Permissions, Privileges, and Access Controls in policycoreutils - CVE-2014-3215
Published: May 8, 2014 / Updated: August 4, 2020
policycoreutils
Detailed vulnerability description
The vulnerability allows a local non-authenticated attacker to execute arbitrary code.
seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.
How to mitigate CVE-2014-3215
Sources
- http://advisories.mageia.org/MGASA-2014-0251.html
- http://lists.opensuse.org/opensuse-updates/2014-06/msg00008.html
- http://openwall.com/lists/oss-security/2014/04/29/7
- http://openwall.com/lists/oss-security/2014/04/30/4
- http://openwall.com/lists/oss-security/2014/05/08/1
- http://rhn.redhat.com/errata/RHSA-2015-0864.html
- http://secunia.com/advisories/59007
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:156
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/67341