ALT-BU-2018-3623-1
Branch c8.1 update bulletin.
Package postgresql9.5 updated to version 9.5.14-alt0.M80C.1 for branch c8.1 in task 217011.
Closed vulnerabilities
BDU:2019-01231
Уязвимость функции PQescape() библиотеки libpq системы управления базами данных PostgreSQL, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-01295
Уязвимость системы управления базами данных PostgreSQL, связанная с ошибками авторизации, позволяющая нарушителю повысить свои привилегии
BDU:2019-01829
Уязвимость системы управления базами данных PostgreSQL, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код
BDU:2019-04242
Уязвимость функции pg_catalog.pg_logfile_rotate() модуля adminpack системы управления базами данных PostgreSQL, позволяющая нарушителю оказать воздействие на целостность защищаемой информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-1058
A flaw was found in the way Postgresql allowed a user to modify the behavior of a query for other users. An attacker with a user account could use this flaw to execute code with the permissions of superuser in the database. Versions 9.3 through 10 are affected.
- 103221
- 103221
- RHSA-2018:2511
- RHSA-2018:2511
- RHSA-2018:2566
- RHSA-2018:2566
- RHSA-2018:3816
- RHSA-2018:3816
- https://bugzilla.redhat.com/show_bug.cgi?id=1547044
- https://bugzilla.redhat.com/show_bug.cgi?id=1547044
- USN-3589-1
- USN-3589-1
- https://www.postgresql.org/about/news/1834/
- https://www.postgresql.org/about/news/1834/
Modified: 2024-11-21
CVE-2018-10915
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1227
- 105054
- 105054
- 1041446
- 1041446
- RHSA-2018:2511
- RHSA-2018:2511
- RHSA-2018:2557
- RHSA-2018:2557
- RHSA-2018:2565
- RHSA-2018:2565
- RHSA-2018:2566
- RHSA-2018:2566
- RHSA-2018:2643
- RHSA-2018:2643
- RHSA-2018:2721
- RHSA-2018:2721
- RHSA-2018:2729
- RHSA-2018:2729
- RHSA-2018:3816
- RHSA-2018:3816
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10915
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10915
- [debian-lts-announce] 20180815 [SECURITY] [DLA 1464-1] postgresql-9.4 security update
- [debian-lts-announce] 20180815 [SECURITY] [DLA 1464-1] postgresql-9.4 security update
- GLSA-201810-08
- GLSA-201810-08
- USN-3744-1
- USN-3744-1
- DSA-4269
- DSA-4269
- https://www.postgresql.org/about/news/1878/
- https://www.postgresql.org/about/news/1878/
Modified: 2024-11-21
CVE-2018-10925
It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE". An attacker with "CREATE TABLE" privileges could exploit this to read arbitrary bytes server memory. If the attacker also had certain "INSERT" and limited "UPDATE" privileges to a particular table, they could exploit this to update other columns in the same table.
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1227
- 105052
- 105052
- 1041446
- 1041446
- RHSA-2018:2511
- RHSA-2018:2511
- RHSA-2018:2565
- RHSA-2018:2565
- RHSA-2018:2566
- RHSA-2018:2566
- RHSA-2018:3816
- RHSA-2018:3816
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10925
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10925
- GLSA-201810-08
- GLSA-201810-08
- USN-3744-1
- USN-3744-1
- DSA-4269
- DSA-4269
- https://www.postgresql.org/about/news/1878/
- https://www.postgresql.org/about/news/1878/
Modified: 2024-11-21
CVE-2018-1115
postgresql before versions 10.4, 9.6.9 is vulnerable in the adminpack extension, the pg_catalog.pg_logfile_rotate() function doesn't follow the same ACLs than pg_rorate_logfile. If the adminpack is added to a database, an attacker able to connect to it could exploit this to force log rotation.
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1227
- 104285
- 104285
- RHSA-2018:2565
- RHSA-2018:2565
- RHSA-2018:2566
- RHSA-2018:2566
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115
- https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740
- https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740
- GLSA-201810-08
- GLSA-201810-08
Package postgresql9.6 updated to version 9.6.10-alt0.M80C.1 for branch c8.1 in task 217011.
Closed vulnerabilities
BDU:2019-01231
Уязвимость функции PQescape() библиотеки libpq системы управления базами данных PostgreSQL, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-01295
Уязвимость системы управления базами данных PostgreSQL, связанная с ошибками авторизации, позволяющая нарушителю повысить свои привилегии
BDU:2019-01829
Уязвимость системы управления базами данных PostgreSQL, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код
BDU:2019-04242
Уязвимость функции pg_catalog.pg_logfile_rotate() модуля adminpack системы управления базами данных PostgreSQL, позволяющая нарушителю оказать воздействие на целостность защищаемой информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-1058
A flaw was found in the way Postgresql allowed a user to modify the behavior of a query for other users. An attacker with a user account could use this flaw to execute code with the permissions of superuser in the database. Versions 9.3 through 10 are affected.
- 103221
- 103221
- RHSA-2018:2511
- RHSA-2018:2511
- RHSA-2018:2566
- RHSA-2018:2566
- RHSA-2018:3816
- RHSA-2018:3816
- https://bugzilla.redhat.com/show_bug.cgi?id=1547044
- https://bugzilla.redhat.com/show_bug.cgi?id=1547044
- USN-3589-1
- USN-3589-1
- https://www.postgresql.org/about/news/1834/
- https://www.postgresql.org/about/news/1834/
Modified: 2024-11-21
CVE-2018-10915
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1227
- 105054
- 105054
- 1041446
- 1041446
- RHSA-2018:2511
- RHSA-2018:2511
- RHSA-2018:2557
- RHSA-2018:2557
- RHSA-2018:2565
- RHSA-2018:2565
- RHSA-2018:2566
- RHSA-2018:2566
- RHSA-2018:2643
- RHSA-2018:2643
- RHSA-2018:2721
- RHSA-2018:2721
- RHSA-2018:2729
- RHSA-2018:2729
- RHSA-2018:3816
- RHSA-2018:3816
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10915
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10915
- [debian-lts-announce] 20180815 [SECURITY] [DLA 1464-1] postgresql-9.4 security update
- [debian-lts-announce] 20180815 [SECURITY] [DLA 1464-1] postgresql-9.4 security update
- GLSA-201810-08
- GLSA-201810-08
- USN-3744-1
- USN-3744-1
- DSA-4269
- DSA-4269
- https://www.postgresql.org/about/news/1878/
- https://www.postgresql.org/about/news/1878/
Modified: 2024-11-21
CVE-2018-10925
It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE". An attacker with "CREATE TABLE" privileges could exploit this to read arbitrary bytes server memory. If the attacker also had certain "INSERT" and limited "UPDATE" privileges to a particular table, they could exploit this to update other columns in the same table.
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1227
- 105052
- 105052
- 1041446
- 1041446
- RHSA-2018:2511
- RHSA-2018:2511
- RHSA-2018:2565
- RHSA-2018:2565
- RHSA-2018:2566
- RHSA-2018:2566
- RHSA-2018:3816
- RHSA-2018:3816
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10925
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10925
- GLSA-201810-08
- GLSA-201810-08
- USN-3744-1
- USN-3744-1
- DSA-4269
- DSA-4269
- https://www.postgresql.org/about/news/1878/
- https://www.postgresql.org/about/news/1878/
Modified: 2024-11-21
CVE-2018-1115
postgresql before versions 10.4, 9.6.9 is vulnerable in the adminpack extension, the pg_catalog.pg_logfile_rotate() function doesn't follow the same ACLs than pg_rorate_logfile. If the adminpack is added to a database, an attacker able to connect to it could exploit this to force log rotation.
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1227
- 104285
- 104285
- RHSA-2018:2565
- RHSA-2018:2565
- RHSA-2018:2566
- RHSA-2018:2566
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115
- https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740
- https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740
- GLSA-201810-08
- GLSA-201810-08
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-9296
A null pointer dereference bug affects the 16.02 and many old versions of p7zip. A lack of null pointer check for the variable folders.PackPositions in function CInArchive::ReadAndDecodePackedStreams in CPP/7zip/Archive/7z/7zIn.cpp, as used in the 7z.so library and in 7z applications, will cause a crash and a denial of service when decoding malformed 7z files.
- 94294
- 94294
- https://github.com/yangke/7zip-null-pointer-dereference
- https://github.com/yangke/7zip-null-pointer-dereference
- https://sourceforge.net/p/p7zip/bugs/185/
- https://sourceforge.net/p/p7zip/bugs/185/
- https://sourceforge.net/p/p7zip/discussion/383043/thread/648d34db/
- https://sourceforge.net/p/p7zip/discussion/383043/thread/648d34db/
Modified: 2025-01-10
CVE-2017-17969
Heap-based buffer overflow in the NCompress::NShrink::CDecoder::CodeReal method in 7-Zip before 18.00 and p7zip allows remote attackers to cause a denial of service (out-of-bounds write) or potentially execute arbitrary code via a crafted ZIP archive.
- 1040831
- 1040831
- https://0patch.blogspot.si/2018/02/two-interesting-micropatches-for-7-zip.html
- https://0patch.blogspot.si/2018/02/two-interesting-micropatches-for-7-zip.html
- https://github.com/p7zip-project/p7zip/issues/7
- https://landave.io/2018/01/7-zip-multiple-memory-corruptions-via-rar-and-zip/
- https://landave.io/2018/01/7-zip-multiple-memory-corruptions-via-rar-and-zip/
- [debian-lts-announce] 20180202 [SECURITY] [DLA 1268-1] p7zip security update
- [debian-lts-announce] 20180202 [SECURITY] [DLA 1268-1] p7zip security update
- USN-3913-1
- USN-3913-1
- DSA-4104
- DSA-4104
Modified: 2024-11-21
CVE-2018-10115
Incorrect initialization logic of RAR decoder objects in 7-Zip 18.03 and before can lead to usage of uninitialized memory, allowing remote attackers to cause a denial of service (segmentation fault) or execute arbitrary code via a crafted RAR archive.
- 104132
- 104132
- 1040832
- 1040832
- https://landave.io/2018/05/7-zip-from-uninitialized-memory-to-remote-code-execution/
- https://landave.io/2018/05/7-zip-from-uninitialized-memory-to-remote-code-execution/
- https://sourceforge.net/p/sevenzip/discussion/45797/thread/adc65bfa/
- https://sourceforge.net/p/sevenzip/discussion/45797/thread/adc65bfa/
Modified: 2025-01-10
CVE-2018-5996
Insufficient exception handling in the method NCompress::NRar3::CDecoder::Code of 7-Zip before 18.00 and p7zip can lead to multiple memory corruptions within the PPMd code, allows remote attackers to cause a denial of service (segmentation fault) or execute arbitrary code via a crafted RAR archive.
- 1040831
- 1040831
- https://0patch.blogspot.si/2018/02/two-interesting-micropatches-for-7-zip.html
- https://0patch.blogspot.si/2018/02/two-interesting-micropatches-for-7-zip.html
- https://github.com/p7zip-project/p7zip/issues/32
- https://github.com/p7zip-project/p7zip/issues/8
- https://landave.io/2018/01/7-zip-multiple-memory-corruptions-via-rar-and-zip/
- https://landave.io/2018/01/7-zip-multiple-memory-corruptions-via-rar-and-zip/
Package libsndfile updated to version 1.0.28-alt2 for branch c8.1 in task 216894.
Closed vulnerabilities
BDU:2018-00012
Уязвимость функции aiff_read_chanmap (aaiff.c) библиотеки libsndfile, позволяющая нарушителю нарушить конфиденциальность, целостность и доступность данных
BDU:2018-00013
Уязвимость функции psf_binheader_writef (common.c) библиотеки libsndfile операционной системы Astra Linux, позволяющая нарушителю нарушить конфиденциальность, целостность и доступность данных или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-12562
Heap-based Buffer Overflow in the psf_binheader_writef function in common.c in libsndfile through 1.0.28 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
Modified: 2024-11-21
CVE-2017-6892
In libsndfile version 1.0.28, an error in the "aiff_read_chanmap()" function (aiff.c) can be exploited to cause an out-of-bounds read memory access via a specially crafted AIFF file.
- https://github.com/erikd/libsndfile/commit/f833c53cb596e9e1792949f762e0b33661822748
- https://github.com/erikd/libsndfile/commit/f833c53cb596e9e1792949f762e0b33661822748
- [debian-lts-announce] 20201029 [SECURITY] [DLA 2418-1] libsndfile security update
- [debian-lts-announce] 20201029 [SECURITY] [DLA 2418-1] libsndfile security update
- https://secuniaresearch.flexerasoftware.com/advisories/76717/
- https://secuniaresearch.flexerasoftware.com/advisories/76717/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-13/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-13/
- GLSA-201811-23
- GLSA-201811-23
- USN-4013-1
- USN-4013-1
Closed bugs
Зависит от xterm
Package kernel-image-srv-restricted updated to version 4.9.142-alt0.M80C.1 for branch c8.1 in task 217194.
Closed vulnerabilities
BDU:2015-07788
Уязвимость операционной системы Red Hat Linux, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07831
Уязвимость операционной системы Red Hat Linux, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-02817
Уязвимость программы для установки SSL сертификатов в стандартизированной инструментарии Linux Sblim-sfcb, связанная с неверным определением ссылки перед доступом к файлу, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-02841
Уязвимость агента обновления Novell ZENworks Patch Management клиента обновления PatchLink, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-02848
Уязвимость функции sysstat.in утилиты для измерения и анализа производительности системы sysstat, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-02951
Уязвимость функции GetInstalledPackages менеджера установки Application Lifestyle Management, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных
BDU:2020-02957
Уязвимость модуля modules/serverdensity_device.py системы управления конфигураций и удаленного выполнения операций SaltStack, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных
BDU:2020-02959
Уязвимость компонента consoleinst.sh менеджера установки Installation Manager IBM, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2000-1134
Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.
- FreeBSD-SA-00:76
- FreeBSD-SA-00:76
- 20011103-02-P
- 20011103-02-P
- 20001028 tcsh: unsafe tempfile in << redirects
- 20001028 tcsh: unsafe tempfile in << redirects
- SSRT1-41U
- SSRT1-41U
- CLA-2000:350
- CLA-2000:350
- CLSA-2000:354
- CLSA-2000:354
- 20001130 [ADV/EXP]: RH6.x root from bash /tmp vuln + MORE
- 20001130 [ADV/EXP]: RH6.x root from bash /tmp vuln + MORE
- CSSA-2000-042.0
- CSSA-2000-042.0
- CSSA-2000-043.0
- CSSA-2000-043.0
- 20001111a
- 20001111a
- VU#10277
- VU#10277
- MDKSA-2000-069
- MDKSA-2000-069
- MDKSA-2000:075
- MDKSA-2000:075
- RHSA-2000:117
- RHSA-2000:117
- RHSA-2000:121
- RHSA-2000:121
- 20001128 /bin/sh creates insecure tmp files
- 20001128 /bin/sh creates insecure tmp files
- 1926
- 1926
- 2006
- 2006
- oval:org.mitre.oval:def:4047
- oval:org.mitre.oval:def:4047
Modified: 2024-11-21
CVE-2007-3852
The init script (sysstat.in) in sysstat 5.1.2 up to 7.1.6 creates /tmp/sysstat.run insecurely, which allows local users to execute arbitrary code.
Modified: 2024-11-21
CVE-2008-0525
PatchLink Update client for Unix, as used by Novell ZENworks Patch Management Update Agent for Linux/Unix/Mac (LUM) 6.2094 through 6.4102 and other products, allows local users to (1) truncate arbitrary files via a symlink attack on the /tmp/patchlink.tmp file used by the logtrimmer script, and (2) execute arbitrary code via a symlink attack on the /tmp/plshutdown file used by the rebootTask script.
- 28657
- 28657
- 28665
- 28665
- 3599
- 3599
- http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=527
- http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=527
- http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=528
- http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=528
- http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=530
- http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=530
- 20080125 Two vulnerabilities for PatchLink Update Client for Unix.
- 20080125 Two vulnerabilities for PatchLink Update Client for Unix.
- 27458
- 27458
- 1019272
- 1019272
- ADV-2008-0426
- ADV-2008-0426
- patchlinkupdate-logtrimmer-symlink(39956)
- patchlinkupdate-logtrimmer-symlink(39956)
- patchlinkupdate-reboottask-symlink(39958)
- patchlinkupdate-reboottask-symlink(39958)
- https://secure-support.novell.com/KanisaPlatform/Publishing/18/3908994_f.SAL_Public.html
- https://secure-support.novell.com/KanisaPlatform/Publishing/18/3908994_f.SAL_Public.html
Modified: 2024-11-21
CVE-2009-0416
The SSL certificate setup program (genSslCert.sh) in Standards Based Linux Instrumentation for Manageability (SBLIM) sblim-sfcb 1.3.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /var/tmp/key.pem, (2) /var/tmp/cert.pem, and (3) /var/tmp/ssl.cnf temporary files.
- SUSE-SR:2009:004
- SUSE-SR:2009:004
- 51783
- 51783
- 33795
- 33795
- [oss-security] 20090203 CVE Request: sblim-sfcb genSslCert.sh temp race
- [oss-security] 20090203 CVE Request: sblim-sfcb genSslCert.sh temp race
- http://sourceforge.net/tracker/index.php?func=detail&aid=2561165&group_id=128809&atid=712784
- http://sourceforge.net/tracker/index.php?func=detail&aid=2561165&group_id=128809&atid=712784
- 33583
- 33583
Modified: 2024-11-21
CVE-2011-4834
The GetInstalledPackages function in the configuration tool in HP Application Lifestyle Management (ALM) 11 on AIX, HP-UX, and Solaris allows local users to gain privileges via (1) a Trojan horse /tmp/tmp.txt FIFO or (2) a symlink attack on /tmp/tmp.txt.
- http://0a29.blogspot.com/2011/12/0a29-11-2-privilege-escalation.html
- 47040
- 20111208 0A29-11-2 : Privilege escalation vulnerability in HP Application Lifestyle Management (ALM) Platform v11
- hp-alm-symlink(71698)
- http://0a29.blogspot.com/2011/12/0a29-11-2-privilege-escalation.html
- hp-alm-symlink(71698)
- 20111208 0A29-11-2 : Privilege escalation vulnerability in HP Application Lifestyle Management (ALM) Platform v11
- 47040
Modified: 2024-11-21
CVE-2015-1838
modules/serverdensity_device.py in SaltStack before 2014.7.4 does not properly handle files in /tmp.
- FEDORA-2016-105b3b8804
- FEDORA-2016-105b3b8804
- https://bugzilla.redhat.com/show_bug.cgi?id=1212784
- https://bugzilla.redhat.com/show_bug.cgi?id=1212784
- https://docs.saltstack.com/en/latest/topics/releases/2014.7.4.html
- https://docs.saltstack.com/en/latest/topics/releases/2014.7.4.html
- https://github.com/saltstack/salt/commit/e11298d7155e9982749483ca5538e46090caef9c
- https://github.com/saltstack/salt/commit/e11298d7155e9982749483ca5538e46090caef9c
Modified: 2024-11-21
CVE-2015-7442
consoleinst.sh in IBM Installation Manager before 1.7.4.4 and 1.8.x before 1.8.4 and Packaging Utility before 1.7.4.4 and 1.8.x before 1.8.4 allows local users to gain privileges via a Trojan horse program that is located in /tmp with a name based on a predicted PID value.
Modified: 2024-11-21
CVE-2016-7489
Teradata Virtual Machine Community Edition v15.10's perl script /opt/teradata/gsctools/bin/t2a.pl creates files in /tmp in an insecure manner, this may lead to elevated code execution.