deepin-clone before 1.1.3 uses a fixed path /tmp/repo.iso in the BootDoctor::fix() function to download an ISO file, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled. By winning a race condition to replace the /tmp/repo.iso symlink by an attacker controlled ISO file, further privilege escalation may be possible.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-4741 deepin-clone before 1.1.3 uses a fixed path /tmp/repo.iso in the BootDoctor::fix() function to download an ISO file, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled. By winning a race condition to replace the /tmp/repo.iso symlink by an attacker controlled ISO file, further privilege escalation may be possible.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T23:49:24.323Z

Reserved: 2019-07-04T00:00:00

Link: CVE-2019-13228

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-07-04T12:15:10.597

Modified: 2024-11-21T04:24:29.700

Link: CVE-2019-13228

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.