Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. sosreport
  4. ›
  5. CVE-2015-7529

CVE-2015-7529: SoSReport Predictable Tmp File Names

May 13, 2022 (updated October 27, 2024)

sosreport in SoS 3.x allows local users to obtain sensitive information from sosreport files or gain privileges via a symlink attack on an archive file in a temporary directory, as demonstrated by sosreport-$hostname-$date.tar in /tmp/sosreport-$hostname-$date.

References

  • access.redhat.com/errata/RHSA-2016:0152
  • access.redhat.com/errata/RHSA-2016:0188
  • access.redhat.com/security/cve/CVE-2015-7529
  • bugzilla.redhat.com/show_bug.cgi?id=1282542
  • github.com/advisories/GHSA-3g56-2hh3-35ph
  • github.com/pypa/advisory-database/tree/main/vulns/sosreport/PYSEC-2017-73.yaml
  • github.com/sosreport/sos
  • github.com/sosreport/sos/issues/696
  • nvd.nist.gov/vuln/detail/CVE-2015-7529
  • web.archive.org/web/20160416033632/http://www.securityfocus.com/bid/83162

Code Behaviors & Features

Detect and mitigate CVE-2015-7529 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 3.0 before 3.3

Fixed versions

  • 3.3

Solution

Upgrade to version 3.3 or above.

Impact 7.8 HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-59: Improper Link Resolution Before File Access ('Link Following')

Source file

pypi/sosreport/CVE-2015-7529.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:09 +0000.