The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 through 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ubuntu_linux | Canonical | 10.04 (including) | 10.04 (including) |
Ubuntu_linux | Canonical | 12.04 (including) | 12.04 (including) |
Ubuntu_linux | Canonical | 14.04 (including) | 14.04 (including) |
Coreutils | Ubuntu | dapper | * |
Coreutils | Ubuntu | hardy | * |
Coreutils | Ubuntu | intrepid | * |
Coreutils | Ubuntu | jaunty | * |
Coreutils | Ubuntu | karmic | * |
Coreutils | Ubuntu | lucid | * |
Coreutils | Ubuntu | maverick | * |
Coreutils | Ubuntu | natty | * |
Coreutils | Ubuntu | oneiric | * |
Coreutils | Ubuntu | quantal | * |
Coreutils | Ubuntu | raring | * |
Coreutils | Ubuntu | saucy | * |