PYSEC-2014-84
Vulnerability from pysec - Published: 2014-03-11 19:37 - Updated: 2021-08-27 03:22
VLAI?
Details
The Execute class in shellutils in logilab-commons before 0.61.0 uses tempfile.mktemp, which allows local users to have an unspecified impact by pre-creating the temporary file.
Impacted products
| Name | purl | logilab-common | pkg:pypi/logilab-common |
|---|
Aliases
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "logilab-common",
"purl": "pkg:pypi/logilab-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.60.1"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"0.28.1",
"0.38.0",
"0.38.1",
"0.39.0",
"0.43.0",
"0.44.0",
"0.46.0",
"0.46.1",
"0.47.0",
"0.48.1",
"0.49.0",
"0.50.0",
"0.50.1",
"0.50.2",
"0.50.3",
"0.51.0",
"0.51.1",
"0.52.0",
"0.52.1",
"0.53.0",
"0.54.0",
"0.55.0",
"0.55.2",
"0.56.0",
"0.56.1",
"0.56.2",
"0.57.0",
"0.57.1",
"0.58.1",
"0.58.3",
"0.59.0",
"0.59.1",
"0.60.0"
]
}
],
"aliases": [
"CVE-2014-1839",
"GHSA-g5m2-22h2-rr3j"
],
"details": "The Execute class in shellutils in logilab-commons before 0.61.0 uses tempfile.mktemp, which allows local users to have an unspecified impact by pre-creating the temporary file.",
"id": "PYSEC-2014-84",
"modified": "2021-08-27T03:22:06.108554Z",
"published": "2014-03-11T19:37:00Z",
"references": [
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00085.html"
},
{
"type": "WEB",
"url": "http://www.logilab.org/ticket/207562"
},
{
"type": "ADVISORY",
"url": "http://secunia.com/advisories/57209"
},
{
"type": "WEB",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737051"
},
{
"type": "WEB",
"url": "http://comments.gmane.org/gmane.comp.security.oss.general/11986"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-g5m2-22h2-rr3j"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…