seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.securityfocus.com/bid/67341 | vdb-entry x_refsource_BID |
http://lists.opensuse.org/opensuse-updates/2014-06/msg00008.html | vendor-advisory x_refsource_SUSE |
http://openwall.com/lists/oss-security/2014/05/08/1 | mailing-list x_refsource_MLIST |
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html | x_refsource_CONFIRM |
http://advisories.mageia.org/MGASA-2014-0251.html | x_refsource_CONFIRM |
http://secunia.com/advisories/59007 | third-party-advisory x_refsource_SECUNIA |
http://rhn.redhat.com/errata/RHSA-2015-0864.html | vendor-advisory x_refsource_REDHAT |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:156 | vendor-advisory x_refsource_MANDRIVA |
http://openwall.com/lists/oss-security/2014/04/30/4 | mailing-list x_refsource_MLIST |
http://openwall.com/lists/oss-security/2014/04/29/7 | mailing-list x_refsource_MLIST |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.securityfocus.com/bid/67341 | vdb-entry x_refsource_BID x_transferred |
http://lists.opensuse.org/opensuse-updates/2014-06/msg00008.html | vendor-advisory x_refsource_SUSE x_transferred |
http://openwall.com/lists/oss-security/2014/05/08/1 | mailing-list x_refsource_MLIST x_transferred |
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html | x_refsource_CONFIRM x_transferred |
http://advisories.mageia.org/MGASA-2014-0251.html | x_refsource_CONFIRM x_transferred |
http://secunia.com/advisories/59007 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://rhn.redhat.com/errata/RHSA-2015-0864.html | vendor-advisory x_refsource_REDHAT x_transferred |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:156 | vendor-advisory x_refsource_MANDRIVA x_transferred |
http://openwall.com/lists/oss-security/2014/04/30/4 | mailing-list x_refsource_MLIST x_transferred |
http://openwall.com/lists/oss-security/2014/04/29/7 | mailing-list x_refsource_MLIST x_transferred |
seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 6.9 | MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |