First published: Mon Jul 29 2019(Updated: )
It was discovered that tmpreaper incorrectly handled certain mount operations. A local attacker could possibly use this issue to create arbitrary files, leading to privilege escalation.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/tmpreaper | <1.6.13+nmu1+deb9u1build0.18.04.1 | 1.6.13+nmu1+deb9u1build0.18.04.1 |
Ubuntu OpenSSH Client | =18.04 | |
All of | ||
ubuntu/tmpreaper | <1.6.13+nmu1+deb9u1build0.16.04.1 | 1.6.13+nmu1+deb9u1build0.16.04.1 |
Ubuntu OpenSSH Client | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-4077-1 is classified as a privilege escalation vulnerability that could allow local attackers to create arbitrary files.
To fix USN-4077-1, update tmpreaper to the fixed versions: 1.6.13+nmu1+deb9u1build0.18.04.1 for Ubuntu 18.04 or 1.6.13+nmu1+deb9u1build0.16.04.1 for Ubuntu 16.04.
Yes, USN-4077-1 can affect systems running the vulnerable versions of tmpreaper on Ubuntu 16.04 or 18.04.
USN-4077-1 affects users of the tmpreaper package on Ubuntu Linux versions 16.04 and 18.04.
It is recommended to immediately update your tmpreaper package to mitigate the risk associated with USN-4077-1.