seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.
Advisories
Source ID Title
EUVD EUVD EUVD-2014-3232 seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00033}

epss

{'score': 0.0007}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T10:35:57.038Z

Reserved: 2014-05-03T00:00:00

Link: CVE-2014-3215

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-05-08T10:55:05.107

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-3215

cve-icon Redhat

Severity : Important

Publid Date: 2012-12-08T00:00:00Z

Links: CVE-2014-3215 - Bugzilla

cve-icon OpenCVE Enrichment

No data.