Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2011-1011
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The seunshare_mount function in sandbox/seunshare.c in seunshare in certain Red Hat packages of policycoreutils 2.0.83 and earlier in Red Hat Enterprise Linux (RHEL) 6 and earlier, and Fedora 14 and earlier, mounts a new directory on top of /tmp without assigning root ownership and the sticky bit to this new directory, which allows local users to replace or delete arbitrary /tmp files, and consequently cause a denial of service or possibly gain privileges, by running a setuid application that relies on /tmp, as demonstrated by the ksu application.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Red Hat Enterprise Linux和Fedora seunshare seunshare_mount函数本地拒绝服务漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Red Hat Enterprise Linux(RHEL)是美国红帽(Red Hat)公司维护和发布的一套面向企业用户的Linux操作系统。 Fedora 是一个开放的、创新的、前瞻性的操作系统和平台,基于Linux。 Red Hat Enterprise Linux (RHEL) 6及之前版本,以及Fedora 14及之前版本的policycoreutils 2.0.83版本的某些Red Hat包中的seunshare的sandbox/seunshare.c中的seunshare_mount函数在/t
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2011-1011
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2011-1011
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2011-1011

No comments yet


Leave a comment