Описание
SELinux policycoreutils allows local users to execute arbitrary commands outside of the sandbox via a crafted TIOCSTI ioctl call.
It was found that the sandbox tool provided in policycoreutils was vulnerable to a TIOCSTI ioctl attack. A specially crafted program executed via the sandbox command could use this flaw to execute arbitrary commands in the context of the parent shell, escaping the sandbox.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | policycoreutils | Not affected | ||
| Red Hat Enterprise Linux 6 | policycoreutils | Fixed | RHSA-2016:2702 | 14.11.2016 |
| Red Hat Enterprise Linux 7 | policycoreutils | Fixed | RHSA-2016:2702 | 14.11.2016 |
| Red Hat Enterprise Linux 7.1 Extended Update Support | policycoreutils | Fixed | RHSA-2017:0536 | 15.03.2017 |
| Red Hat Enterprise Linux 7.2 Extended Update Support | policycoreutils | Fixed | RHSA-2017:0535 | 15.03.2017 |
Показывать по
Дополнительная информация
Статус:
EPSS
8.6 High
CVSS3
6.8 Medium
CVSS2
Связанные уязвимости
SELinux policycoreutils allows local users to execute arbitrary commands outside of the sandbox via a crafted TIOCSTI ioctl call.
SELinux policycoreutils allows local users to execute arbitrary commands outside of the sandbox via a crafted TIOCSTI ioctl call.
SELinux policycoreutils allows local users to execute arbitrary comman ...
EPSS
8.6 High
CVSS3
6.8 Medium
CVSS2