First published: Thu Nov 08 2018(Updated: )
keepalived 2.0.8 didn't check for pathnames with symlinks when writing data to a temporary file upon a call to PrintData or PrintStats. This allowed local users to overwrite arbitrary files if fs.protected_symlinks is set to 0, as demonstrated by a symlink from /tmp/keepalived.data or /tmp/keepalived.stats to /etc/passwd.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Keepalived Keepalived | =2.0.8 | |
redhat/keepalived | <2.0.9 | 2.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19044 is a vulnerability in keepalived 2.0.8 that allows local users to overwrite arbitrary files if fs.protected_symlinks is set to 0.
The severity of CVE-2018-19044 is medium, with a severity value of 4.7.
CVE-2018-19044 affects Keepalived 2.0.8.
You can fix CVE-2018-19044 by upgrading to Keepalived 2.0.9 or a newer version.
You can find more information about CVE-2018-19044 at the following references: [Red Hat Advisory](https://access.redhat.com/errata/RHSA-2019:2285), [Bugzilla](https://bugzilla.suse.com/show_bug.cgi?id=1015141), [GitHub commit](https://github.com/acassen/keepalived/commit/04f2d32871bb3b11d7dc024039952f2fe2750306).