Описание
A flaw was found in NetworkManager. The NetworkManager package allows access to files that may belong to other users. NetworkManager allows non-root users to configure the system's network. The daemon runs with root privileges and can access files owned by users different from the one who added the connection.
Меры по смягчению последствий
SELinux is shipped out of the box in targeted enforcing mode, which prevents processes from having unwanted permissions and mitigates this attack.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 10 | NetworkManager | Affected | ||
| Red Hat Enterprise Linux 6 | NetworkManager | Out of support scope | ||
| Red Hat Enterprise Linux 7 | NetworkManager | Fix deferred | ||
| Red Hat Enterprise Linux 8 | NetworkManager | Fix deferred | ||
| Red Hat Enterprise Linux 9 | NetworkManager | Affected | ||
| Red Hat OpenShift Container Platform 4 | NetworkManager | Affected |
Показывать по
Ссылки на источники
Дополнительная информация
Статус:
3.3 Low
CVSS3
Связанные уязвимости
A flaw was found in NetworkManager. The NetworkManager package allows access to files that may belong to other users. NetworkManager allows non-root users to configure the system's network. The daemon runs with root privileges and can access files owned by users different from the one who added the connection.
A flaw was found in NetworkManager. The NetworkManager package allows access to files that may belong to other users. NetworkManager allows non-root users to configure the system's network. The daemon runs with root privileges and can access files owned by users different from the one who added the connection.
A flaw was found in NetworkManager. The NetworkManager package allows ...
A flaw was found in NetworkManager. The NetworkManager package allows access to files that may belong to other users. NetworkManager allows non-root users to configure the system's network. The daemon runs with root privileges and can access files owned by users different from the one who added the connection.
3.3 Low
CVSS3