Vulnerability Name: | CVE-2019-13226 (CCN-163419) | ||||||||||||
Assigned: | 2019-07-04 | ||||||||||||
Published: | 2019-07-04 | ||||||||||||
Updated: | 2022-04-18 | ||||||||||||
Summary: | deepin-clone before 1.1.3 uses a predictable path /tmp/.deepin-clone/mount/<block-dev-basename> in the Helper::temporaryMountDevice() function to temporarily mount a file system as root. An unprivileged user can prepare a symlink at this location to have the file system mounted in an arbitrary location. By winning a race condition, the attacker can also enter the mount point, thereby preventing a subsequent unmount of the file system. | ||||||||||||
CVSS v3 Severity: | 7.0 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.1 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
3.5 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.9 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-362 CWE-59 | ||||||||||||
Vulnerability Consequences: | File Manipulation | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-13226 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20190704 deepin-clone: various symlink attacks Source: MISC Type: Issue Tracking, Third Party Advisory https://bugzilla.suse.com/show_bug.cgi?id=1130388 Source: XF Type: UNKNOWN deepinclone-cve201913226-symlink(163419) Source: CCN Type: deepin-clone GIT Repository fix: Do not use the "/tmp" directory Source: MISC Type: Patch, Third Party Advisory https://github.com/linuxdeepin/deepin-clone/commit/e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2019-3d418f349c Source: CCN Type: oss-sec Mailing List, Thu, 4 Jul 2019 14:59:14 +0200 deepin-clone: various symlink attacks | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: ![]() | ||||||||||||
BACK |