The server daemons in Kannel 1.5.0 and earlier create a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a kill cat /pathname
command, as demonstrated by bearerbox.
The product does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Kannel | Kannel | * | 1.5.0 (including) |
Kannel | Ubuntu | artful | * |
Kannel | Ubuntu | bionic | * |
Kannel | Ubuntu | cosmic | * |
Kannel | Ubuntu | devel | * |
Kannel | Ubuntu | disco | * |
Kannel | Ubuntu | eoan | * |
Kannel | Ubuntu | esm-apps/bionic | * |
Kannel | Ubuntu | esm-apps/focal | * |
Kannel | Ubuntu | esm-apps/jammy | * |
Kannel | Ubuntu | esm-apps/noble | * |
Kannel | Ubuntu | esm-apps/xenial | * |
Kannel | Ubuntu | focal | * |
Kannel | Ubuntu | groovy | * |
Kannel | Ubuntu | hirsute | * |
Kannel | Ubuntu | impish | * |
Kannel | Ubuntu | jammy | * |
Kannel | Ubuntu | kinetic | * |
Kannel | Ubuntu | lunar | * |
Kannel | Ubuntu | mantic | * |
Kannel | Ubuntu | noble | * |
Kannel | Ubuntu | oracular | * |
Kannel | Ubuntu | trusty | * |
Kannel | Ubuntu | upstream | * |
Kannel | Ubuntu | xenial | * |
Kannel | Ubuntu | zesty | * |