Описание
The mdcheck script of the mdadm package for openSUSE 13.2 prior to version 3.3.1-5.14.1 does not properly sanitize device names, which allows local attackers to execute arbitrary commands as root.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | not-affected | 4.0-2 |
| bionic | not-affected | |
| devel | not-affected | |
| esm-infra-legacy/trusty | not-affected | code not present |
| esm-infra/bionic | not-affected | |
| esm-infra/xenial | not-affected | code not present |
| precise/esm | not-affected | code not present |
| trusty | not-affected | code not present |
| trusty/esm | not-affected | code not present |
| upstream | released | 3.3.4-1 |
Показывать по
7.2 High
CVSS2
7.8 High
CVSS3
Связанные уязвимости
The mdcheck script of the mdadm package for openSUSE 13.2 prior to version 3.3.1-5.14.1 does not properly sanitize device names, which allows local attackers to execute arbitrary commands as root.
The mdcheck script of the mdadm package for openSUSE 13.2 prior to version 3.3.1-5.14.1 does not properly sanitize device names, which allows local attackers to execute arbitrary commands as root.
The mdcheck script of the mdadm package for openSUSE 13.2 prior to ver ...
The mdcheck script of the mdadm package for openSUSE 13.2 prior to version 3.3.1-5.14.1 does not properly sanitize device names, which allows local attackers to execute arbitrary commands as root.
7.2 High
CVSS2
7.8 High
CVSS3