Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-11480

Опубликовано: 14 апр. 2020
Источник: nvd
CVSS3: 8.4
CVSS3: 8.1
CVSS2: 6.8
EPSS Низкий

Описание

The pc-kernel snap build process hardcoded the --allow-insecure-repositories and --allow-unauthenticated apt options when creating the build chroot environment. This could allow an attacker who is able to perform a MITM attack between the build environment and the Ubuntu archive to install a malicious package within the build chroot. This issue affects pc-kernel versions prior to and including 2019-07-16

Ссылки

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:canonical:c-kernel:*:*:*:*:*:*:*:*
Версия до 2019-07-16 (включая)

EPSS

Процентиль: 62%
0.00427
Низкий

8.4 High

CVSS3

8.1 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-353
CWE-345

Связанные уязвимости

CVSS3: 8.4
ubuntu
почти 6 лет назад

The pc-kernel snap build process hardcoded the --allow-insecure-repositories and --allow-unauthenticated apt options when creating the build chroot environment. This could allow an attacker who is able to perform a MITM attack between the build environment and the Ubuntu archive to install a malicious package within the build chroot. This issue affects pc-kernel versions prior to and including 2019-07-16

github
больше 3 лет назад

The pc-kernel snap build process hardcoded the --allow-insecure-repositories and --allow-unauthenticated apt options when creating the build chroot environment. This could allow an attacker who is able to perform a MITM attack between the build environment and the Ubuntu archive to install a malicious package within the build chroot. This issue affects pc-kernel versions prior to and including 2019-07-16

CVSS3: 8.4
fstec
больше 6 лет назад

Уязвимость процесса сборки ядра pc-kernel операционных систем семейства Ubuntu, позволяющая нарушителю реализовать атаку типа «человек посередине»

EPSS

Процентиль: 62%
0.00427
Низкий

8.4 High

CVSS3

8.1 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-353
CWE-345