Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-32190

Опубликовано: 16 окт. 2024
Источник: debian
EPSS Низкий

Описание

mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable by abusing insecure file operations that run with root privileges.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mlocateremovedpackage
mlocatenot-affectedbullseyepackage

Примечания

  • https://bugzilla.suse.com/show_bug.cgi?id=1218896

EPSS

Процентиль: 28%
0.00102
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 1 года назад

mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable by abusing insecure file operations that run with root privileges.

CVSS3: 7.8
redhat
больше 1 года назад

mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable by abusing insecure file operations that run with root privileges.

CVSS3: 7.8
nvd
больше 1 года назад

mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable by abusing insecure file operations that run with root privileges.

CVSS3: 7.8
github
больше 1 года назад

mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable by abusing insecure file operations that run with root privileges.

EPSS

Процентиль: 28%
0.00102
Низкий