Описание
The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance.
Релиз | Статус | Примечание |
---|---|---|
artful | ignored | end of life |
bionic | ignored | end of standard support, was needed |
cosmic | ignored | end of life |
devel | needed | |
disco | ignored | end of life |
eoan | ignored | end of life |
esm-apps/bionic | needed | |
esm-apps/focal | needed | |
esm-apps/jammy | needed | |
esm-apps/noble | needed |
Показывать по
EPSS
6.8 Medium
CVSS2
Связанные уязвимости
The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance.
The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance.
The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when ...
The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance.
ELSA-2013-1536: libguestfs security, bug fix, and enhancement update (MODERATE)
EPSS
6.8 Medium
CVSS2