Lucene search

K
gentooGentoo FoundationGLSA-202310-08
HistoryOct 08, 2023 - 12:00 a.m.

man-db: privilege escalation

2023-10-0800:00:00
Gentoo Foundation
security.gentoo.org
5
man-db
privilege escalation
cron job
berkeleydb
cve identifier

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%

Background

man-db is a man replacement that utilizes BerkeleyDB instead of flat files.

Description

A root privilege escalation through setuid executable and cron job has been discovered in man-db. Please review the CVE identifier referenced below for details.

Impact

A local user with access to the man user or group can elevate privileges to root.

Workaround

There is no known workaround at this time.

Resolution

All man-db users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-apps/man-db-2.8.5"
OSVersionArchitecturePackageVersionFilename
Gentooanyallsys-apps/man-db< 2.8.5UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%