Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.
References
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2018-03-02T15:00:00Z

Updated: 2018-04-11T09:57:01

Reserved: 2017-12-04T00:00:00


Link: CVE-2018-1063

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2018-03-02T15:29:00.400

Modified: 2023-11-07T02:55:48.110


Link: CVE-2018-1063

JSON object: View

cve-icon Redhat Information

No data.

CWE