|Description||Race condition in bzip2 1.0.2 and earlier allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by bzip2 after the decompression is complete.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)|
|NVD severity||low (attack range: local)|
Vulnerable and fixed packages
The table below lists information on source packages.
|buster, sid, stretch||1.0.6-8.1||fixed|
The information below is based on the following data on fixed versions.
|Package||Type||Release||Fixed Version||Urgency||Origin||Debian Bugs|
This "vulnerability" is only exploitable under rarest circumstances: A (local)
attacker would have to exploit the minimal time span between uncompressing
the file and chmodding it to delete the file and place a hardlink to another
file of the "attacked" user. Additionally the attacker needs write permissions
to the directory where the file is being uncompressed, ruling out /~ etc.