UBUNTU-CVE-2023-46277

Source
https://ubuntu.com/security/CVE-2023-46277
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-46277.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2023-46277
Related
Published
2023-10-20T05:15:00Z
Modified
2024-10-15T14:11:49Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

please (aka pleaser) through 0.5.4 allows privilege escalation through the TIOCSTI and/or TIOCLINUX ioctl. (If both TIOCSTI and TIOCLINUX are disabled, this cannot be exploited.)

References

Affected packages

Ubuntu:22.04:LTS / rust-pleaser

Package

Name
rust-pleaser
Purl
pkg:deb/ubuntu/rust-pleaser?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.4.1-2ubuntu1
0.5.1-1
0.5.1-3
0.5.1-4
0.5.1-4ubuntu0.22.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Local privilege escalation"
}

Ubuntu:24.10 / rust-pleaser

Package

Name
rust-pleaser
Purl
pkg:deb/ubuntu/rust-pleaser?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.5.5-1
0.5.5-3
0.5.6-1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Local privilege escalation"
}

Ubuntu:24.04:LTS / rust-pleaser

Package

Name
rust-pleaser
Purl
pkg:deb/ubuntu/rust-pleaser?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.5.3-2
0.5.4-1
0.5.5-1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Local privilege escalation"
}