When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process's log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and overwrite that sensitive file. To fix that, glog now causes the program to exit (with status code 2) when it finds that the configured log file already exists.
History

Mon, 17 Feb 2025 11:45:00 +0000

Type Values Removed Values Added
References

Fri, 14 Feb 2025 03:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat openshift Ai
CPEs cpe:/a:redhat:openshift_ai:2.17::el8
Vendors & Products Redhat
Redhat openshift Ai

Tue, 28 Jan 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 28 Jan 2025 14:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-59
References
Metrics threat_severity

None

cvssV3_0

{'score': 7.1, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}

threat_severity

Important


Tue, 28 Jan 2025 01:30:00 +0000

Type Values Removed Values Added
Description When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process's log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and overwrite that sensitive file. To fix that, glog now causes the program to exit (with status code 2) when it finds that the configured log file already exists.
Title Vulnerability when creating log files in github.com/golang/glog
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2025-02-17T11:02:36.886Z

Reserved: 2024-08-27T19:41:58.556Z

Link: CVE-2024-45339

cve-icon Vulnrichment

Updated: 2025-02-17T11:02:36.886Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-01-28T02:15:28.927

Modified: 2025-02-17T11:15:08.753

Link: CVE-2024-45339

cve-icon Redhat

Severity : Important

Publid Date: 2025-01-28T01:03:24Z

Links: CVE-2024-45339 - Bugzilla