Updated: 2024-11-24 05:42:11.079528
Description:
Qualys discovered that if unsanitized input was used with the library Modules::ScanDeps, before version 1.36 a local attacker could possibly execute arbitrary shell commands by open()ing a "pesky pipe" (such as passing "commands|" as a filename) or by passing arbitrary strings to eval().
Links | NIST | CIRCL | RHEL | Ubuntu |
Severity | Score | |
---|---|---|
CVSS Version 2.x | NONE | 0 |
CVSS Version 3.x | MEDIUM | 5.3 |
OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
---|---|---|---|---|---|---|---|---|
Ubuntu 16.04 ELS | needrestart | 2.6 | 5.3 | MEDIUM | In Testing | 2024-11-26 16:19:14 | ||
Ubuntu 18.04 ELS | needrestart | 3.1 | 5.3 | MEDIUM | In Testing | 2024-11-26 11:56:17 |