Vulnerability identifier: #VU11180
Vulnerability risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-61
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
policycoreutils
Client/Desktop applications /
File managers, FTP clients
Vendor: GNU
Description
The vulnerability allows a local attacker to launch symlink attack on the target system.
The weakness exists in the /tmp and /var/tmp directories improper security restrictions when presenting the relabeling process through symlinks. A local attacker can modify the SELinux context of arbitrary files and conduct symlink attacks.
Mitigation
Cybersecurity is currently unaware of any solutions addressing the vulnerability.
Vulnerable software versions
policycoreutils: 2.5.11
External links
https://bugzilla.redhat.com/show_bug.cgi?id=1550122
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.