Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-5220

Опубликовано: 08 июн. 2018
Источник: debian
EPSS Низкий

Описание

The mdcheck script of the mdadm package for openSUSE 13.2 prior to version 3.3.1-5.14.1 does not properly sanitize device names, which allows local attackers to execute arbitrary commands as root.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mdadmfixed3.3.4-1package

Примечания

  • https://bugzilla.suse.com/show_bug.cgi?id=910500

  • https://github.com/mapcollab/mdadm/commit/979b1feb093b1c2e0f8b58716329f2da092741d4

  • misc/mdcheck not installed into binary packages

EPSS

Процентиль: 37%
0.00158
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 7 лет назад

The mdcheck script of the mdadm package for openSUSE 13.2 prior to version 3.3.1-5.14.1 does not properly sanitize device names, which allows local attackers to execute arbitrary commands as root.

CVSS3: 6.6
redhat
около 11 лет назад

The mdcheck script of the mdadm package for openSUSE 13.2 prior to version 3.3.1-5.14.1 does not properly sanitize device names, which allows local attackers to execute arbitrary commands as root.

CVSS3: 7.8
nvd
больше 7 лет назад

The mdcheck script of the mdadm package for openSUSE 13.2 prior to version 3.3.1-5.14.1 does not properly sanitize device names, which allows local attackers to execute arbitrary commands as root.

CVSS3: 7.8
github
больше 3 лет назад

The mdcheck script of the mdadm package for openSUSE 13.2 prior to version 3.3.1-5.14.1 does not properly sanitize device names, which allows local attackers to execute arbitrary commands as root.

EPSS

Процентиль: 37%
0.00158
Низкий