Summary: | <app-emulation/libguestfs-1.24.0: insecure handling of socket file (CVE-2013-4419) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Mikle Kolyada (RETIRED) <zlogene> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | andreis.vinogradovs, maksbotan, proxy-maint, rich |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://seclists.org/oss-sec/2013/q4/125 | ||
Whiteboard: | ~2 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Mikle Kolyada (RETIRED)
2013-10-18 21:50:40 UTC
CVE-2013-4419 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4419): The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance. Maintainer timeout. Cleanup done. |