Описание
In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 1.22.0-0ubuntu2 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected] |
| esm-infra/xenial | released | 1.18.3-0ubuntu1.1 |
| precise | not-affected | |
| trusty | not-affected | |
| trusty/esm | DNE | trusty was not-affected |
| upstream | needed | |
| vivid/stable-phone-overlay | not-affected | |
| vivid/ubuntu-core | DNE | |
| xenial | released | 1.18.3-0ubuntu1.1 |
Показывать по
6.9 Medium
CVSS2
7.3 High
CVSS3
Связанные уязвимости
In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out.
In LightDM through 1.22.0, a directory traversal issue in debian/guest ...
In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out.
6.9 Medium
CVSS2
7.3 High
CVSS3