Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
apport read_file() function could follow maliciously constructed symbolic links
Vulnerability Description
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-lts package apport hooks, it could expose private data to other local users.
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L
Vulnerability Type
在文件访问前对链接解析不恰当(链接跟随)
Vulnerability Title
Ubuntu Apport 后置链接漏洞
Vulnerability Description
Canonical Ubuntu是英国科能(Canonical)公司的一套以桌面应用为主的GNU/Linux操作系统。 Ubuntu Apport 中存在安全漏洞,该漏洞源于错误地处理了某些信息收集操作,攻击者可利用该漏洞可以使用这些问题作为管理员读写任意文件。以下产品及版本受到影响:Ubuntu 14.04 ESM、Ubuntu 16.04 ESM。
CVSS Information
N/A
Vulnerability Type
N/A