Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q89m-78v7-wxvj

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.

EPSS

Процентиль: 19%
0.00061
Низкий

Дефекты

CWE-59

Связанные уязвимости

CVSS3: 7.3
ubuntu
больше 4 лет назад

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.

CVSS3: 7.3
nvd
больше 4 лет назад

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.

EPSS

Процентиль: 19%
0.00061
Низкий

Дефекты

CWE-59