Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6hq6-w9x9-j77g

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call.

It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call.

EPSS

Процентиль: 26%
0.00093
Низкий

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 3.8
ubuntu
больше 4 лет назад

It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call.

CVSS3: 3.8
nvd
больше 4 лет назад

It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call.

EPSS

Процентиль: 26%
0.00093
Низкий

Дефекты

CWE-78