First published: Thu Jun 30 2011(Updated: )
fw_dbus.py in system-config-firewall 1.2.29 and earlier uses the pickle Python module unsafely during D-Bus communication between the GUI and the backend, which might allow local users to gain privileges via a crafted serialized object.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat System-config-firewall | =1.2.26 | |
Redhat System-config-firewall | =1.2.27 | |
Redhat System-config-firewall | =1.2.12 | |
Redhat System-config-firewall | =1.2.11 | |
Redhat System-config-firewall | =1.2.25 | |
Redhat System-config-firewall | =1.2.21 | |
Redhat System-config-firewall | =1.2.17 | |
Redhat System-config-firewall | =1.2.24 | |
Redhat System-config-firewall | <=1.2.29 | |
Redhat System-config-firewall | =1.2.14 | |
Redhat System-config-firewall | =1.2.15 | |
Redhat System-config-firewall | =1.2.22 | |
Redhat System-config-firewall | =1.2.23 | |
Redhat System-config-firewall | =1.2.28 | |
Redhat System-config-firewall | =1.2.16 | |
Fedoraproject Fedora | =15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.