{"id":"UBUNTU-CVE-2012-0808","details":"as31 2.3.1-4 does not seed the random number generator and generates predictable temporary file names, which makes it easier for local users to create or truncate files via a symlink attack.","modified":"2025-07-16T07:30:52.841125Z","published":"2012-03-19T19:55:00Z","withdrawn":"2025-07-18T16:42:45Z","upstream":["CVE-2012-0808"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2012-0808"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2012-0808"}],"affected":[{"package":{"name":"as31","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/as31@2.3.1-6?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.3.1-6"}]}],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"as31","binary_version":"2.3.1-6"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2012/UBUNTU-CVE-2012-0808.json"}},{"package":{"name":"as31","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/as31@2.3.1-6?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.3.1-6"}]}],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"as31","binary_version":"2.3.1-6"},{"binary_name":"as31-dbgsym","binary_version":"2.3.1-6"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2012/UBUNTU-CVE-2012-0808.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"medium"}]}