CVE-2018-1063 — Link Following in Policycoreutils
Severity
4.4MEDIUMNVD
EPSS
0.1%
top 69.43%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 2
Latest updateMay 14
Description
Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.
CVSS vector
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:NExploitability: 1.8 | Impact: 2.5
Affected Packages3 packages
Also affects: Enterprise Linux 7.0
🔴Vulnerability Details
2GHSA▶
GHSA-p5j6-rvwf-qchg: Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context↗2022-05-14
OSV▶
CVE-2018-1063: Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context↗2018-03-02
📋Vendor Advisories
2💬Community
1Bugzilla▶
CVE-2018-1063 policycoreutils: Relabelling of symbolic links in /tmp and /var/tmp change the context of their target instead↗2018-02-28