Описание
It was found that rhnsd PID files are created as world-writable that allows local attackers to fill the disks or to kill selected processes.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | DNE | |
| cosmic | DNE | |
| devel | DNE | |
| esm-apps/xenial | not-affected | code not present |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [code not present]] |
| precise/esm | DNE | |
| trusty | not-affected | code not present |
| trusty/esm | DNE | trusty was not-affected [code not present] |
| upstream | needs-triage |
Показывать по
EPSS
4.9 Medium
CVSS2
5.5 Medium
CVSS3
Связанные уязвимости
It was found that rhnsd PID files are created as world-writable that allows local attackers to fill the disks or to kill selected processes.
It was found that rhnsd PID files are created as world-writable that allows local attackers to fill the disks or to kill selected processes.
It was found that rhnsd PID files are created as world-writable that a ...
It was found that rhnsd PID files are created as world-writable that allows local attackers to fill the disks or to kill selected processes.
EPSS
4.9 Medium
CVSS2
5.5 Medium
CVSS3