Описание
There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.
Релиз | Статус | Примечание |
---|---|---|
artful | not-affected | |
bionic | not-affected | |
cosmic | not-affected | |
devel | not-affected | |
disco | not-affected | |
eoan | not-affected | |
esm-infra-legacy/trusty | not-affected | 1:4.1.5.1-1ubuntu9 |
esm-infra/bionic | not-affected | |
esm-infra/focal | not-affected | |
esm-infra/xenial | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
artful | not-affected | |
bionic | not-affected | |
cosmic | not-affected | |
devel | not-affected | |
disco | not-affected | |
eoan | not-affected | |
esm-infra-legacy/trusty | not-affected | |
esm-infra/bionic | not-affected | |
esm-infra/focal | not-affected | |
esm-infra/xenial | not-affected |
Показывать по
Ссылки на источники
EPSS
7.2 High
CVSS2
7.8 High
CVSS3
Связанные уязвимости
There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.
There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.
There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo ...
There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.
EPSS
7.2 High
CVSS2
7.8 High
CVSS3