Project Subscriptions
| Vendors | Products |
|---|---|
|
Redhat
Subscribe
|
Enterprise Linux
Subscribe
Enterprise Linux Aus
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux For Arm 64
Subscribe
Enterprise Linux For Arm 64 Eus
Subscribe
Enterprise Linux For Ibm Z Systems
Subscribe
Enterprise Linux For Ibm Z Systems Eus
Subscribe
Enterprise Linux For Power Big Endian
Subscribe
Enterprise Linux For Power Little Endian
Subscribe
Enterprise Linux For Power Little Endian Eus
Subscribe
Enterprise Linux For Scientific Computing
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions
Subscribe
Enterprise Linux Server Tus
Subscribe
Enterprise Linux Server Update Services For Sap Solutions
Subscribe
Enterprise Linux Update Services For Sap Solutions
Subscribe
Insights-client
Subscribe
Rhel Aus
Subscribe
Rhel E4s
Subscribe
Rhel Eus
Subscribe
Rhel Tus
Subscribe
|
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-44597 | A vulnerability was found in insights-client. This security issue occurs because of insecure file operations or unsafe handling of temporary files and directories that lead to local privilege escalation. Before the insights-client has been registered on the system by root, an unprivileged local user or attacker could create the /var/tmp/insights-client directory (owning the directory with read, write, and execute permissions) on the system. After the insights-client is registered by root, an attacker could then control the directory content that insights are using by putting malicious scripts into it and executing arbitrary code as root (trivially bypassing SELinux protections because insights processes are allowed to disable SELinux system-wide). |
Solution
No solution given by the vendor.
Workaround
Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.
Sat, 23 Nov 2024 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-20T07:23:35.681Z
Reserved: 2023-07-27T12:10:37.684Z
Link: CVE-2023-3972
Updated: 2024-08-02T07:08:50.763Z
Status : Modified
Published: 2023-11-01T16:15:08.517
Modified: 2024-11-21T08:18:25.853
Link: CVE-2023-3972
OpenCVE Enrichment
No data.
EUVD