Описание
Tools/faqwiz/move-faqwiz.sh (aka the generic FAQ wizard moving tool) in Python 2.4.5 might allow local users to overwrite arbitrary files via a symlink attack on a tmp$RANDOM.tmp temporary file. NOTE: there may not be common usage scenarios in which tmp$RANDOM.tmp is located in an untrusted directory.
Релиз | Статус | Примечание |
---|---|---|
dapper | ignored | end of life |
devel | DNE | |
hardy | ignored | |
karmic | not-affected | |
lucid | DNE | |
maverick | DNE | |
natty | DNE | |
oneiric | DNE | |
precise | DNE | |
upstream | released |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | DNE | |
hardy | ignored | |
karmic | not-affected | |
lucid | DNE | |
maverick | DNE | |
natty | DNE | |
oneiric | DNE | |
precise | DNE | |
upstream | released |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | DNE | |
hardy | DNE | |
karmic | not-affected | |
lucid | not-affected | |
maverick | not-affected | |
natty | not-affected | |
oneiric | not-affected | |
precise | DNE | |
upstream | released |
Показывать по
Ссылки на источники
EPSS
7.2 High
CVSS2
Связанные уязвимости
Tools/faqwiz/move-faqwiz.sh (aka the generic FAQ wizard moving tool) in Python 2.4.5 might allow local users to overwrite arbitrary files via a symlink attack on a tmp$RANDOM.tmp temporary file. NOTE: there may not be common usage scenarios in which tmp$RANDOM.tmp is located in an untrusted directory.
Tools/faqwiz/move-faqwiz.sh (aka the generic FAQ wizard moving tool) in Python 2.4.5 might allow local users to overwrite arbitrary files via a symlink attack on a tmp$RANDOM.tmp temporary file. NOTE: there may not be common usage scenarios in which tmp$RANDOM.tmp is located in an untrusted directory.
Tools/faqwiz/move-faqwiz.sh (aka the generic FAQ wizard moving tool) i ...
Tools/faqwiz/move-faqwiz.sh (aka the generic FAQ wizard moving tool) in Python 2.4.5 might allow local users to overwrite arbitrary files via a symlink attack on a tmp$RANDOM.tmp temporary file. NOTE: there may not be common usage scenarios in which tmp$RANDOM.tmp is located in an untrusted directory.
EPSS
7.2 High
CVSS2