Vulnerability Description
In the ebuild package through logcheck-1.3.23.ebuild for Logcheck on Gentoo, it is possible to achieve root privilege escalation from the logcheck user because of insecure recursive chown calls.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Debian | Logcheck | <= 1.3.23 |
Related Weaknesses (CWE)
References
- https://bugs.gentoo.org/630752ExploitIssue TrackingPatch
- https://security.gentoo.org/glsa/202209-10Third Party Advisory
- https://bugs.gentoo.org/630752ExploitIssue TrackingPatch
- https://security.gentoo.org/glsa/202209-10Third Party Advisory
FAQ
What is CVE-2017-20148?
CVE-2017-20148 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In the ebuild package through logcheck-1.3.23.ebuild for Logcheck on Gentoo, it is possible to achieve root privilege escalation from the logcheck user because of insecure recursive chown calls.
How severe is CVE-2017-20148?
CVE-2017-20148 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-20148?
Check the references section above for vendor advisories and patch information. Affected products include: Debian Logcheck.