Vulnerability Description
Debian tmpreaper version 1.6.13+nmu1 has a race condition when doing a (bind) mount via rename() which could result in local privilege escalation. Mounting via rename() could potentially lead to a file being placed elsewhereon the filesystem hierarchy (e.g. /etc/cron.d/) if the directory being cleaned up was on the same physical filesystem. Fixed versions include 1.6.13+nmu1+deb9u1 and 1.6.14.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Debian | Tmpreaper | 1.6.13\+nmu1 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=918956Mailing ListVendor Advisory
- https://lists.debian.org/debian-lts-announce/2019/01/msg00017.htmlVendor Advisory
- https://lists.debian.org/debian-security-announce/2019/msg00003.htmlMailing ListVendor Advisory
- https://usn.ubuntu.com/4077-1/
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=918956Mailing ListVendor Advisory
- https://lists.debian.org/debian-lts-announce/2019/01/msg00017.htmlVendor Advisory
- https://lists.debian.org/debian-security-announce/2019/msg00003.htmlMailing ListVendor Advisory
- https://usn.ubuntu.com/4077-1/
FAQ
What is CVE-2019-3461?
CVE-2019-3461 is a vulnerability with a CVSS score of 7.0 (HIGH). Debian tmpreaper version 1.6.13+nmu1 has a race condition when doing a (bind) mount via rename() which could result in local privilege escalation. Mounting via rename() could potentially lead to a fil...
How severe is CVE-2019-3461?
CVE-2019-3461 has been rated HIGH with a CVSS base score of 7.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-3461?
Check the references section above for vendor advisories and patch information. Affected products include: Debian Tmpreaper, Debian Debian Linux.