Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-3461
HistoryFeb 04, 2019 - 12:00 a.m.

CVE-2019-3461

2019-02-0400:00:00
ubuntu.com
ubuntu.com
9

4.4 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%

Debian tmpreaper version 1.6.13+nmu1 has a race condition when doing a
(bind) mount via rename() which could result in local privilege escalation.
Mounting via rename() could potentially lead to a file being placed
elsewhereon the filesystem hierarchy (e.g. /etc/cron.d/) if the directory
being cleaned up was on the same physical filesystem. Fixed versions
include 1.6.13+nmu1+deb9u1 and 1.6.14.

Bugs

Notes

Author Note
ebarretto Version on trusty needs the fix, but the fix depends on bind mounts from util-linux package. And the util-linux in trusty doesn’t contain that feature. We could use another solution but I am not sure how this might affect the race condition.
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchtmpreaper< 1.6.13+nmu1+deb9u1build0.18.04.1UNKNOWN
ubuntu14.04noarchtmpreaper< anyUNKNOWN
ubuntu16.04noarchtmpreaper< 1.6.13+nmu1+deb9u1build0.16.04.1UNKNOWN

4.4 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%