RHSA-2020:5608
Vulnerability from csaf_redhat - Published: 2020-12-17 07:46 - Updated: 2025-11-21 18:19Summary
Red Hat Security Advisory: fapolicyd bug fix update
Notes
Topic
An update for fapolicyd is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Details
The fapolicyd software framework introduces a form of file access control based on a user-defined policy. The application file access control feature provides one of the most efficient ways to prevent running untrusted and possibly malicious applications on the system.
Bug Fix:
* When an update replaces the binary of a running application, the kernel modifies the application binary path in memory by appending the " (deleted)" suffix. Previously, the fapolicyd file access policy daemon treated such applications as untrusted, and prevented them from opening and executing any other files. As a consequence, the system was sometimes unable to boot after applying updates.
With this update, fapolicyd ignores the suffix in the binary path so the binary can match the trust database. As a result, fapolicyd enforces the rules correctly and the update process can finish.
(BZ#1906473)
Note: The issue from BZ#1906473 was previously addressed in erratum RHBA-2020:5243 linked to from the References section. Due to the high impact of the issue that can cause systems to become unable to boot, we are releasing the same fix again in a security erratum to ensure proper visibility to users who only install security updates. This fix has not been changed in any way since the original bug fix erratum. This erratum does not provide any security fixes.
For more details about the issue, see the Knowledgebase article linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_informational_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for fapolicyd is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.",
"title": "Topic"
},
{
"category": "general",
"text": "The fapolicyd software framework introduces a form of file access control based on a user-defined policy. The application file access control feature provides one of the most efficient ways to prevent running untrusted and possibly malicious applications on the system.\n\nBug Fix:\n\n* When an update replaces the binary of a running application, the kernel modifies the application binary path in memory by appending the \" (deleted)\" suffix. Previously, the fapolicyd file access policy daemon treated such applications as untrusted, and prevented them from opening and executing any other files. As a consequence, the system was sometimes unable to boot after applying updates.\n\nWith this update, fapolicyd ignores the suffix in the binary path so the binary can match the trust database. As a result, fapolicyd enforces the rules correctly and the update process can finish.\n\n(BZ#1906473)\n\nNote: The issue from BZ#1906473 was previously addressed in erratum RHBA-2020:5243 linked to from the References section. Due to the high impact of the issue that can cause systems to become unable to boot, we are releasing the same fix again in a security erratum to ensure proper visibility to users who only install security updates. This fix has not been changed in any way since the original bug fix erratum. This erratum does not provide any security fixes.\n\nFor more details about the issue, see the Knowledgebase article linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5608",
"url": "https://access.redhat.com/errata/RHSA-2020:5608"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHBA-2020:5243",
"url": "https://access.redhat.com/errata/RHBA-2020:5243"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/5542661",
"url": "https://access.redhat.com/solutions/5542661"
},
{
"category": "external",
"summary": "1906473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906473"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5608.json"
}
],
"title": "Red Hat Security Advisory: fapolicyd bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:19:19+00:00",
"generator": {
"date": "2025-11-21T18:19:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2020:5608",
"initial_release_date": "2020-12-17T07:46:58+00:00",
"revision_history": [
{
"date": "2020-12-17T07:46:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-17T07:46:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:19:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "fapolicyd-0:0.9.1-4.el8_2.4.src",
"product": {
"name": "fapolicyd-0:0.9.1-4.el8_2.4.src",
"product_id": "fapolicyd-0:0.9.1-4.el8_2.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fapolicyd@0.9.1-4.el8_2.4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "fapolicyd-0:0.9.1-4.el8_2.4.aarch64",
"product": {
"name": "fapolicyd-0:0.9.1-4.el8_2.4.aarch64",
"product_id": "fapolicyd-0:0.9.1-4.el8_2.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fapolicyd@0.9.1-4.el8_2.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fapolicyd-debugsource-0:0.9.1-4.el8_2.4.aarch64",
"product": {
"name": "fapolicyd-debugsource-0:0.9.1-4.el8_2.4.aarch64",
"product_id": "fapolicyd-debugsource-0:0.9.1-4.el8_2.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fapolicyd-debugsource@0.9.1-4.el8_2.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fapolicyd-debuginfo-0:0.9.1-4.el8_2.4.aarch64",
"product": {
"name": "fapolicyd-debuginfo-0:0.9.1-4.el8_2.4.aarch64",
"product_id": "fapolicyd-debuginfo-0:0.9.1-4.el8_2.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fapolicyd-debuginfo@0.9.1-4.el8_2.4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "fapolicyd-0:0.9.1-4.el8_2.4.ppc64le",
"product": {
"name": "fapolicyd-0:0.9.1-4.el8_2.4.ppc64le",
"product_id": "fapolicyd-0:0.9.1-4.el8_2.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fapolicyd@0.9.1-4.el8_2.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fapolicyd-debugsource-0:0.9.1-4.el8_2.4.ppc64le",
"product": {
"name": "fapolicyd-debugsource-0:0.9.1-4.el8_2.4.ppc64le",
"product_id": "fapolicyd-debugsource-0:0.9.1-4.el8_2.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fapolicyd-debugsource@0.9.1-4.el8_2.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fapolicyd-debuginfo-0:0.9.1-4.el8_2.4.ppc64le",
"product": {
"name": "fapolicyd-debuginfo-0:0.9.1-4.el8_2.4.ppc64le",
"product_id": "fapolicyd-debuginfo-0:0.9.1-4.el8_2.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fapolicyd-debuginfo@0.9.1-4.el8_2.4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "fapolicyd-0:0.9.1-4.el8_2.4.x86_64",
"product": {
"name": "fapolicyd-0:0.9.1-4.el8_2.4.x86_64",
"product_id": "fapolicyd-0:0.9.1-4.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fapolicyd@0.9.1-4.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fapolicyd-debugsource-0:0.9.1-4.el8_2.4.x86_64",
"product": {
"name": "fapolicyd-debugsource-0:0.9.1-4.el8_2.4.x86_64",
"product_id": "fapolicyd-debugsource-0:0.9.1-4.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fapolicyd-debugsource@0.9.1-4.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fapolicyd-debuginfo-0:0.9.1-4.el8_2.4.x86_64",
"product": {
"name": "fapolicyd-debuginfo-0:0.9.1-4.el8_2.4.x86_64",
"product_id": "fapolicyd-debuginfo-0:0.9.1-4.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fapolicyd-debuginfo@0.9.1-4.el8_2.4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "fapolicyd-0:0.9.1-4.el8_2.4.s390x",
"product": {
"name": "fapolicyd-0:0.9.1-4.el8_2.4.s390x",
"product_id": "fapolicyd-0:0.9.1-4.el8_2.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fapolicyd@0.9.1-4.el8_2.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fapolicyd-debugsource-0:0.9.1-4.el8_2.4.s390x",
"product": {
"name": "fapolicyd-debugsource-0:0.9.1-4.el8_2.4.s390x",
"product_id": "fapolicyd-debugsource-0:0.9.1-4.el8_2.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fapolicyd-debugsource@0.9.1-4.el8_2.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fapolicyd-debuginfo-0:0.9.1-4.el8_2.4.s390x",
"product": {
"name": "fapolicyd-debuginfo-0:0.9.1-4.el8_2.4.s390x",
"product_id": "fapolicyd-debuginfo-0:0.9.1-4.el8_2.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fapolicyd-debuginfo@0.9.1-4.el8_2.4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fapolicyd-0:0.9.1-4.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:fapolicyd-0:0.9.1-4.el8_2.4.aarch64"
},
"product_reference": "fapolicyd-0:0.9.1-4.el8_2.4.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fapolicyd-0:0.9.1-4.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:fapolicyd-0:0.9.1-4.el8_2.4.ppc64le"
},
"product_reference": "fapolicyd-0:0.9.1-4.el8_2.4.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fapolicyd-0:0.9.1-4.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:fapolicyd-0:0.9.1-4.el8_2.4.s390x"
},
"product_reference": "fapolicyd-0:0.9.1-4.el8_2.4.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fapolicyd-0:0.9.1-4.el8_2.4.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:fapolicyd-0:0.9.1-4.el8_2.4.src"
},
"product_reference": "fapolicyd-0:0.9.1-4.el8_2.4.src",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fapolicyd-0:0.9.1-4.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:fapolicyd-0:0.9.1-4.el8_2.4.x86_64"
},
"product_reference": "fapolicyd-0:0.9.1-4.el8_2.4.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fapolicyd-debuginfo-0:0.9.1-4.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:fapolicyd-debuginfo-0:0.9.1-4.el8_2.4.aarch64"
},
"product_reference": "fapolicyd-debuginfo-0:0.9.1-4.el8_2.4.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fapolicyd-debuginfo-0:0.9.1-4.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:fapolicyd-debuginfo-0:0.9.1-4.el8_2.4.ppc64le"
},
"product_reference": "fapolicyd-debuginfo-0:0.9.1-4.el8_2.4.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fapolicyd-debuginfo-0:0.9.1-4.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:fapolicyd-debuginfo-0:0.9.1-4.el8_2.4.s390x"
},
"product_reference": "fapolicyd-debuginfo-0:0.9.1-4.el8_2.4.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fapolicyd-debuginfo-0:0.9.1-4.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:fapolicyd-debuginfo-0:0.9.1-4.el8_2.4.x86_64"
},
"product_reference": "fapolicyd-debuginfo-0:0.9.1-4.el8_2.4.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fapolicyd-debugsource-0:0.9.1-4.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:fapolicyd-debugsource-0:0.9.1-4.el8_2.4.aarch64"
},
"product_reference": "fapolicyd-debugsource-0:0.9.1-4.el8_2.4.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fapolicyd-debugsource-0:0.9.1-4.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:fapolicyd-debugsource-0:0.9.1-4.el8_2.4.ppc64le"
},
"product_reference": "fapolicyd-debugsource-0:0.9.1-4.el8_2.4.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fapolicyd-debugsource-0:0.9.1-4.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:fapolicyd-debugsource-0:0.9.1-4.el8_2.4.s390x"
},
"product_reference": "fapolicyd-debugsource-0:0.9.1-4.el8_2.4.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fapolicyd-debugsource-0:0.9.1-4.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:fapolicyd-debugsource-0:0.9.1-4.el8_2.4.x86_64"
},
"product_reference": "fapolicyd-debugsource-0:0.9.1-4.el8_2.4.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
}
]
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…