In HTSlib 1.8, a race condition in cram/cram_io.c might allow local users to overwrite arbitrary files via a symlink attack.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Htslib | Htslib | 1.8 (including) | 1.8 (including) |
Htslib | Ubuntu | artful | * |
Htslib | Ubuntu | bionic | * |
Htslib | Ubuntu | cosmic | * |
Htslib | Ubuntu | devel | * |
Htslib | Ubuntu | disco | * |
Htslib | Ubuntu | eoan | * |
Htslib | Ubuntu | esm-apps/bionic | * |
Htslib | Ubuntu | esm-apps/focal | * |
Htslib | Ubuntu | esm-apps/jammy | * |
Htslib | Ubuntu | esm-apps/noble | * |
Htslib | Ubuntu | esm-apps/xenial | * |
Htslib | Ubuntu | esm-infra-legacy/trusty | * |
Htslib | Ubuntu | focal | * |
Htslib | Ubuntu | groovy | * |
Htslib | Ubuntu | hirsute | * |
Htslib | Ubuntu | impish | * |
Htslib | Ubuntu | jammy | * |
Htslib | Ubuntu | kinetic | * |
Htslib | Ubuntu | lunar | * |
Htslib | Ubuntu | mantic | * |
Htslib | Ubuntu | noble | * |
Htslib | Ubuntu | oracular | * |
Htslib | Ubuntu | trusty | * |
Htslib | Ubuntu | trusty/esm | * |
Htslib | Ubuntu | xenial | * |