Описание
The lockwrap function in port-proxy/bin/openshift-port-proxy-cfg in Red Hat OpenShift Origin before 1.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp.
The lockwrap function in port-proxy/bin/openshift-port-proxy-cfg in Red Hat OpenShift Origin before 1.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2013-0164
- https://github.com/openshift/origin-server/pull/1136
- https://github.com/openshift/origin-server/commit/524465f70a32d0eb6bf047e6a05c76c22d52bfa2
- https://access.redhat.com/errata/RHSA-2013:0220
- https://access.redhat.com/security/cve/CVE-2013-0164
- https://bugzilla.redhat.com/show_bug.cgi?id=893307
- http://rhn.redhat.com/errata/RHSA-2013-0220.html
EPSS
CVE ID
Связанные уязвимости
The lockwrap function in port-proxy/bin/openshift-port-proxy-cfg in Red Hat OpenShift Origin before 1.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp.
The lockwrap function in port-proxy/bin/openshift-port-proxy-cfg in Red Hat OpenShift Origin before 1.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp.
EPSS