Описание
The mkdumprd script called "dracut" in the current working directory "." allows local users to trick the administrator into executing code as root.
Отчет
This issue did not affect the versions of kexec-tools as shipped with Red Hat Enterprise Linux 5, 6, and 7.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | kexec-tools | Not affected | ||
| Red Hat Enterprise Linux 6 | kexec-tools | Not affected | ||
| Red Hat Enterprise Linux 7 | kexec-tools | Not affected |
Показывать по
10
Дополнительная информация
Статус:
Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1510921kexec-tools: mkdumprd script called "dracut" in the current working directory
7.3 High
CVSS3
Связанные уязвимости
CVSS3: 7.8
nvd
больше 8 лет назад
The mkdumprd script called "dracut" in the current working directory "." allows local users to trick the administrator into executing code as root.
CVSS3: 7.8
github
больше 3 лет назад
The mkdumprd script called "dracut" in the current working directory "." allows local users to trick the administrator into executing code as root.
7.3 High
CVSS3