The vulnerability does not affect fapolicyd from the git master, fapolicyd from the latest release, or fapolicyd from the fapolicyd-master branch. Users are advised to upgrade as soon as possible. Our sincere thanks go out to the RedTeam Pentesting team, who responsibly disclosed this bug to us. RedTeam Pentesting: “The assumption made here is that the runtime linker is always named ‘r-link’ and this is completely wrong. In fact, there are a lot of linkers that can be used (e.g. ‘ld.bfd’) and the case is completely unknown. The only case that can be assumed is that the name of the runtime linker is ‘r-link’.” - RedTeam Pentesting

CVE-2022-1118

The vulnerability does not affect fapolicyd from the git master, fapolicyd from the latest release, or fapolicyd from the fapolicyd-master branch. Users are advised to upgrade as soon as possible. Our sincere thanks go out to the RedTeam Pentesting team, who responsibly disclosed this bug to us. RedTeam Pentesting: “The assumption made here is that the runtime linker is always named ‘r-link’ and this is completely wrong. In fact, there are a lot of linkers that can be used (e.g. ‘ld.bfd’) and the case is completely unknown. The only case that can be assumed is that the name of the runtime linker is ‘r-link’.” - RedTeam Pentesting
There are two vulnerabilities found in some versions of fapolicyd released in February 2018 and they have already been patched by "fapolicyd-master" release

CVE-2020-3654

The vulnerability does not affect any of the aforementioned versions. Users should upgrade to fapolicyd v1.0 as soon as possible.

What is fapolicyd?

Fapolicyd is a Linux kernel module which provides a user-space interface to the Linux kernel file systems. It exposes various file system features such as inode number, ownership and permissions, i.e., everything that is relevant for file system management.

CVE-2022-1112

The vulnerability does not affect fapolicyd from the git master, fapolicyd from the latest release, or fapolicyd from the fapolicyd-master branch. Users are advised to upgrade as soon as possible. Our sincere thanks go out to the RedTeam Pentesting team, who responsibly disclosed this bug to us. RedTeam Pentesting: “This is a function call that simply prints a message to stdout and exits (returns). There is no parameter passed to this function and no checks made on it afterwards.” - RedTeam Pentesting

Timeline

Published on: 08/29/2022 15:15:00 UTC
Last modified on: 09/07/2022 13:42:00 UTC

References