Описание
fish (aka fish-shell) 1.16.0 before 2.1.1 does not properly check the credentials, which allows local users to gain privileges via the universal variable socket, related to /tmp/fishd.socket.user permissions.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | not-affected | 2.1.1-1 |
| cosmic | not-affected | 2.1.1-1 |
| devel | not-affected | 2.1.1-1 |
| disco | not-affected | 2.1.1-1 |
| esm-apps/bionic | not-affected | 2.1.1-1 |
| esm-apps/xenial | not-affected | 2.1.1-1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needed] |
| lucid | ignored | end of life |
| precise | ignored | end of life |
Показывать по
6.9 Medium
CVSS2
Связанные уязвимости
fish (aka fish-shell) 1.16.0 before 2.1.1 does not properly check the credentials, which allows local users to gain privileges via the universal variable socket, related to /tmp/fishd.socket.user permissions.
fish (aka fish-shell) 1.16.0 before 2.1.1 does not properly check the ...
fish (aka fish-shell) 1.16.0 before 2.1.1 does not properly check the credentials, which allows local users to gain privileges via the universal variable socket, related to /tmp/fishd.socket.user permissions.
Уязвимость операционной системы Gentoo Linux, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
6.9 Medium
CVSS2