CVE-2011-1011

CWE-2645 documents5 sources
Severity
6.9MEDIUM
EPSS
0.0%
top 86.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 24
Latest updateMay 14

Description

The seunshare_mount function in sandbox/seunshare.c in seunshare in certain Red Hat packages of policycoreutils 2.0.83 and earlier in Red Hat Enterprise Linux (RHEL) 6 and earlier, and Fedora 14 and earlier, mounts a new directory on top of /tmp without assigning root ownership and the sticky bit to this new directory, which allows local users to replace or delete arbitrary /tmp files, and consequently cause a denial of service or possibly gain privileges, by running a setuid application that re

CVSS vector

AV:L/AC:M/C:C/I:C/A:CExploitability: 3.4 | Impact: 10.0

Affected Packages1 packages

NVDredhat/policycoreutils2.0.83+257

Also affects: Enterprise Linux 3, 4, 5, 6.0, Fedora 10, 12, 13, 14, 6, 7, 8, 9

Patches

🔴Vulnerability Details

2
GHSA
GHSA-7fgm-8fq2-6xv7: The seunshare_mount function in sandbox/seunshare2022-05-14
CVEList
CVE-2011-1011: The seunshare_mount function in sandbox/seunshare2011-02-24

📋Vendor Advisories

1
Red Hat
policycoreutils: insecure temporary directory handling in seunshare2011-02-22

💬Community

1
Bugzilla
CVE-2011-1011 policycoreutils: insecure temporary directory handling in seunshare2010-09-13