libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.
References
Link | Resource |
---|---|
https://github.com/ClusterLabs/libqb/releases/tag/v1.0.5 | Release Notes Third Party Advisory |
https://github.com/ClusterLabs/libqb/releases/tag/v1.0.4 | Release Notes Third Party Advisory |
https://github.com/ClusterLabs/libqb/issues/338 | Issue Tracking Exploit Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1695948 | Exploit Patch Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/108691 | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00017.html | |
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00027.html | |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00031.html | |
https://access.redhat.com/errata/RHSA-2019:3610 | |
https://security.gentoo.org/glsa/202107-03 |
Configurations
Information
Published : 2019-06-07 13:29
Updated : 2021-07-02 22:15
NVD link : CVE-2019-12779
Mitre link : CVE-2019-12779
JSON object : View
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
Products Affected
clusterlabs
- libqb