|
|
Subscribe / Log in / New account

Mageia alert MGASA-2021-0032 (policycoreutils)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2021-0032: Updated policycoreutils packages fix a security vulnerability
Date:  Sun, 17 Jan 2021 17:08:01 +0100
Message-ID:  <20210117160801.0A1739F736@duvel.mageia.org>
Archive-link:  Article

MGASA-2021-0032 - Updated policycoreutils packages fix a security vulnerability Publication date: 17 Jan 2021 URL: https://advisories.mageia.org/MGASA-2021-0032.html Type: security Affected Mageia releases: 7 CVE: CVE-2018-1063 Description: Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing) (CVE-2018-1063). References: - https://bugs.mageia.org/show_bug.cgi?id=22890 - https://access.redhat.com/errata/RHSA-2018:0913 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1063 SRPMS: - 7/core/policycoreutils-2.5-14.1.mga7


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds