Описание
seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
esm-apps/xenial | not-affected | |
esm-infra-legacy/trusty | not-affected | |
lucid | ignored | end of life |
precise | ignored | end of life |
precise/esm | DNE | precise was needed |
quantal | not-affected | |
saucy | not-affected | |
trusty | not-affected | |
trusty/esm | not-affected |
Показывать по
EPSS
6.9 Medium
CVSS2
Связанные уязвимости
seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.
seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.
seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissi ...
seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.
EPSS
6.9 Medium
CVSS2