Описание
The groonga-httpd package 6.1.5-1 for Debian sets the /var/log/groonga ownership to the groonga account, which might let local users obtain root access because of unsafe interaction with logrotate. For example, an attacker can exploit a race condition to insert a symlink from /var/log/groonga/httpd to /etc/bash_completion.d. NOTE: this is an issue in the Debian packaging of the Groonga HTTP server.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needed |
| cosmic | ignored | end of life |
| devel | not-affected | 9.0.1-2 |
| disco | ignored | end of life |
| eoan | not-affected | 9.0.1-2 |
| esm-apps/bionic | needed | |
| esm-apps/focal | not-affected | 9.0.1-2 |
| esm-apps/jammy | not-affected | 9.0.1-2 |
| esm-apps/noble | not-affected | 9.0.1-2 |
| esm-apps/xenial | needed |
Показывать по
EPSS
6.9 Medium
CVSS2
7 High
CVSS3
Связанные уязвимости
The groonga-httpd package 6.1.5-1 for Debian sets the /var/log/groonga ownership to the groonga account, which might let local users obtain root access because of unsafe interaction with logrotate. For example, an attacker can exploit a race condition to insert a symlink from /var/log/groonga/httpd to /etc/bash_completion.d. NOTE: this is an issue in the Debian packaging of the Groonga HTTP server.
The groonga-httpd package 6.1.5-1 for Debian sets the /var/log/groonga ...
The groonga-httpd package 6.1.5-1 for Debian sets the /var/log/groonga ownership to the groonga account, which might let local users obtain root access because of unsafe interaction with logrotate. For example, an attacker can exploit a race condition to insert a symlink from /var/log/groonga/httpd to /etc/bash_completion.d. NOTE: this is an issue in the Debian packaging of the Groonga HTTP server.
EPSS
6.9 Medium
CVSS2
7 High
CVSS3