Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-5759

Опубликовано: 22 июл. 2016
Источник: redhat
CVSS3: 7.3

Описание

The mkdumprd script called "dracut" in the current working directory "." allows local users to trick the administrator into executing code as root.

Отчет

This issue did not affect the versions of kexec-tools as shipped with Red Hat Enterprise Linux 5, 6, and 7.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kexec-toolsNot affected
Red Hat Enterprise Linux 6kexec-toolsNot affected
Red Hat Enterprise Linux 7kexec-toolsNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1510921kexec-tools: mkdumprd script called "dracut" in the current working directory

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
больше 8 лет назад

The mkdumprd script called "dracut" in the current working directory "." allows local users to trick the administrator into executing code as root.

suse-cvrf
больше 9 лет назад

Security update for kdump

suse-cvrf
больше 9 лет назад

Security update for kdump

CVSS3: 7.8
github
больше 3 лет назад

The mkdumprd script called "dracut" in the current working directory "." allows local users to trick the administrator into executing code as root.

7.3 High

CVSS3