The allow_execmod plugin for setroubleshoot before 3.2.23 allows local users to execute arbitrary commands by triggering an execmod SELinux denial with a crafted binary filename, related to the commands.getstatusoutput function.
{
"unresolved_ranges": [
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_desktop",
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_hpc_node",
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_server",
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
],
"vendor_product": "redhat:enterprise_linux_workstation",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.0"
}
]
}
]
}