First published: Tue May 24 2016(Updated: )
The allow_execstack plugin for setroubleshoot allows local users to execute arbitrary commands by triggering an execstack SELinux denial with a crafted filename, related to the commands.getoutput function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/setroubleshoot-plugins | <3.2.27.1 | 3.2.27.1 |
redhat/setroubleshoot-plugins | <3.3.9.1 | 3.3.9.1 |
Red Hat Setroubleshoot-server | <=- | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =7.0 |
https://github.com/fedora-selinux/setroubleshoot/commit/eaccf4c0d20a27d3df5ff6de8c9dcc80f6f40718
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4446 is considered a high severity vulnerability that allows local users to execute arbitrary commands.
To mitigate CVE-2016-4446, update the setroubleshoot-plugins package to version 3.2.27.1 or 3.3.9.1 or later.
CVE-2016-4446 affects Red Hat Enterprise Linux Desktop, HPC Node, Server, and Workstation running versions 7.0 and earlier.
The exploit vector for CVE-2016-4446 involves triggering an execstack SELinux denial using a specifically crafted filename.
Local users with access to the affected systems can exploit CVE-2016-4446 to execute arbitrary commands.