CVE-2021-44512
Published: 7 December 2021
World-writable permissions on the /tmp/tmate/sessions directory in tmate-ssh-server 2.3.0 allow a local attacker to compromise the integrity of session handling, or obtain the read-write session ID from a read-only session symlink in this directory.
Priority
CVSS 3 base score: 7.0
Status
Package | Release | Status |
---|---|---|
tmate-ssh-server Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
focal |
Does not exist
|
|
hirsute |
Ignored
(reached end-of-life)
|
|
impish |
Needed
|
|
jammy |
Needed
|
|
trusty |
Ignored
(out of standard support)
|
|
upstream |
Needs triage
|
|
xenial |
Ignored
(out of standard support)
|
Notes
Author | Note |
---|---|
ebarretto | same fix as CVE-2021-44512 |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44512
- https://www.openwall.com/lists/oss-security/2021/12/06/2
- https://bugzilla.suse.com/show_bug.cgi?id=1189388
- https://github.com/tmate-io/tmate-ssh-server/commit/1c020d1f5ca462f5b150b46a027aaa1bbe3c9596
- NVD
- Launchpad
- Debian