keepalived 2.0.8 didnt check for pathnames with symlinks when writing data to a temporary file upon a call to PrintData or PrintStats. This allowed local users to overwrite arbitrary files if fs.protected_symlinks is set to 0, as demonstrated by a symlink from /tmp/keepalived.data or /tmp/keepalived.stats to /etc/passwd.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Keepalived | Keepalived | 2.0.8 (including) | 2.0.8 (including) |
Keepalived | Ubuntu | bionic | * |
Keepalived | Ubuntu | cosmic | * |
Keepalived | Ubuntu | esm-infra/bionic | * |
Keepalived | Ubuntu | upstream | * |
Red Hat Enterprise Linux 7 | RedHat | keepalived-0:1.3.5-16.el7 | * |