Описание
The get_rpm_nvr_by_file_path_temporary function in util.py in setroubleshoot before 3.2.22 allows remote attackers to execute arbitrary commands via shell metacharacters in a file name.
Релиз | Статус | Примечание |
---|---|---|
artful | ignored | end of life |
bionic | DNE | |
cosmic | DNE | |
devel | DNE | |
esm-apps/xenial | not-affected | code not present |
esm-infra-legacy/trusty | not-affected | code not present |
lucid | ignored | end of life |
precise | ignored | end of life |
precise/esm | DNE | precise was needs-triage |
trusty | not-affected | code not present |
Показывать по
EPSS
10 Critical
CVSS2
Связанные уязвимости
The get_rpm_nvr_by_file_path_temporary function in util.py in setroubleshoot before 3.2.22 allows remote attackers to execute arbitrary commands via shell metacharacters in a file name.
The get_rpm_nvr_by_file_path_temporary function in util.py in setroubleshoot before 3.2.22 allows remote attackers to execute arbitrary commands via shell metacharacters in a file name.
The get_rpm_nvr_by_file_path_temporary function in util.py in setroubleshoot before 3.2.22 allows remote attackers to execute arbitrary commands via shell metacharacters in a file name.
ELSA-2015-0729: setroubleshoot security update (IMPORTANT)
Уязвимость системы контроля доступа SELinux, позволяющая нарушителю выполнить произвольные команды
EPSS
10 Critical
CVSS2