Логотип exploitDog
bind:CVE-2018-1063
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-1063

Количество 9

Количество 9

ubuntu логотип

CVE-2018-1063

больше 7 лет назад

Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.

CVSS3: 4.4
EPSS: Низкий
redhat логотип

CVE-2018-1063

больше 7 лет назад

Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.

CVSS3: 3.9
EPSS: Низкий
nvd логотип

CVE-2018-1063

больше 7 лет назад

Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.

CVSS3: 4.4
EPSS: Низкий
debian логотип

CVE-2018-1063

больше 7 лет назад

Context relabeling of filesystems is vulnerable to symbolic link attac ...

CVSS3: 4.4
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:0937-1

больше 7 лет назад

Security update for policycoreutils

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:0927-1

больше 7 лет назад

Security update for policycoreutils

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:0926-1

больше 7 лет назад

Security update for policycoreutils

EPSS: Низкий
github логотип

GHSA-p5j6-rvwf-qchg

больше 3 лет назад

Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.

CVSS3: 4.4
EPSS: Низкий
oracle-oval логотип

ELSA-2018-0913

больше 7 лет назад

ELSA-2018-0913: policycoreutils security, bug fix, and enhancement update (LOW)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-1063

Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.

CVSS3: 4.4
0%
Низкий
больше 7 лет назад
redhat логотип
CVE-2018-1063

Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.

CVSS3: 3.9
0%
Низкий
больше 7 лет назад
nvd логотип
CVE-2018-1063

Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.

CVSS3: 4.4
0%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-1063

Context relabeling of filesystems is vulnerable to symbolic link attac ...

CVSS3: 4.4
0%
Низкий
больше 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:0937-1

Security update for policycoreutils

0%
Низкий
больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:0927-1

Security update for policycoreutils

0%
Низкий
больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:0926-1

Security update for policycoreutils

0%
Низкий
больше 7 лет назад
github логотип
GHSA-p5j6-rvwf-qchg

Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.

CVSS3: 4.4
0%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2018-0913

ELSA-2018-0913: policycoreutils security, bug fix, and enhancement update (LOW)

больше 7 лет назад

Уязвимостей на страницу