Количество 9
Количество 9
CVE-2018-1063
Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.
CVE-2018-1063
Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.
CVE-2018-1063
Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.
CVE-2018-1063
Context relabeling of filesystems is vulnerable to symbolic link attac ...
openSUSE-SU-2018:0937-1
Security update for policycoreutils
SUSE-SU-2018:0927-1
Security update for policycoreutils
SUSE-SU-2018:0926-1
Security update for policycoreutils
GHSA-p5j6-rvwf-qchg
Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.
ELSA-2018-0913
ELSA-2018-0913: policycoreutils security, bug fix, and enhancement update (LOW)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2018-1063 Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11. | CVSS3: 4.4 | 0% Низкий | почти 8 лет назад | |
CVE-2018-1063 Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11. | CVSS3: 3.9 | 0% Низкий | почти 8 лет назад | |
CVE-2018-1063 Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11. | CVSS3: 4.4 | 0% Низкий | почти 8 лет назад | |
CVE-2018-1063 Context relabeling of filesystems is vulnerable to symbolic link attac ... | CVSS3: 4.4 | 0% Низкий | почти 8 лет назад | |
openSUSE-SU-2018:0937-1 Security update for policycoreutils | 0% Низкий | почти 8 лет назад | ||
SUSE-SU-2018:0927-1 Security update for policycoreutils | 0% Низкий | почти 8 лет назад | ||
SUSE-SU-2018:0926-1 Security update for policycoreutils | 0% Низкий | почти 8 лет назад | ||
GHSA-p5j6-rvwf-qchg Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11. | CVSS3: 4.4 | 0% Низкий | больше 3 лет назад | |
ELSA-2018-0913 ELSA-2018-0913: policycoreutils security, bug fix, and enhancement update (LOW) | почти 8 лет назад |
Уязвимостей на страницу