First published: Tue May 03 2016(Updated: )
The allow_execmod plugin for setroubleshoot before 3.2.23 allows local users to execute arbitrary commands by triggering an execmod SELinux denial with a crafted binary filename, related to the commands.getstatusoutput function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/setroubleshoot-plugins | <3.2.23 | 3.2.23 |
Red Hat Setroubleshoot-server | <=3.2.22 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =7.0 |
https://github.com/fedora-selinux/setroubleshoot/commit/5cd60033ea7f5bdf8c19c27b23ea2d773d9b09f5
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4444 is considered a high-severity vulnerability due to its potential to allow local users to execute arbitrary commands.
To fix CVE-2016-4444, you should upgrade to setroubleshoot-plugins version 3.2.23 or later.
CVE-2016-4444 affects users running setroubleshoot-plugins versions earlier than 3.2.23 on systems like Red Hat Enterprise Linux 7.0.
CVE-2016-4444 is caused by inadequate handling of execmod SELinux denials, allowing crafted binary filenames to execute arbitrary commands.
CVE-2016-4444 is a local vulnerability, allowing exploitation only by authenticated users with local access.