seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.
References
Configurations
History
21 Nov 2024, 02:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://advisories.mageia.org/MGASA-2014-0251.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2014-06/msg00008.html - | |
References | () http://openwall.com/lists/oss-security/2014/04/29/7 - | |
References | () http://openwall.com/lists/oss-security/2014/04/30/4 - | |
References | () http://openwall.com/lists/oss-security/2014/05/08/1 - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-0864.html - | |
References | () http://secunia.com/advisories/59007 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2015:156 - | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - | |
References | () http://www.securityfocus.com/bid/67341 - |
Information
Published : 2014-05-08 10:55
Updated : 2024-11-21 02:07
NVD link : CVE-2014-3215
Mitre link : CVE-2014-3215
CVE.ORG link : CVE-2014-3215
JSON object : View
Products Affected
selinuxproject
- policycoreutils
CWE
CWE-264
Permissions, Privileges, and Access Controls