As a consequence of wrong dynamic preparation during the build time the fapolicyd service allows to execute any arbitrary code by unprivileged user if executed via the dynamic linker. References: https://bugzilla.redhat.com/show_bug.cgi?id=2066904
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1898 https://access.redhat.com/errata/RHSA-2022:1898
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-1117
Created fapolicyd tracking bugs for this issue: Affects: fedora-all [bug 2089692]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:4824 https://access.redhat.com/errata/RHSA-2022:4824