Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2008-4579

Published: 15 October 2008

The (1) fence_apc and (2) fence_apc_snmp programs, as used in (a) fence 2.02.00-r1 and possibly (b) cman, when running in verbose mode, allows local users to append to arbitrary files via a symlink attack on the apclog temporary file.

Notes

AuthorNote
jdstrand
Ubuntu 8.10 and 9.04 already includes the upstream patches

Priority

Medium

Status

Package Release Status
redhat-cluster
Launchpad, Ubuntu, Debian
dapper Does not exist

feisty Does not exist

gutsy Does not exist

hardy
Released (2.20080227-0ubuntu1.3)
intrepid Not vulnerable

jaunty Not vulnerable

karmic Not vulnerable

upstream
Released (2.20081102-1)
redhat-cluster-suite
Launchpad, Ubuntu, Debian
dapper
Released (1.20060222-0ubuntu6.3)
feisty Ignored
(end of life, was needed)
gutsy Ignored
(end of life, was needed)
hardy Does not exist

intrepid Does not exist

jaunty Does not exist

karmic Does not exist

upstream Needs triage