CVE-2019-13228

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-13228
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-13228.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-13228
Published
2019-07-04T12:15:10Z
Modified
2025-01-08T10:21:53.551969Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

deepin-clone before 1.1.3 uses a fixed path /tmp/repo.iso in the BootDoctor::fix() function to download an ISO file, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled. By winning a race condition to replace the /tmp/repo.iso symlink by an attacker controlled ISO file, further privilege escalation may be possible.

References

Affected packages

Git / github.com/linuxdeepin/deepin-clone

Affected ranges

Type
GIT
Repo
https://github.com/linuxdeepin/deepin-clone
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

0.*

0.0.1
0.0.2
0.0.3
0.0.4
0.0.5
0.0.5.1
0.0.6
0.0.7
0.0.7.1
0.0.8
0.0.8.1
0.0.8.2
0.0.8.3
0.0.8.4
0.0.8.5
0.0.9
0.1.0
0.1.1
0.1.2

1.*

1.1.0
1.1.1
1.1.2
1.1.2.1