Vulnerability Database
Blog
FAQ
Docs
CVE-2011-3618
See a problem?
Please try reporting it
to the source
first.
Source
https://nvd.nist.gov/vuln/detail/CVE-2011-3618
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2011-3618.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2011-3618
Published
2019-11-12T15:15:10Z
Modified
2024-11-21T01:30:51Z
Severity
7.8 (High)
CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS Calculator
Summary
[none]
Details
atop: symlink attack possible due to insecure tempfile handling
References
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3618
https://access.redhat.com/security/cve/cve-2011-3618
https://security-tracker.debian.org/tracker/CVE-2011-3618
Affected packages
Debian:11
/
atop
Package
Name
atop
Purl
pkg:deb/debian/atop?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1.23-1.1
Ecosystem specific
{ "urgency": "low" }
Debian:12
/
atop
Package
Name
atop
Purl
pkg:deb/debian/atop?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1.23-1.1
Ecosystem specific
{ "urgency": "low" }
Debian:13
/
atop
Package
Name
atop
Purl
pkg:deb/debian/atop?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1.23-1.1
Ecosystem specific
{ "urgency": "low" }
CVE-2011-3618 - OSV