Source: golang-glog
Version: 1.2.2-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for golang-glog.

CVE-2024-45339[0]:
| When logs are written to a widely-writable directory (the default),
| an unprivileged attacker may predict a privileged process's log file
| path and pre-create a symbolic link to a sensitive file in its
| place. When that privileged process runs, it will follow the planted
| symlink and overwrite that sensitive file. To fix that, glog now
| causes the program to exit (with status code 2) when it finds that
| the configured log file already exists.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-45339
    https://www.cve.org/CVERecord?id=CVE-2024-45339
[1] 
https://github.com/golang/glog/commit/a0e3c40a0ed0cecc58c84e7684d9ce55a54044ee

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to