Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-19044

Опубликовано: 08 нояб. 2018
Источник: debian
EPSS Низкий

Описание

keepalived 2.0.8 didn't check for pathnames with symlinks when writing data to a temporary file upon a call to PrintData or PrintStats. This allowed local users to overwrite arbitrary files if fs.protected_symlinks is set to 0, as demonstrated by a symlink from /tmp/keepalived.data or /tmp/keepalived.stats to /etc/passwd.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
keepalivedfixed1:2.0.10-1package

Примечания

  • https://bugzilla.suse.com/show_bug.cgi?id=1015141

  • https://github.com/acassen/keepalived/commit/04f2d32871bb3b11d7dc024039952f2fe2750306

  • https://github.com/acassen/keepalived/issues/1048

EPSS

Процентиль: 26%
0.00088
Низкий

Связанные уязвимости

CVSS3: 4.7
ubuntu
почти 7 лет назад

keepalived 2.0.8 didn't check for pathnames with symlinks when writing data to a temporary file upon a call to PrintData or PrintStats. This allowed local users to overwrite arbitrary files if fs.protected_symlinks is set to 0, as demonstrated by a symlink from /tmp/keepalived.data or /tmp/keepalived.stats to /etc/passwd.

CVSS3: 7
redhat
почти 7 лет назад

keepalived 2.0.8 didn't check for pathnames with symlinks when writing data to a temporary file upon a call to PrintData or PrintStats. This allowed local users to overwrite arbitrary files if fs.protected_symlinks is set to 0, as demonstrated by a symlink from /tmp/keepalived.data or /tmp/keepalived.stats to /etc/passwd.

CVSS3: 4.7
nvd
почти 7 лет назад

keepalived 2.0.8 didn't check for pathnames with symlinks when writing data to a temporary file upon a call to PrintData or PrintStats. This allowed local users to overwrite arbitrary files if fs.protected_symlinks is set to 0, as demonstrated by a symlink from /tmp/keepalived.data or /tmp/keepalived.stats to /etc/passwd.

CVSS3: 4.7
github
больше 3 лет назад

keepalived 2.0.8 didn't check for pathnames with symlinks when writing data to a temporary file upon a call to PrintData or PrintStats. This allowed local users to overwrite arbitrary files if fs.protected_symlinks is set to 0, as demonstrated by a symlink from /tmp/keepalived.data or /tmp/keepalived.stats to /etc/passwd.

oracle-oval
около 6 лет назад

ELSA-2019-2285: keepalived security and bug fix update (MODERATE)

EPSS

Процентиль: 26%
0.00088
Низкий