Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2018-19044

Published: 8 November 2018

keepalived 2.0.8 didn't check for pathnames with symlinks when writing data to a temporary file upon a call to PrintData or PrintStats. This allowed local users to overwrite arbitrary files if fs.protected_symlinks is set to 0, as demonstrated by a symlink from /tmp/keepalived.data or /tmp/keepalived.stats to /etc/passwd.

Notes

AuthorNote
mdeslaur
xenial and earlier don't have dbus support

Priority

Low

CVSS 3 base score: 4.7

Status

Package Release Status
keepalived
Launchpad, Ubuntu, Debian
bionic Needed

cosmic Ignored
(reached end-of-life)
disco Not vulnerable
(1:2.0.10-1)
eoan Not vulnerable
(1:2.0.10-1)
focal Not vulnerable
(1:2.0.10-1)
groovy Not vulnerable
(1:2.0.10-1)
hirsute Not vulnerable
(1:2.0.10-1)
impish Not vulnerable
(1:2.0.10-1)
jammy Not vulnerable
(1:2.0.10-1)
kinetic Not vulnerable
(1:2.0.10-1)
precise Not vulnerable
(code not present)
trusty Not vulnerable
(code not present)
upstream
Released (2.0.9)
xenial Not vulnerable
(code not present)
Patches:
upstream: https://github.com/acassen/keepalived/commit/04f2d32871bb3b11d7dc024039952f2fe2750306
This vulnerability is mitigated in part by the use of symlink restrictions in Ubuntu. This vulnerability is mitigated in part by the use of hardlink restrictions in Ubuntu.