UBUNTU-CVE-2018-19046

Source
https://ubuntu.com/security/CVE-2018-19046
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-19046.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2018-19046
Upstream
Published
2018-11-08T20:29:00Z
Modified
2025-09-08T16:45:05Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

keepalived 2.0.8 didn't check for existing plain files when writing data to a temporary file upon a call to PrintData or PrintStats. If a local attacker had previously created a file with the expected name (e.g., /tmp/keepalived.data or /tmp/keepalived.stats), with read access for the attacker and write access for the keepalived process, then this potentially leaked sensitive information.

References

Affected packages

Ubuntu:Pro:18.04:LTS / keepalived

Package

Name
keepalived
Purl
pkg:deb/ubuntu/keepalived@1:1.3.9-1ubuntu0.18.04.3?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:1.*

1:1.3.2-1build1
1:1.3.9-1
1:1.3.9-1build1
1:1.3.9-1ubuntu0.18.04.1
1:1.3.9-1ubuntu0.18.04.2
1:1.3.9-1ubuntu0.18.04.3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "keepalived",
            "binary_version": "1:1.3.9-1ubuntu0.18.04.3"
        }
    ]
}