{"id":"CVE-2016-7545","details":"SELinux policycoreutils allows local users to execute arbitrary commands outside of the sandbox via a crafted TIOCSTI ioctl call.","modified":"2026-05-18T05:48:39.615946048Z","published":"2017-01-19T20:59:00.533Z","related":["SUSE-SU-2017:0338-1","SUSE-SU-2017:0339-1","SUSE-SU-2017:0340-1","openSUSE-SU-2024:10759-1","openSUSE-SU-2024:11179-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","extracted_events":[{"last_affected":"25"}],"cpes":["cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*"],"vendor_product":"fedoraproject:fedora"},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"}],"source":"CPE_FIELD","vendor_product":"redhat:enterprise_linux_desktop"},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"}],"source":"CPE_FIELD","vendor_product":"redhat:enterprise_linux_hpc_node"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_server"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"7.3"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_server_tus"},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"}],"source":"CPE_FIELD","vendor_product":"redhat:enterprise_linux_workstation"}]},"references":[{"type":"WEB","url":"http://www.securitytracker.com/id/1037283"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPRNK3PWMAVNJZ53YW5GOEOGJSFNAQIF/"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2702.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0535.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0536.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/09/25/1"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/93156"},{"type":"ADVISORY","url":"https://marc.info/?l=selinux&m=147465160112766&w=2"},{"type":"FIX","url":"https://github.com/SELinuxProject/selinux/commit/acca96a135a4d2a028ba9b636886af99c0915379"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/selinuxproject/selinux","events":[{"introduced":"0"},{"fixed":"acca96a135a4d2a028ba9b636886af99c0915379"}],"database_specific":{"source":"REFERENCES"}}],"versions":["sepolgen-1.2.3","secilc-2.5","policycoreutils-2.5","libsepol-2.5","libsemanage-2.5","libselinux-2.5","checkpolicy-2.5","20160223","sepolgen-1.2.3-rc1","secilc-2.5-rc1","policycoreutils-2.5-rc1","libsepol-2.5-rc1","libsemanage-2.5-rc1","libselinux-2.5-rc1","checkpolicy-2.5-rc1","20160107","sepolgen-1.2.2","policycoreutils-2.4","libsepol-2.4","libsemanage-2.4","libselinux-2.4","checkpolicy-2.4","20150202","sepolgen-1.2.2-rc7","policycoreutils-2.4-rc7","libsepol-2.4-rc7","libsemanage-2.4-rc7","libselinux-2.4-rc7","checkpolicy-2.4-rc7","20140826-rc7","sepolgen-1.2.2-rc6","policycoreutils-2.4-rc6","libsepol-2.4-rc6","libsemanage-2.4-rc6","libselinux-2.4-rc6","checkpolicy-2.4-rc6","20140826-rc6","sepolgen-1.2.2-rc5","policycoreutils-2.4-rc5","libsepol-2.4-rc5","libsemanage-2.4-rc5","libselinux-2.4-rc5","checkpolicy-2.4-rc5","20140826-rc5","sepolgen-1.2.2-rc4","policycoreutils-2.4-rc4","libsepol-2.4-rc4","libsemanage-2.4-rc4","libselinux-2.4-rc4","checkpolicy-2.4-rc4","20140826-rc4","sepolgen-1.2.2-rc3","policycoreutils-2.4-rc3","libsepol-2.4-rc3","libsemanage-2.4-rc3","libselinux-2.4-rc3","checkpolicy-2.4-rc3","20140826-rc3","sepolgen-1.2.2-rc2","policycoreutils-2.4-rc2","libsepol-2.4-rc2","libsemanage-2.4-rc2","libselinux-2.4-rc2","20140826-rc2","20140826-rc1","policycoreutils-2.3","libsepol-2.3","libsemanage-2.3","libselinux-2.3","checkpolicy-2.3","20140506","policycoreutils-2.3-rc1","libsepol-2.3-rc1","libsemanage-2.3-rc1","libselinux-2.3-rc1","checkpolicy-2.3-rc1","policycoreutils-2.2.2","20131030_4","policycoreutils-2.2.1","20131030_3","sepolgen-1.2.1","20131030_2","sepolgen-1.2","policycoreutils-2.2","libsepol-2.2","libsemanage-2.2","libselinux-2.2","checkpolicy-2.2","20131030_1","20131030","20130423","20120924","20120216","20110727","20101221","20100525","20091123","20090731","20090403","20080909"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-7545.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}]}