Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-32190

Опубликовано: 16 окт. 2024
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable by abusing insecure file operations that run with root privileges.

A flaw was found in the mlocate package of OpenSUSE and derived distributions. This issue occurs due to a insecure chmod call in the %post section of the mlocate package, allowing users to obtain read/write access to arbitrary files on the system when the mlocate package is re-installed or upgraded.

Отчет

This flaw is specific to OpenSUSE and derived distributions. Therefore, Red Hat products are not affected by this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7mlocateNot affected
Red Hat Enterprise Linux 8mlocateNot affected
Red Hat Enterprise Linux 9mlocateNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-732
https://bugzilla.redhat.com/show_bug.cgi?id=2319147mlocate: mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable

EPSS

Процентиль: 28%
0.00102
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 1 года назад

mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable by abusing insecure file operations that run with root privileges.

CVSS3: 7.8
nvd
больше 1 года назад

mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable by abusing insecure file operations that run with root privileges.

CVSS3: 7.8
debian
больше 1 года назад

mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary f ...

CVSS3: 7.8
github
больше 1 года назад

mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable by abusing insecure file operations that run with root privileges.

EPSS

Процентиль: 28%
0.00102
Низкий

7.8 High

CVSS3