CVE-2012-3378

Source
https://nvd.nist.gov/vuln/detail/CVE-2012-3378
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2012-3378.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2012-3378
Published
2012-08-31T18:55:02Z
Modified
2024-11-21T01:40:44Z
Summary
[none]
Details

The register_application function in atk-adaptor/bridge.c in GNOME at-spi2-atk 2.5.2 does not seed the random number generator and generates predictable temporary file names, which makes it easier for local users to create or truncate files via a symlink attack on a temporary socket file in /tmp/at-spi2.

References

Affected packages

Debian:11 / at-spi2-atk

Package

Name
at-spi2-atk
Purl
pkg:deb/debian/at-spi2-atk?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.5.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}