atop: symlink attack possible due to insecure tempfile handling
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Atop | Atop_project | - (including) | - (including) |
Atop | Ubuntu | hardy | * |
Atop | Ubuntu | lucid | * |
Atop | Ubuntu | maverick | * |
Atop | Ubuntu | upstream | * |