Описание
remctld in remctl before 3.14, when an attacker is authorized to execute a command that uses the sudo option, has a use-after-free that leads to a daemon crash, memory corruption, or arbitrary command execution.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | released | 3.13-1+deb9u1~build0.17.10.1 |
| bionic | released | 3.13-1+deb9u1 |
| cosmic | released | 3.13-1+deb9u1 |
| devel | released | 3.13-1+deb9u1 |
| disco | released | 3.13-1+deb9u1 |
| eoan | released | 3.13-1+deb9u1 |
| esm-apps/bionic | released | 3.13-1+deb9u1 |
| esm-apps/focal | released | 3.13-1+deb9u1 |
| esm-apps/jammy | released | 3.13-1+deb9u1 |
| esm-apps/noble | released | 3.13-1+deb9u1 |
Показывать по
Ссылки на источники
6.5 Medium
CVSS2
7.2 High
CVSS3
Связанные уязвимости
remctld in remctl before 3.14, when an attacker is authorized to execute a command that uses the sudo option, has a use-after-free that leads to a daemon crash, memory corruption, or arbitrary command execution.
remctld in remctl before 3.14, when an attacker is authorized to execu ...
remctld in remctl before 3.14, when an attacker is authorized to execute a command that uses the sudo option, has a use-after-free that leads to a daemon crash, memory corruption, or arbitrary command execution.
6.5 Medium
CVSS2
7.2 High
CVSS3