UBUNTU-CVE-2018-14329

Source
https://ubuntu.com/security/CVE-2018-14329
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-14329.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2018-14329
Upstream
Published
2018-07-17T02:29:00Z
Modified
2025-10-24T04:47:08Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
  • Ubuntu - negligible
Summary
[none]
Details

In HTSlib 1.8, a race condition in cram/cram_io.c might allow local users to overwrite arbitrary files via a symlink attack.

References

Affected packages

Ubuntu:20.04:LTS

htslib

Package

Name
htslib
Purl
pkg:deb/ubuntu/htslib@1.10.2-3ubuntu0.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.9-10
1.9-11
1.9-12
1.10.2-2ubuntu1
1.10.2-2ubuntu2
1.10.2-3
1.10.2-3ubuntu0.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "htslib-test",
            "binary_version": "1.10.2-3ubuntu0.1"
        },
        {
            "binary_name": "libhts-dev",
            "binary_version": "1.10.2-3ubuntu0.1"
        },
        {
            "binary_name": "libhts3",
            "binary_version": "1.10.2-3ubuntu0.1"
        },
        {
            "binary_name": "tabix",
            "binary_version": "1.10.2-3ubuntu0.1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-14329.json"

Ubuntu:22.04:LTS

htslib

Package

Name
htslib
Purl
pkg:deb/ubuntu/htslib@1.13+ds-2build1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.13+ds-2
1.13+ds-2build1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "htslib-test",
            "binary_version": "1.13+ds-2build1"
        },
        {
            "binary_name": "libhts-dev",
            "binary_version": "1.13+ds-2build1"
        },
        {
            "binary_name": "libhts3",
            "binary_version": "1.13+ds-2build1"
        },
        {
            "binary_name": "tabix",
            "binary_version": "1.13+ds-2build1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-14329.json"

Ubuntu:24.04:LTS

htslib

Package

Name
htslib
Purl
pkg:deb/ubuntu/htslib@1.19+ds-1.1build3?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.17+ds-1
1.18+ds-1
1.19+ds-1.1build2
1.19+ds-1.1build3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "htslib-test",
            "binary_version": "1.19+ds-1.1build3"
        },
        {
            "binary_name": "libhts-dev",
            "binary_version": "1.19+ds-1.1build3"
        },
        {
            "binary_name": "libhts3t64",
            "binary_version": "1.19+ds-1.1build3"
        },
        {
            "binary_name": "tabix",
            "binary_version": "1.19+ds-1.1build3"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-14329.json"

Ubuntu:25.04

htslib

Package

Name
htslib
Purl
pkg:deb/ubuntu/htslib@1.21+ds-1?arch=source&distro=plucky

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.20+ds-1
1.20+ds-2
1.21+ds-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "htslib-test",
            "binary_version": "1.21+ds-1"
        },
        {
            "binary_name": "libhts-dev",
            "binary_version": "1.21+ds-1"
        },
        {
            "binary_name": "libhts3t64",
            "binary_version": "1.21+ds-1"
        },
        {
            "binary_name": "tabix",
            "binary_version": "1.21+ds-1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-14329.json"

Ubuntu:25.10

htslib

Package

Name
htslib
Purl
pkg:deb/ubuntu/htslib@1.21+ds-1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.21+ds-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "htslib-test",
            "binary_version": "1.21+ds-1"
        },
        {
            "binary_name": "libhts-dev",
            "binary_version": "1.21+ds-1"
        },
        {
            "binary_name": "libhts3t64",
            "binary_version": "1.21+ds-1"
        },
        {
            "binary_name": "tabix",
            "binary_version": "1.21+ds-1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-14329.json"

Ubuntu:Pro:14.04:LTS

htslib

Package

Name
htslib
Purl
pkg:deb/ubuntu/htslib@0.2.0~rc3-1ubuntu0.1~esm1?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.2.0~rc3-1
0.2.0~rc3-1ubuntu0.1~esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "htslib-test",
            "binary_version": "0.2.0~rc3-1ubuntu0.1~esm1"
        },
        {
            "binary_name": "libhts-dev",
            "binary_version": "0.2.0~rc3-1ubuntu0.1~esm1"
        },
        {
            "binary_name": "libhts0",
            "binary_version": "0.2.0~rc3-1ubuntu0.1~esm1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-14329.json"

Ubuntu:Pro:16.04:LTS

htslib

Package

Name
htslib
Purl
pkg:deb/ubuntu/htslib@1.2.1-2ubuntu1+esm1?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.2.1-1
1.2.1-2
1.2.1-2ubuntu1
1.2.1-2ubuntu1+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "htslib-test",
            "binary_version": "1.2.1-2ubuntu1+esm1"
        },
        {
            "binary_name": "libhts-dev",
            "binary_version": "1.2.1-2ubuntu1+esm1"
        },
        {
            "binary_name": "libhts1",
            "binary_version": "1.2.1-2ubuntu1+esm1"
        },
        {
            "binary_name": "tabix",
            "binary_version": "1.2.1-2ubuntu1+esm1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-14329.json"

Ubuntu:Pro:18.04:LTS

htslib

Package

Name
htslib
Purl
pkg:deb/ubuntu/htslib@1.7-2ubuntu0.1~esm1?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.5-1
1.5-4ubuntu1
1.6-3ubuntu1
1.6-4
1.6-4build1
1.7-2
1.7-2ubuntu0.1~esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "htslib-test",
            "binary_version": "1.7-2ubuntu0.1~esm1"
        },
        {
            "binary_name": "libhts-dev",
            "binary_version": "1.7-2ubuntu0.1~esm1"
        },
        {
            "binary_name": "libhts-private-dev",
            "binary_version": "1.7-2ubuntu0.1~esm1"
        },
        {
            "binary_name": "libhts2",
            "binary_version": "1.7-2ubuntu0.1~esm1"
        },
        {
            "binary_name": "tabix",
            "binary_version": "1.7-2ubuntu0.1~esm1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-14329.json"