summary: | The remote host is missing an update for the 'policycoreutils, selinux-policy' package(s) announced via the ELSA-2011-0414 advisory. |
Description: | Summary: The remote host is missing an update for the 'policycoreutils, selinux-policy' package(s) announced via the ELSA-2011-0414 advisory. Vulnerability Insight: policycoreutils: [2.0.83-19.8] - Fix seunshare to work with /tmp content when SELinux context is not provided Resolves: #679689 [2.0.83-19.7] - put back correct chcon - Latest fixes for seunshare [2.0.83-19.6] - Fix rsync command to work if the directory is old. - Fix all tests Resolves: #679689 [2.0.83-19.5] - Add requires rsync and fix man page for seunshare [2.0.83-19.4] - fix to sandbox - Fix seunshare to use more secure handling of /tmp - Rewrite seunshare to make sure /tmp is mounted stickybit owned by root - Change to allow sandbox to run on nfs homedirs, add start python script - change default location of HOMEDIR in sandbox to /tmp/.sandbox_home_* - Move seunshare to sandbox package - Fix sandbox to show correct types in usage statement selinux-policy: [3.7.19-54.0.1.el6_0.5] - Allow ocfs2 to be mounted with file_t type. [3.7.19-54.el6_0.5] - seunshare needs to be able to mounton nfs/cifs/fusefs homedirs Resolves: #684918 [3.7.19-54.el6_0.4] - Fix to sandbox * selinux-policy fixes for policycoreutils sandbox changes - Fix seunshare to use more secure handling of /tmp - Change to allow sandbox to run on nfs homedirs, add start python script Affected Software/OS: 'policycoreutils, selinux-policy' package(s) on Oracle Linux 6. Solution: Please install the updated package(s). CVSS Score: 6.9 CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-1011 1025291 http://www.securitytracker.com/id?1025291 20110222 Developers should not rely on the stickiness of /tmp on Red Hat Linux http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0585.html 43415 http://secunia.com/advisories/43415 43844 http://secunia.com/advisories/43844 44034 http://secunia.com/advisories/44034 46510 http://www.securityfocus.com/bid/46510 ADV-2011-0701 http://www.vupen.com/english/advisories/2011/0701 ADV-2011-0864 http://www.vupen.com/english/advisories/2011/0864 FEDORA-2011-3043 http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056227.html RHSA-2011:0414 http://www.redhat.com/support/errata/RHSA-2011-0414.html [oss-security] 20110222 CVE Request http://openwall.com/lists/oss-security/2011/02/23/1 [oss-security] 20110223 Re: CVE Request http://openwall.com/lists/oss-security/2011/02/23/2 http://pkgs.fedoraproject.org/gitweb/?p=policycoreutils.git%3Ba=blob%3Bf=policycoreutils-rhat.patch%3Bh=d4db5bc06027de23d12a4b3f18fa6f9b1517df27%3Bhb=HEAD#l2197 https://bugzilla.redhat.com/show_bug.cgi?id=633544 policycoreutils-seunshare-symlink(65641) https://exchange.xforce.ibmcloud.com/vulnerabilities/65641 |
Copyright | Copyright (C) 2015 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |