people.canonical.com
Open in
urlscan Pro
91.189.89.62
Public Scan
URL:
https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-8325
Submission: On March 17 via api from IL — Scanned from GB
Submission: On March 17 via api from IL — Scanned from GB
Form analysis
0 forms found in the DOMText Content
Ubuntu CVE Tracker * Home * Main * Universe * Partner CVE-2015-8325 Priority Low Description The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable. References https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325 https://ubuntu.com/security/notices/USN-2966-1 Assigned-to mdeslaur Notes tyhicksUbuntu is not affected in the default configuration since UseLogin is disabled in sshd_config Package Source: openssh (LP Ubuntu Debian) Upstream:released (1:7.2p2-3) Ubuntu 16.04 ESM (Xenial Xerus):not-affected (1:7.2p2-3) Ubuntu 14.04 ESM (Trusty Tahr):released (1:6.6p1-2ubuntu2.7) Ubuntu 20.04 FIPS Compliant (Focal Fossa):not-affected (1:7.2p2-3) Patches: Upstream:https://anongit.mindrot.org/openssh.git/commit/?id=85bdcd7c92fe7ff133bbc4e10a65c91810f88755 More Information * Mitre * NVD * Launchpad * Debian Updated: 2022-02-11 01:03:55 UTC (commit acb3d89ab51f1d5e5543fa993969c0eb13c71f04) © Canonical Ltd. 2007-2022