Vulnerability Description
seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Selinuxproject | Policycoreutils | 2.2.5 |
Related Weaknesses (CWE)
References
- http://advisories.mageia.org/MGASA-2014-0251.html
- http://lists.opensuse.org/opensuse-updates/2014-06/msg00008.html
- http://openwall.com/lists/oss-security/2014/04/29/7
- http://openwall.com/lists/oss-security/2014/04/30/4
- http://openwall.com/lists/oss-security/2014/05/08/1
- http://rhn.redhat.com/errata/RHSA-2015-0864.html
- http://secunia.com/advisories/59007
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:156
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.h
- http://www.securityfocus.com/bid/67341
- http://advisories.mageia.org/MGASA-2014-0251.html
- http://lists.opensuse.org/opensuse-updates/2014-06/msg00008.html
- http://openwall.com/lists/oss-security/2014/04/29/7
- http://openwall.com/lists/oss-security/2014/04/30/4
- http://openwall.com/lists/oss-security/2014/05/08/1
FAQ
What is CVE-2014-3215?
CVE-2014-3215 is a vulnerability with a CVSS score of 6.9 (MEDIUM). seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-...
How severe is CVE-2014-3215?
CVE-2014-3215 has been rated MEDIUM with a CVSS base score of 6.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-3215?
Check the references section above for vendor advisories and patch information. Affected products include: Selinuxproject Policycoreutils.