CVE-2018-19046

NameCVE-2018-19046
Descriptionkeepalived 2.0.8 didn't check for existing plain files when writing data to a temporary file upon a call to PrintData or PrintStats. If a local attacker had previously created a file with the expected name (e.g., /tmp/keepalived.data or /tmp/keepalived.stats), with read access for the attacker and write access for the keepalived process, then this potentially leaked sensitive information.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
keepalived (PTS)jessie, jessie (lts)1:1.2.13-1+deb8u1vulnerable
stretch (lts), stretch1:1.3.2-1+deb9u1vulnerable
buster1:2.0.10-1fixed
buster (security)1:2.0.10-1+deb10u1fixed
bullseye1:2.1.5-0.2+deb11u1fixed
bookworm1:2.2.7-1fixed
sid, trixie1:2.2.8-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
keepalivedsourcewheezy(unfixed)end-of-life
keepalivedsource(unstable)1:2.0.10-1unimportant

Notes

https://bugzilla.suse.com/show_bug.cgi?id=1015141
https://github.com/acassen/keepalived/issues/1048
Neutralised by kernel hardening

Search for package or bug name: Reporting problems