Name | CVE-2019-12779 |
Description | libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 927159 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
libqb (PTS) | bullseye | 2.0.3-1 | fixed |
| bookworm | 2.0.6-2 | fixed |
| sid, trixie | 2.0.8-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
libqb | source | jessie | (unfixed) | end-of-life | | |
libqb | source | (unstable) | 1.0.4-1 | unimportant | | 927159 |
Notes
[jessie] - libqb <end-of-life> (https://salsa.debian.org/debian/debian-security-support/commit/ba638006d397eda2cc094761ed7a7bfdca9e534b)
https://github.com/ClusterLabs/libqb/issues/338
https://github.com/ClusterLabs/libqb/commit/6a4067c1d1764d93d255eccecfd8bf9f43cb0b4d
Regression fix: https://github.com/ClusterLabs/libqb/pull/349
Neutralised by kernel hardening