Описание
LTSP LDM through 2.18.06 allows fat-client root access because the LDM_USERNAME variable may have an empty value if the user's shell lacks support for Bourne shell syntax. This is related to a run-x-session script.
Ссылки
- PatchThird Party Advisory
- Mailing ListPatchThird Party Advisory
- Third Party Advisory
- PatchThird Party Advisory
- Mailing ListPatchThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Одно из
EPSS
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
Связанные уязвимости
LTSP LDM through 2.18.06 allows fat-client root access because the LDM_USERNAME variable may have an empty value if the user's shell lacks support for Bourne shell syntax. This is related to a run-x-session script.
LTSP LDM through 2.18.06 allows fat-client root access because the LDM ...
LTSP LDM through 2.18.06 allows fat-client root access because the LDM_USERNAME variable may have an empty value if the user's shell lacks support for Bourne shell syntax. This is related to a run-x-session script.
Уязвимость сценария run-x-session пакета LDM операционной системы Debian GNU/Linux, позволяющая нарушителю повысить свои привилегии до уровня суперпользователя
EPSS
7.8 High
CVSS3
7.2 High
CVSS2