Source: golang-glog Version: 1.2.2-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for golang-glog. CVE-2024-45339[0]: | When logs are written to a widely-writable directory (the default), | an unprivileged attacker may predict a privileged process's log file | path and pre-create a symbolic link to a sensitive file in its | place. When that privileged process runs, it will follow the planted | symlink and overwrite that sensitive file. To fix that, glog now | causes the program to exit (with status code 2) when it finds that | the configured log file already exists. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-45339 https://www.cve.org/CVERecord?id=CVE-2024-45339 [1] https://github.com/golang/glog/commit/a0e3c40a0ed0cecc58c84e7684d9ce55a54044ee Please adjust the affected versions in the BTS as needed. Regards, Salvatore