First published: Tue May 24 2016(Updated: )
The fix_lookup_id function in sealert in setroubleshoot before 3.2.23 allows local users to execute arbitrary commands as root by triggering an SELinux denial with a crafted file name, related to executing external commands with the commands.getstatusoutput function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/setroubleshoot | <3.2.23 | 3.2.23 |
Red Hat Setroubleshoot-server | <=3.2.22 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =7.0 |
https://github.com/fedora-selinux/setroubleshoot/commit/2d12677629ca319310f6263688bb1b7f676c01b7
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4445 has a medium severity rating as it allows local users to execute arbitrary commands as root.
To fix CVE-2016-4445, update the setroubleshoot package to version 3.2.23 or later.
CVE-2016-4445 affects versions of setroubleshoot prior to 3.2.23 and specific distributions of Red Hat Enterprise Linux 7.0.
CVE-2016-4445 can be exploited by triggering an SELinux denial with a crafted file name.
Yes, CVE-2016-4445 is fixed in setroubleshoot version 3.2.23 and subsequent releases.