Описание
LTSP LDM through 2.18.06 allows fat-client root access because the LDM_USERNAME variable may have an empty value if the user's shell lacks support for Bourne shell syntax. This is related to a run-x-session script.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needs-triage |
| devel | DNE | |
| disco | ignored | end of life |
| eoan | ignored | end of life |
| esm-apps/bionic | needs-triage | |
| esm-apps/focal | released | 2:2.18.06-1+deb10u1build0.20.04.1 |
| esm-apps/xenial | needs-triage | |
| esm-infra-legacy/trusty | DNE | |
| focal | released | 2:2.18.06-1+deb10u1build0.20.04.1 |
| groovy | ignored | end of life |
Показывать по
7.2 High
CVSS2
7.8 High
CVSS3
Связанные уязвимости
LTSP LDM through 2.18.06 allows fat-client root access because the LDM_USERNAME variable may have an empty value if the user's shell lacks support for Bourne shell syntax. This is related to a run-x-session script.
LTSP LDM through 2.18.06 allows fat-client root access because the LDM ...
LTSP LDM through 2.18.06 allows fat-client root access because the LDM_USERNAME variable may have an empty value if the user's shell lacks support for Bourne shell syntax. This is related to a run-x-session script.
Уязвимость сценария run-x-session пакета LDM операционной системы Debian GNU/Linux, позволяющая нарушителю повысить свои привилегии до уровня суперпользователя
7.2 High
CVSS2
7.8 High
CVSS3