Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p5j6-rvwf-qchg

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 4.4

Описание

Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.

Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.

EPSS

Процентиль: 31%
0.00117
Низкий

4.4 Medium

CVSS3

Дефекты

CWE-59

Связанные уязвимости

CVSS3: 4.4
ubuntu
больше 7 лет назад

Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.

CVSS3: 3.9
redhat
больше 7 лет назад

Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.

CVSS3: 4.4
nvd
больше 7 лет назад

Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.

CVSS3: 4.4
debian
больше 7 лет назад

Context relabeling of filesystems is vulnerable to symbolic link attac ...

suse-cvrf
больше 7 лет назад

Security update for policycoreutils

EPSS

Процентиль: 31%
0.00117
Низкий

4.4 Medium

CVSS3

Дефекты

CWE-59