CVE-2019-12779

NameCVE-2019-12779
Descriptionlibqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs927159

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libqb (PTS)stretch1.0.1-1vulnerable
buster1.0.5-1fixed
bullseye, sid2.0.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libqbsourcejessie(unfixed)end-of-life
libqbsource(unstable)1.0.4-1unimportant927159

Notes

[jessie] - libqb <end-of-life> (https://salsa.debian.org/debian/debian-security-support/commit/ba638006d397eda2cc094761ed7a7bfdca9e534b)
https://github.com/ClusterLabs/libqb/issues/338
https://github.com/ClusterLabs/libqb/commit/6a4067c1d1764d93d255eccecfd8bf9f43cb0b4d
Regression fix: https://github.com/ClusterLabs/libqb/pull/349
Neutralised by kernel hardening

Search for package or bug name: Reporting problems