CVE-2018-10906
Published: August 31, 2023Last modified: August 31, 2023
Description
In fuse before versions 2.9.8 and 3.x before 3.2.5, fusermount is vulnerable to a restriction bypass when SELinux is active. This allows non-root users to mount a FUSE file system with the 'allow_other' mount option regardless of whether 'user_allow_other' is set in the fuse configuration. An attacker may use this flaw to mount a FUSE file system, accessible by other users, and trick them into accessing files on that file system, possibly causing Denial of Service or other unspecified effects.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack Vector | LOCAL |
Attack complexity | LOW |
Privileges required | LOW |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | HIGH |
Integrity impact | HIGH |
Availability impact | HIGH |
Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | fuse | Not affected (2.9.9-r1) |
fuse3 | Not affected (3.12.0-r0) | ||
Stream | fuse | Not affected (2.9.9-r4) | |
fuse3 | Not affected (3.15.1-r0) |
References
- https://access.redhat.com/errata/RHSA-2018:3324
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10906
- https://lists.debian.org/debian-lts-announce/2018/08/msg00015.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5XYA6PXT5PPWVK7CM7K4YRCYWA37DODB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A253TZWZK6R7PT2S5JIEAQJR2TYKX7V2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BREAIWIK64DRJWHIGR47L2D5YICY4HQ3/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/5XYA6PXT5PPWVK7CM7K4YRCYWA37DODB/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/A253TZWZK6R7PT2S5JIEAQJR2TYKX7V2/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/BREAIWIK64DRJWHIGR47L2D5YICY4HQ3/
- https://www.debian.org/security/2018/dsa-4257
- https://www.exploit-db.com/exploits/45106/