CVE-2019-12779

NameCVE-2019-12779
Descriptionlibqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs927159

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libqb (PTS)jessie0.11.1-2vulnerable
stretch1.0.1-1vulnerable
buster1.0.5-1fixed
bullseye2.0.3-1fixed
bookworm2.0.6-2fixed
sid, trixie2.0.8-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libqbsourcewheezy(unfixed)end-of-life
libqbsourcejessie(unfixed)end-of-life
libqbsource(unstable)1.0.4-1unimportant927159

Notes

[jessie] - libqb <end-of-life> (https://salsa.debian.org/debian/debian-security-support/commit/ba638006d397eda2cc094761ed7a7bfdca9e534b)
https://github.com/ClusterLabs/libqb/issues/338
https://github.com/ClusterLabs/libqb/commit/6a4067c1d1764d93d255eccecfd8bf9f43cb0b4d
Regression fix: https://github.com/ClusterLabs/libqb/pull/349
Neutralised by kernel hardening

Search for package or bug name: Reporting problems