First published: Tue Mar 11 2025(Updated: )
### Impact A privilege escalation vulnerability existed in the Below service prior to v0.9.0 due to the creation of a world-writable directory at /var/log/below. This could have allowed local unprivileged users to escalate to root privileges through symlink attacks that manipulate files such as /etc/shadow. ### Patches https://github.com/facebookincubator/below/commit/10e73a21d67baa2cd613ee92ce999cda145e1a83 This is included in version 0.9.0 ### Workarounds Change the permission on `/var/log/below` manually ### References https://www.facebook.com/security/advisories/cve-2025-27591 https://www.cve.org/CVERecord?id=CVE-2025-27591
Affected Software | Affected Version | How to fix |
---|---|---|
rust/below | <0.9.0 | 0.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
GHSA-9mc5-7qhg-fp3w is a privilege escalation vulnerability that poses a critical security risk.
To fix GHSA-9mc5-7qhg-fp3w, upgrade to Below version 0.9.0 or later immediately.
All users running Below versions prior to 0.9.0 are affected by GHSA-9mc5-7qhg-fp3w.
GHSA-9mc5-7qhg-fp3w enables local unprivileged users to escalate their privileges to root through symlink attacks.
The vulnerable directory created by GHSA-9mc5-7qhg-fp3w is located at /var/log/below.