Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2010-3380

Опубликовано: 29 сент. 2010
Источник: debian

Описание

The (1) init.d/slurm and (2) init.d/slurmdbd scripts in SLURM before 2.1.14 place the . (dot) directory in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
slurm-llnlfixed2.1.15-2package
slurm-llnlfixed2.1.11-1squeeze1wheezypackage
slurm-llnlfixed2.1.11-1squeeze1squeezepackage
slurm-llnlno-dsalennypackage

Примечания

  • Debian package ships its own, also vulnerable, init script. NOT fixed in 2.1.14-1

Связанные уязвимости

ubuntu
больше 15 лет назад

The (1) init.d/slurm and (2) init.d/slurmdbd scripts in SLURM before 2.1.14 place the . (dot) directory in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.

nvd
больше 15 лет назад

The (1) init.d/slurm and (2) init.d/slurmdbd scripts in SLURM before 2.1.14 place the . (dot) directory in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.

github
больше 3 лет назад

The (1) init.d/slurm and (2) init.d/slurmdbd scripts in SLURM before 2.1.14 place the . (dot) directory in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.