Описание
Описание отсутствует
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | released | 2.4.27-12 |
| devel | DNE | |
| edgy | released | 2.4.27-12 |
| feisty | DNE | |
| upstream | needs-triage |
Показывать по
Ссылки на источники
2.1 Low
CVSS2
Связанные уязвимости
The /proc filesystem in Linux allows local users to obtain sensitive information by opening various entries in /proc/self before executing a setuid program, which causes the program to fail to change the ownership and permissions of those entries.
The /proc filesystem in Linux allows local users to obtain sensitive information by opening various entries in /proc/self before executing a setuid program, which causes the program to fail to change the ownership and permissions of those entries.
The /proc filesystem in Linux allows local users to obtain sensitive i ...
The /proc filesystem in Linux allows local users to obtain sensitive information by opening various entries in /proc/self before executing a setuid program, which causes the program to fail to change the ownership and permissions of those entries.
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
2.1 Low
CVSS2