Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   SETroubleShoot Vendors:   Red Hat
(Oracle Issues Fix for Oracle Linux) SETroubleShoot allow_execmod Plugin Lets Local Users Obtain Root Privileges
SecurityTracker Alert ID:  1036167
SecurityTracker URL:
CVE Reference:   CVE-2016-4444, CVE-2016-4446, CVE-2016-4989   (Links to External Site)
Date:  Jun 24 2016
Impact:   Execution of arbitrary code via local system, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Several vulnerabilities were reported in SETroubleShoot. A local user can obtain root privileges on the target system.

A local user can exploit flaws in the allow_execmod plugin to execute arbitrary shell commands on the target system with root privileges.

Milos Malik (Red Hat) reported these vulnerabilities.

Impact:   A local user can obtain root privileges on the target system.
Solution:   Oracle has issued a fix for CVE-2016-4444, CVE-2016-4446, and CVE-2016-4989.

The Oracle Linux advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:  Linux (Oracle)
Underlying OS Comments:  7

Message History:   This archive entry is a follow-up to the message listed below.
Jun 22 2016 SETroubleShoot allow_execmod Plugin Lets Local Users Obtain Root Privileges

 Source Message Contents

Subject:  [El-errata] ELSA-2016-1293 Important: Oracle Linux 7 setroubleshoot and setroubleshoot-plugins security update

Oracle Linux Security Advisory ELSA-2016-1293

The following updated rpms for Oracle Linux 7 have been uploaded to the 
Unbreakable Linux Network:



Description of changes:

- Add setroubleshoot-oracle-enterprise.patch to change bug reporting
   URL to

- Catch all subprocess module exceptions

- Use subprocess.check_output() with a sequence of program arguments

- Do not use dangerous shell=True

- Add setroubleshoot-plugins-oracle-config.patch to use oracle url
- Add setroubleshoot-plugins-oracle-po.patch to use oracle url for po

- Don't use commands.get*output()
Resolves: CVE-2016-4444, CVE-2016-4446

El-errata mailing list

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC