Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-15288

Опубликовано: 15 нояб. 2017
Источник: debian

Описание

The compilation daemon in Scala before 2.10.7, 2.11.x before 2.11.12, and 2.12.x before 2.12.4 uses weak permissions for private files in /tmp/scala-devel/${USER:shared}/scalac-compile-server-port, which allows local users to write to arbitrary class files and consequently gain privileges.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
scalafixed2.11.12-1package

Примечания

  • http://scala-lang.org/news/security-update-nov17.html

  • For 2.11.x: https://github.com/scala/scala/pull/6108

  • For 2.12.x: https://github.com/scala/scala/pull/6120

  • For 2.10.x: https://github.com/scala/scala/pull/6128

  • Neutralised by kernel hardening

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 8 лет назад

The compilation daemon in Scala before 2.10.7, 2.11.x before 2.11.12, and 2.12.x before 2.12.4 uses weak permissions for private files in /tmp/scala-devel/${USER:shared}/scalac-compile-server-port, which allows local users to write to arbitrary class files and consequently gain privileges.

CVSS3: 6.7
redhat
около 8 лет назад

The compilation daemon in Scala before 2.10.7, 2.11.x before 2.11.12, and 2.12.x before 2.12.4 uses weak permissions for private files in /tmp/scala-devel/${USER:shared}/scalac-compile-server-port, which allows local users to write to arbitrary class files and consequently gain privileges.

CVSS3: 7.8
nvd
около 8 лет назад

The compilation daemon in Scala before 2.10.7, 2.11.x before 2.11.12, and 2.12.x before 2.12.4 uses weak permissions for private files in /tmp/scala-devel/${USER:shared}/scalac-compile-server-port, which allows local users to write to arbitrary class files and consequently gain privileges.

CVSS3: 7.8
github
больше 7 лет назад

High severity vulnerability that affects org.scala-lang:scala-compiler