Show filters
11 Total Results
Displaying 1-10 of 11
Sort by:
Attacker Value
Unknown
CVE-2021-36085
Disclosure Date: July 01, 2021 (last updated February 22, 2025)
The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __verify_map_perm_classperms and hashtab_map).
0
Attacker Value
Unknown
CVE-2021-36086
Disclosure Date: July 01, 2021 (last updated February 22, 2025)
The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_reset_classperms_set and cil_reset_classperms_list).
0
Attacker Value
Unknown
CVE-2021-36087
Disclosure Date: July 01, 2021 (last updated February 22, 2025)
The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.
0
Attacker Value
Unknown
CVE-2021-36084
Disclosure Date: July 01, 2021 (last updated February 22, 2025)
The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_verify_classpermission and __cil_pre_verify_helper).
0
Attacker Value
Unknown
CVE-2018-1063
Disclosure Date: March 02, 2018 (last updated November 08, 2023)
Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.
0
Attacker Value
Unknown
CVE-2015-3170
Disclosure Date: July 21, 2017 (last updated November 26, 2024)
selinux-policy when sysctl fs.protected_hardlinks are set to 0 allows local users to cause a denial of service (SSH login prevention) by creating a hardlink to /etc/passwd from a directory named .config, and updating selinux-policy.
0
Attacker Value
Unknown
CVE-2016-7545
Disclosure Date: January 19, 2017 (last updated November 08, 2023)
SELinux policycoreutils allows local users to execute arbitrary commands outside of the sandbox via a crafted TIOCSTI ioctl call.
0
Attacker Value
Unknown
CVE-2015-1815
Disclosure Date: March 30, 2015 (last updated October 05, 2023)
The get_rpm_nvr_by_file_path_temporary function in util.py in setroubleshoot before 3.2.22 allows remote attackers to execute arbitrary commands via shell metacharacters in a file name.
0
Attacker Value
Unknown
CVE-2014-3215
Disclosure Date: May 08, 2014 (last updated October 05, 2023)
seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.
0
Attacker Value
Unknown
CVE-2007-5496
Disclosure Date: May 23, 2008 (last updated October 04, 2023)
Cross-site scripting (XSS) vulnerability in setroubleshoot 2.0.5 allows local users to inject arbitrary web script or HTML via a crafted (1) file or (2) process name, which triggers an Access Vector Cache (AVC) log entry in a log file used during composition of HTML documents for sealert.
0