Red Hat Customer Portal

Skip to main content

CVE-2011-1011

Impact:
Important
Public Date:
2011-02-22
Bugzilla:
633544: CVE-2011-1011 policycoreutils: insecure temporary directory handling in seunshare

The MITRE CVE dictionary describes this issue as:

The seunshare_mount function in sandbox/seunshare.c in seunshare in certain Red Hat packages of policycoreutils 2.0.83 and earlier in Red Hat Enterprise Linux (RHEL) 6 and earlier, and Fedora 14 and earlier, mounts a new directory on top of /tmp without assigning root ownership and the sticky bit to this new directory, which allows local users to replace or delete arbitrary /tmp files, and consequently cause a denial of service or possibly gain privileges, by running a setuid application that relies on /tmp, as demonstrated by the ksu application.

Find out more about CVE-2011-1011 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 6.9
Base Metrics AV:L/AC:M/Au:N/C:C/I:C/A:C
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 6 (policycoreutils) RHSA-2011:0414 2011-04-04

Affected Packages State

Platform Package State
Red Hat Enterprise Linux version 6 policycoreutils 2.0.83-19.8.el6_0 Fixed
Red Hat Enterprise Linux version 6 selinux-policy 3.7.19-54.el6_0.5 Fixed

Acknowledgements

Red Hat would like to thank Tavis Ormandy for reporting this issue.

Last Modified