Описание
libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.
libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2019-12779
- https://github.com/ClusterLabs/libqb/issues/338
- https://access.redhat.com/errata/RHSA-2019:3610
- https://bugzilla.redhat.com/show_bug.cgi?id=1695948
- https://github.com/ClusterLabs/libqb/releases/tag/v1.0.4
- https://github.com/ClusterLabs/libqb/releases/tag/v1.0.5
- https://security.gentoo.org/glsa/202107-03
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00031.html
- http://www.securityfocus.com/bid/108691
Связанные уязвимости
libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.
libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.
libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.
libqb before 1.0.5 allows local users to overwrite arbitrary files via ...