setroubleshoot-plugins-3.0.59-2.0.1.el7.AXS7, setroubleshoot-3.2.24-4.0.1.el7.AXS7
エラータID: AXSA:2016-547:01
setroubleshoot
setroubleshoot GUI. Application that allows you to view setroubleshoot-server
messages.
Provides tools to help diagnose SELinux problems. When AVC messages
are generated an alert can be generated that will give information
about the problem and help track its resolution. Alerts can be configured
to user preference. The same tools can be run on existing log files.
setroubleshoot-plugins
This package provides a set of analysis plugins for use with
setroubleshoot. Each plugin has the capacity to analyze SELinux AVC
data and system data to provide user friendly reports describing how
to interpret SELinux AVC denials.
Security issues fixed with this release:
CVE-2016-4444
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2016-4446
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2016-4989
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
Update packages.
The allow_execmod plugin for setroubleshoot before 3.2.23 allows local users to execute arbitrary commands by triggering an execmod SELinux denial with a crafted binary filename, related to the commands.getstatusoutput function.
The allow_execstack plugin for setroubleshoot allows local users to execute arbitrary commands by triggering an execstack SELinux denial with a crafted filename, related to the commands.getoutput function.
setroubleshoot allows local users to bypass an intended container protection mechanism and execute arbitrary commands by (1) triggering an SELinux denial with a crafted file name, which is handled by the _set_tpath function in audit_data.py or via a crafted (2) local_id or (3) analysis_id field in a crafted XML document to the run_fix function in SetroubleshootFixit.py, related to the subprocess.check_output and commands.getstatusoutput functions, a different vulnerability than CVE-2016-4445.
N/A
SRPMS
- setroubleshoot-plugins-3.0.59-2.0.1.el7.AXS7.src.rpm
MD5: 31895480a1d9565217b2f2f8bc921ae2
SHA-256: c3740540dca724fcbd8052c69ddbdc529b4d730ce60a26e9120367063277bcfa
Size: 2.38 MB - setroubleshoot-3.2.24-4.0.1.el7.AXS7.src.rpm
MD5: 2d9a893faf6ca064e2c956079f02a8b1
SHA-256: 43e3ae5d7e5bad646c2172ce1c5d9a2107569f70df8f8d6696564a82ca0797ca
Size: 1.44 MB
Asianux Server 7 for x86_64
- setroubleshoot-plugins-3.0.59-2.0.1.el7.AXS7.noarch.rpm
MD5: ba1826ac2075ed5539f923bee6919796
SHA-256: 343ea984a3c295477fdbaf07471041e0ba30f2a6e62d08e61a79fcb90a7564c4
Size: 585.96 kB - setroubleshoot-3.2.24-4.0.1.el7.AXS7.x86_64.rpm
MD5: d0040a4f23d6e95a5428c17a67006e70
SHA-256: 75ec95b6840488970fb4a9915ad4d1ea31c1b4e4352ffa4e1d1c0250ba07c3a9
Size: 126.30 kB - setroubleshoot-server-3.2.24-4.0.1.el7.AXS7.x86_64.rpm
MD5: b3aea85b27eca6a890127bcd248fd612
SHA-256: 5e066fde65f0f552ec5461b08d8abf4ae051a89e9a304df169acc620eb577c7c
Size: 344.52 kB