Описание
Описание отсутствует
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 3.5.2-0ubuntu27.1 |
devel | released | 3.5.7-1ubuntu23 |
edgy | released | 3.5.5-0ubuntu3.5 |
feisty | released | 3.5.6-0ubuntu20.2 |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 7.0.0-0ubuntu45 |
devel | released | 7.0.0-0ubuntu45 |
edgy | released | 7.0.0-0ubuntu45 |
feisty | released | 7.0.0-0ubuntu45 |
upstream | needs-triage |
Показывать по
Ссылки на источники
10 Critical
CVSS2
Связанные уязвимости
KDM in KDE 3.1.3 and earlier does not verify whether the pam_setcred function call succeeds, which may allow attackers to gain root privileges by triggering error conditions within PAM modules, as demonstrated in certain configurations of the MIT pam_krb5 module.
KDM in KDE 3.1.3 and earlier does not verify whether the pam_setcred function call succeeds, which may allow attackers to gain root privileges by triggering error conditions within PAM modules, as demonstrated in certain configurations of the MIT pam_krb5 module.
KDM in KDE 3.1.3 and earlier does not verify whether the pam_setcred f ...
KDM in KDE 3.1.3 and earlier does not verify whether the pam_setcred function call succeeds, which may allow attackers to gain root privileges by triggering error conditions within PAM modules, as demonstrated in certain configurations of the MIT pam_krb5 module.
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
10 Critical
CVSS2