Lucene search

K
gentooGentoo FoundationGLSA-202107-03
HistoryJul 03, 2021 - 12:00 a.m.

libqb: Insecure temporary file

2021-07-0300:00:00
Gentoo Foundation
security.gentoo.org
98
libqb
insecure file
symlink attacks
predictable filenames
local attacker
arbitrary files
upgrade

CVSS2

6.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:C/A:C

CVSS3

7.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

EPSS

0

Percentile

5.1%

Background

libqb is a library with the primary purpose of providing high-performance, reusable features for client-server architecture, such as logging, tracing, inter-process communication (IPC), and polling.

Description

It was discovered that libqb used predictable filenames (under /dev/shm and /tmp) without O_EXCL.

Impact

A local attacker could perform symlink attacks to overwrite arbitrary files with the privileges of the user running the application linked against libqb.

Workaround

There is no known workaround at this time.

Resolution

All libqb users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-cluster/libqb-1.0.5"
OSVersionArchitecturePackageVersionFilename
Gentooanyallsys-cluster/libqb< 1.0.5UNKNOWN

CVSS2

6.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:C/A:C

CVSS3

7.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

EPSS

0

Percentile

5.1%