Name | CVE-2021-44512 |
Description | World-writable permissions on the /tmp/tmate/sessions directory in tmate-ssh-server 2.3.0 allow a local attacker to compromise the integrity of session handling, or obtain the read-write session ID from a read-only session symlink in this directory. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1001225 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
tmate-ssh-server (PTS) | bullseye | 2.3.0-49-g97d20249-1 | vulnerable |
| sid, trixie | 2.3.0-68-gd7334ee4-2 | fixed |
The information below is based on the following data on fixed versions.
Notes
[bullseye] - tmate-ssh-server <no-dsa> (Minor issue)
Fixed by: https://github.com/tmate-io/tmate-ssh-server/commit/1c020d1f5ca462f5b150b46a027aaa1bbe3c9596
https://www.openwall.com/lists/oss-security/2021/12/06/2
https://bugzilla.suse.com/show_bug.cgi?id=1189388