Description
Debian tmpreaper version 1.6.13+nmu1 has a race condition when doing a (bind) mount via rename() which could result in local privilege escalation. Mounting via rename() could potentially lead to a file being placed elsewhereon the filesystem hierarchy (e.g. /etc/cron.d/) if the directory being cleaned up was on the same physical filesystem. Fixed versions include 1.6.13+nmu1+deb9u1 and 1.6.14.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1640-1 | tmpreaper security update |
Debian DSA |
DSA-4365-1 | tmpreaper security update |
EUVD |
EUVD-2019-13100 | Debian tmpreaper version 1.6.13+nmu1 has a race condition when doing a (bind) mount via rename() which could result in local privilege escalation. Mounting via rename() could potentially lead to a file being placed elsewhereon the filesystem hierarchy (e.g. /etc/cron.d/) if the directory being cleaned up was on the same physical filesystem. Fixed versions include 1.6.13+nmu1+deb9u1 and 1.6.14. |
Ubuntu USN |
USN-4077-1 | tmpreaper vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-09-16T22:56:42.618Z
Reserved: 2018-12-31T00:00:00.000Z
Link: CVE-2019-3461
No data.
Status : Modified
Published: 2019-02-04T18:29:00.247
Modified: 2024-11-21T04:42:05.553
Link: CVE-2019-3461
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN