Описание
There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.
Ссылки
- Issue TrackingPatch
- Vendor Advisory
- Third Party Advisory
- Issue TrackingPatch
- Vendor Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.21.0 (исключая)
cpe:2.3:a:canonical:apport:*:*:*:*:*:*:*:*
Конфигурация 2
Одно из
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*
EPSS
Процентиль: 86%
0.03143
Низкий
7.8 High
CVSS3
Дефекты
CWE-367
Связанные уязвимости
CVSS3: 7.8
ubuntu
больше 1 года назад
There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.
CVSS3: 7.8
github
больше 1 года назад
There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.
EPSS
Процентиль: 86%
0.03143
Низкий
7.8 High
CVSS3
Дефекты
CWE-367