Описание
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.
Ссылки
- Issue TrackingVendor Advisory
- Issue TrackingVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:21.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*
EPSS
Процентиль: 19%
0.00061
Низкий
7.3 High
CVSS3
5.5 Medium
CVSS3
2.1 Low
CVSS2
Дефекты
CWE-59
CWE-59
Связанные уязвимости
CVSS3: 7.3
ubuntu
больше 4 лет назад
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.
github
больше 3 лет назад
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.
EPSS
Процентиль: 19%
0.00061
Низкий
7.3 High
CVSS3
5.5 Medium
CVSS3
2.1 Low
CVSS2
Дефекты
CWE-59
CWE-59