Stack-based buffer overflow in the audit_log_user_command function in lib/audit_logging.c in Linux Audit before 1.7 might allow remote attackers to execute arbitrary code via a long command argument. NOTE: some of these details are obtained from third party information.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | audit | < 1.5.3-2.1 | audit_1.5.3-2.1_all.deb |
Debian | 11 | all | audit | < 1.5.3-2.1 | audit_1.5.3-2.1_all.deb |
Debian | 10 | all | audit | < 1.5.3-2.1 | audit_1.5.3-2.1_all.deb |
Debian | 999 | all | audit | < 1.5.3-2.1 | audit_1.5.3-2.1_all.deb |
Debian | 13 | all | audit | < 1.5.3-2.1 | audit_1.5.3-2.1_all.deb |