The following table lists the changes that have been made to the
CVE-2024-45339 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by [email protected]Jan. 28, 2025
Action Type Old Value New Value Added Description When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process’s log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and overwrite that sensitive file. To fix that, glog now causes the program to exit (with status code 2) when it finds that the configured log file already exists. Added Reference https://github.com/golang/glog/pull/74 Added Reference https://github.com/golang/glog/pull/74/commits/b8741656e406e66d6992bc2c9575e460ecaa0ec2 Added Reference https://groups.google.com/g/golang-announce/c/H-Q4ouHWyKs Added Reference https://owasp.org/www-community/vulnerabilities/Insecure_Temporary_File Added Reference https://pkg.go.dev/vuln/GO-2025-3372