UBUNTU-CVE-2020-21583

Source
https://ubuntu.com/security/CVE-2020-21583
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-21583.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2020-21583
Upstream
Published
2023-08-22T19:16:00Z
Modified
2025-07-16T07:41:10.426074Z
Severity
  • 6.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

An issue was discovered in hwclock.13-v2.27 allows attackers to gain escalated privlidges or execute arbitrary commands via the path parameter when setting the date.

References

Affected packages

Ubuntu:Pro:14.04:LTS / util-linux

Package

Name
util-linux
Purl
pkg:deb/ubuntu/util-linux@2.20.1-5.1ubuntu20.9?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.20.1-5.1ubuntu9
2.20.1-5.1ubuntu10
2.20.1-5.1ubuntu11
2.20.1-5.1ubuntu12
2.20.1-5.1ubuntu13
2.20.1-5.1ubuntu14
2.20.1-5.1ubuntu15
2.20.1-5.1ubuntu16
2.20.1-5.1ubuntu17
2.20.1-5.1ubuntu18
2.20.1-5.1ubuntu19
2.20.1-5.1ubuntu20
2.20.1-5.1ubuntu20.1
2.20.1-5.1ubuntu20.2
2.20.1-5.1ubuntu20.3
2.20.1-5.1ubuntu20.4
2.20.1-5.1ubuntu20.6
2.20.1-5.1ubuntu20.7
2.20.1-5.1ubuntu20.9

Ecosystem specific

{
    "priority_reason": "Non-default and improbable configuration"
}