Описание
The fix_lookup_id function in sealert in setroubleshoot before 3.2.23 allows local users to execute arbitrary commands as root by triggering an SELinux denial with a crafted file name, related to executing external commands with the commands.getstatusoutput function.
Ссылки
- ExploitMailing ListPatchThird Party Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Issue Tracking
- Patch
- Third Party Advisory
- ExploitMailing ListPatchThird Party Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Issue Tracking
- Patch
- Third Party Advisory
Уязвимые конфигурации
Одно из
EPSS
7 High
CVSS3
6.9 Medium
CVSS2
Дефекты
Связанные уязвимости
The fix_lookup_id function in sealert in setroubleshoot before 3.2.23 allows local users to execute arbitrary commands as root by triggering an SELinux denial with a crafted file name, related to executing external commands with the commands.getstatusoutput function.
The fix_lookup_id function in sealert in setroubleshoot before 3.2.23 allows local users to execute arbitrary commands as root by triggering an SELinux denial with a crafted file name, related to executing external commands with the commands.getstatusoutput function.
ELSA-2016-1267: setroubleshoot and setroubleshoot-plugins security update (IMPORTANT)
EPSS
7 High
CVSS3
6.9 Medium
CVSS2