Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2022:1898

Опубликовано: 10 мая 2022
Источник: rocky
Оценка: Moderate

Описание

Moderate: fapolicyd security, bug fix, and enhancement update

Fapolicyd (File Access Policy Daemon) implements application whitelisting to decide file access rights. Applications that are known via a reputation source are allowed access while unknown applications are not. The daemon makes use of the kernel's fanotify interface to determine file access rights.

The following packages have been upgraded to a later upstream version: fapolicyd (1.1). (BZ#1939379)

Security Fix(es):

  • fapolicyd: fapolicyd wrongly prepares ld.so path (CVE-2022-1117)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
fapolicydx86_646.el8fapolicyd-1.1-6.el8.x86_64.rpm
fapolicyd-selinuxnoarch6.el8fapolicyd-selinux-1.1-6.el8.noarch.rpm
fapolicyd-selinuxnoarch6.el8fapolicyd-selinux-1.1-6.el8.noarch.rpm

Показывать по

Связанные CVE

Связанные уязвимости

CVSS3: 8.4
redhat
почти 4 года назад

A vulnerability was found in fapolicyd. The vulnerability occurs due to an assumption on how glibc names the runtime linker, a build time regular expression may not correctly detect the runtime linker. The consequence is that the pattern detection for applications launched by the run time linker may fail to detect the pattern and allow execution.

CVSS3: 8.4
nvd
больше 3 лет назад

A vulnerability was found in fapolicyd. The vulnerability occurs due to an assumption on how glibc names the runtime linker, a build time regular expression may not correctly detect the runtime linker. The consequence is that the pattern detection for applications launched by the run time linker may fail to detect the pattern and allow execution.

CVSS3: 8.4
msrc
больше 3 лет назад

A vulnerability was found in fapolicyd. The vulnerability occurs due to an assumption on how glibc names the runtime linker a build time regular expression may not correctly detect the runtime linker. The consequence is that the pattern detection for applications launched by the run time linker may fail to detect the pattern and allow execution.

CVSS3: 8.4
github
больше 3 лет назад

A vulnerability was found in fapolicyd. The vulnerability occurs due to an assumption on how glibc names the runtime linker, a build time regular expression may not correctly detect the runtime linker. The consequence is that the pattern detection for applications launched by the run time linker may fail to detect the pattern and allow execution.

oracle-oval
больше 3 лет назад

ELSA-2022-1898: fapolicyd security, bug fix, and enhancement update (MODERATE)