CVE-2014-3215

NameCVE-2014-3215
Descriptionseunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
policycoreutils (PTS)buster2.8-1fixed
bullseye3.1-3fixed
bookworm3.4-1fixed
sid, trixie3.5-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
policycoreutilssource(unstable)(not affected)

Notes

- policycoreutils <not-affected> (seunshare not enabled/built in Debian)

Search for package or bug name: Reporting problems