Lucene search

K
f5F5F5:K16876
HistoryJul 02, 2015 - 12:00 a.m.

K16876 : Mount (seunshare_mount) vulnerability CVE-2011-1101

2015-07-0200:00:00
my.f5.com
12

6.4 Medium

AI Score

Confidence

High

0.02 Low

EPSS

Percentile

89.0%

Security Advisory Description

Description

The seunshare_mount function in sandbox/seunshare.c in seunshare in certain Red Hat packages of policycoreutils 2.0.83 and earlier in Red Hat Enterprise Linux (RHEL) 6 and earlier, and Fedora 14 and earlier, mounts a new directory on top of /tmp without assigning root ownership and the sticky bit to this new directory, which allows local users to replace or delete arbitrary /tmp files, and consequently cause a denial of service or possibly gain privileges, by running a setuid application that relies on /tmp, as demonstrated by the ksu application.

Impact

There is no impact; No F5 products are affected by this vulnerability.

Status

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:

Product Versions known to be vulnerable Versions known to be not vulnerable Severity Vulnerable component or feature
BIG-IP LTM None
11.0.0 - 11.6.0
10.1.0 - 10.2.4

| Not vulnerable| None
BIG-IP AAM| None| 11.4.0 - 11.6.0
| Not vulnerable| None
BIG-IP AFM| None| 11.3.0 - 11.6.0
| Not vulnerable| None
BIG-IP Analytics| None| 11.0.0 - 11.6.0
| Not vulnerable| None
BIG-IP APM| None| 11.0.0 - 11.6.0
10.1.0 - 10.2.4
| Not vulnerable| None
BIG-IP ASM| None| 11.0.0 - 11.6.0
10.1.0 - 10.2.4
| Not vulnerable| None
BIG-IP Edge Gateway
| None| 11.0.0 - 11.3.0
10.1.0 - 10.2.4
| Not vulnerable| None
BIG-IP GTM| None| 11.0.0 - 11.6.0
10.1.0 - 10.2.4
| Not vulnerable| None
BIG-IP Link Controller| None
| 11.0.0 - 11.6.0
10.1.0 - 10.2.4
| Not vulnerable| None
BIG-IP PEM| None
| 11.3.0 - 11.6.0
| Not vulnerable| None
BIG-IP PSM| None| 11.0.0 - 11.4.1
10.1.0 - 10.2.4
| Not vulnerable| None
BIG-IP WebAccelerator| None| 11.0.0 - 11.3.0
10.1.0 - 10.2.4
| Not vulnerable| None
BIG-IP WOM| None| 11.0.0 - 11.3.0
10.1.0 - 10.2.4
| Not vulnerable| None
ARX| None| 6.0.0 - 6.4.0
| Not vulnerable| None
Enterprise Manager| None| 3.0.0 - 3.1.1
| Not vulnerable| None
FirePass| None| 7.0.0
6.0.0 - 6.1.0
| Not vulnerable| None
BIG-IQ Cloud| None
| 4.0.0 - 4.5.0
| Not vulnerable| None
BIG-IQ Device| None
| 4.2.0 - 4.5.0
| Not vulnerable| None
BIG-IQ Security| None
| 4.0.0 - 4.5.0
| Not vulnerable| None
BIG-IQ ADC| None
| 4.5.0
| Not vulnerable| None
LineRate| None
| 2.5.0 - 2.6.0
| Not vulnerable| None
F5 WebSafe| None
| 1.0.0
| Not vulnerable| None
Traffix SDC| None
| 4.0.0 - 4.4.0
3.3.2 - 3.5.1
| Not vulnerable| None

Note: As of February 17, 2015, AskF5 Security Advisory articles include the Severity value. Security Advisory articles published before this date do not list a Severity value.

Recommended Action

None

Supplemental Information

6.4 Medium

AI Score

Confidence

High

0.02 Low

EPSS

Percentile

89.0%