Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2018:0913 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1550122 | Issue Tracking Mitigation Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2018-03-02T15:00:00Z
Updated: 2018-04-11T09:57:01
Reserved: 2017-12-04T00:00:00
Link: CVE-2018-1063
JSON object: View
NVD Information
Status : Modified
Published: 2018-03-02T15:29:00.400
Modified: 2023-11-07T02:55:48.110
Link: CVE-2018-1063
JSON object: View
Redhat Information
No data.
CWE