CVE-2015-0234
Published: 29 August 2017
Multiple temporary file creation vulnerabilities in pki-core 10.2.0.
Notes
| Author | Note |
|---|---|
| sbeattie | many are in unit tests; some in tps are obsolete code that may be dropped |
| msalvatore | dogtagpki upstream closed this issue as "Invalid" and classified it as "NOTABUG" |
Priority
Status
| Package | Release | Status |
|---|---|---|
|
dogtag-pki Launchpad, Ubuntu, Debian |
artful |
Ignored
(reached end-of-life)
|
| bionic |
Ignored
(upstream won't fix -- NOTABUG)
|
|
| cosmic |
Ignored
(upstream won't fix -- NOTABUG)
|
|
| precise |
Does not exist
|
|
| trusty |
Does not exist
|
|
| upstream |
Ignored
(upstream won't fix -- NOTABUG)
|
|
| vivid |
Ignored
(reached end-of-life)
|
|
| wily |
Ignored
(reached end-of-life)
|
|
| xenial |
Ignored
(upstream won't fix -- NOTABUG)
|
|
| yakkety |
Ignored
(reached end-of-life)
|
|
| zesty |
Ignored
(reached end-of-life)
|
|
| This vulnerability is mitigated in part by the use of symlink restrictions in Ubuntu. This vulnerability is mitigated in part by the use of hardlink restrictions in Ubuntu. | ||
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 7.5 |
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity impact | High |
| Availability impact | None |
| Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |