When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process's log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and overwrite that sensitive file. To fix that, glog now causes the program to exit (with status code 2) when it finds that the configured log file already exists.
Metrics
Affected Vendors & Products
References
History
Mon, 17 Feb 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 14 Feb 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat openshift Ai |
|
CPEs | cpe:/a:redhat:openshift_ai:2.17::el8 | |
Vendors & Products |
Redhat
Redhat openshift Ai |
Tue, 28 Jan 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Tue, 28 Jan 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-59 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_0
|
Tue, 28 Jan 2025 01:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process's log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and overwrite that sensitive file. To fix that, glog now causes the program to exit (with status code 2) when it finds that the configured log file already exists. | |
Title | Vulnerability when creating log files in github.com/golang/glog | |
References |
|

Status: PUBLISHED
Assigner: Go
Published:
Updated: 2025-02-17T11:02:36.886Z
Reserved: 2024-08-27T19:41:58.556Z
Link: CVE-2024-45339

Updated: 2025-02-17T11:02:36.886Z

Status : Awaiting Analysis
Published: 2025-01-28T02:15:28.927
Modified: 2025-02-17T11:15:08.753
Link: CVE-2024-45339
