CVE-2019-13226

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-13226
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-13226.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-13226
Withdrawn
2025-05-26T12:57:00.568111Z
Published
2019-07-04T12:15:10Z
Modified
2025-01-08T10:21:56.983584Z
Severity
  • 7.0 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

deepin-clone before 1.1.3 uses a predictable path /tmp/.deepin-clone/mount/<block-dev-basename> in the Helper::temporaryMountDevice() function to temporarily mount a file system as root. An unprivileged user can prepare a symlink at this location to have the file system mounted in an arbitrary location. By winning a race condition, the attacker can also enter the mount point, thereby preventing a subsequent unmount of the file system.

References

Affected packages

Git / github.com/linuxdeepin/deepin-clone

Affected ranges

Type
GIT
Repo
https://github.com/linuxdeepin/deepin-clone
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

0.*

0.0.1
0.0.2
0.0.3
0.0.4
0.0.5
0.0.5.1
0.0.6
0.0.7
0.0.7.1
0.0.8
0.0.8.1
0.0.8.2
0.0.8.3
0.0.8.4
0.0.8.5
0.0.9
0.1.0
0.1.1
0.1.2

1.*

1.1.0
1.1.1
1.1.2
1.1.2.1