Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v9h8-c2x4-crx9

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when running in recursive (-R) mode, follow symbolic links even when the --physical (aka -P) or -L option is specified, which might allow local users to modify the ACL for arbitrary files or directories via a symlink attack.

The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when running in recursive (-R) mode, follow symbolic links even when the --physical (aka -P) or -L option is specified, which might allow local users to modify the ACL for arbitrary files or directories via a symlink attack.

EPSS

Процентиль: 21%
0.00068
Низкий

Связанные уязвимости

ubuntu
почти 16 лет назад

The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when running in recursive (-R) mode, follow symbolic links even when the --physical (aka -P) or -L option is specified, which might allow local users to modify the ACL for arbitrary files or directories via a symlink attack.

redhat
больше 17 лет назад

The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when running in recursive (-R) mode, follow symbolic links even when the --physical (aka -P) or -L option is specified, which might allow local users to modify the ACL for arbitrary files or directories via a symlink attack.

nvd
почти 16 лет назад

The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when running in recursive (-R) mode, follow symbolic links even when the --physical (aka -P) or -L option is specified, which might allow local users to modify the ACL for arbitrary files or directories via a symlink attack.

debian
почти 16 лет назад

The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when runni ...

EPSS

Процентиль: 21%
0.00068
Низкий