First published: Fri Jun 08 2018(Updated: )
The mdcheck script of the mdadm package for openSUSE 13.2 prior to version 3.3.1-5.14.1 does not properly sanitize device names, which allows local attackers to execute arbitrary commands as root.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE openSUSE | =13.2 | |
Mdadm Project Mdadm | <3.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5220 is a vulnerability in the mdcheck script of the mdadm package for openSUSE 13.2.
CVE-2014-5220 allows local attackers to execute arbitrary commands as root on openSUSE 13.2.
CVE-2014-5220 has a severity rating of 7.8 (high).
To fix CVE-2014-5220, upgrade to version 3.3.1-5.14.1 or later of the mdadm package for openSUSE 13.2.
More information about CVE-2014-5220 can be found at the following references: [link1], [link2].