CVE-2009-4135

EUVD-2009-4105
The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 through 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp.
Link Following
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.4 UNKNOWN
LOCAL
MEDIUM
AV:L/AC:M/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 8%
Affected Products (NVD)
VendorProductVersion
canonicalubuntu_linux
10.04
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
gnucoreutils
5.2.1
gnucoreutils
5.91
gnucoreutils
5.92
gnucoreutils
5.93
gnucoreutils
5.94
gnucoreutils
5.95
gnucoreutils
5.96
gnucoreutils
5.97
gnucoreutils
6.2
gnucoreutils
6.3
gnucoreutils
6.4
gnucoreutils
6.5
gnucoreutils
6.6
gnucoreutils
6.7
gnucoreutils
6.8
gnucoreutils
6.9
gnucoreutils
6.10
gnucoreutils
6.11
gnucoreutils
6.12
gnucoreutils
7.1
gnucoreutils
7.2
gnucoreutils
7.3
gnucoreutils
7.4
gnucoreutils
7.5
gnucoreutils
7.6
gnucoreutils
8.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
coreutils
bookworm
9.1-1
fixed
bullseye
8.32-4
fixed
sid
9.5-1
fixed
trixie
9.5-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
coreutils
dapper
ignored
hardy
ignored
intrepid
ignored
jaunty
ignored
karmic
ignored
lucid
Fixed 7.4-2ubuntu3.1
released
maverick
ignored
natty
ignored
oneiric
ignored
precise
not-affected
quantal
ignored
raring
ignored
saucy
ignored
trusty
not-affected
utopic
not-affected
References