CVE-2019-13226

deepin-clone before 1.1.3 uses a predictable path /tmp/.deepin-clone/mount/<block-dev-basename> in the Helper::temporaryMountDevice() function to temporarily mount a file system as root. An unprivileged user can prepare a symlink at this location to have the file system mounted in an arbitrary location. By winning a race condition, the attacker can also enter the mount point, thereby preventing a subsequent unmount of the file system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:deepin:deepin-clone:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*

History

18 Apr 2022, 16:56

Type Values Removed Values Added
CPE cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
CWE CWE-362
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCHGRJV5CWTMYEE5B5C2FNMCFVP45S7H/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCHGRJV5CWTMYEE5B5C2FNMCFVP45S7H/ - Mailing List, Third Party Advisory

Information

Published : 2019-07-04 12:15

Updated : 2024-02-04 20:20


NVD link : CVE-2019-13226

Mitre link : CVE-2019-13226

CVE.ORG link : CVE-2019-13226


JSON object : View

Products Affected

deepin

  • deepin-clone

fedoraproject

  • fedora
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

CWE-59

Improper Link Resolution Before File Access ('Link Following')