A vulnerability was found in insights-client. This security issue occurs because of insecure file operations or unsafe handling of temporary files and directories that lead to local privilege escalation. Before the insights-client has been registered on the system by root, an unprivileged local user or attacker could create the /var/tmp/insights-client directory (owning the directory with read, write, and execute permissions) on the system. After the insights-client is registered by root, an attacker could then control the directory content that insights are using by putting malicious scripts into it and executing arbitrary code as root (trivially bypassing SELinux protections because insights processes are allowed to disable SELinux system-wide).

Project Subscriptions

Vendors Products
Enterprise Linux Subscribe
Enterprise Linux Aus Subscribe
Enterprise Linux Desktop Subscribe
Enterprise Linux Eus Subscribe
Enterprise Linux For Arm 64 Subscribe
Enterprise Linux For Arm 64 Eus Subscribe
Enterprise Linux For Ibm Z Systems Subscribe
Enterprise Linux For Ibm Z Systems Eus Subscribe
Enterprise Linux For Power Big Endian Subscribe
Enterprise Linux For Power Little Endian Subscribe
Enterprise Linux For Power Little Endian Eus Subscribe
Enterprise Linux For Scientific Computing Subscribe
Enterprise Linux Server Subscribe
Enterprise Linux Server Aus Subscribe
Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions Subscribe
Enterprise Linux Server Tus Subscribe
Enterprise Linux Server Update Services For Sap Solutions Subscribe
Enterprise Linux Update Services For Sap Solutions Subscribe
Insights-client Subscribe
Rhel Aus Subscribe
Rhel E4s Subscribe
Rhel Eus Subscribe
Rhel Tus Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-44597 A vulnerability was found in insights-client. This security issue occurs because of insecure file operations or unsafe handling of temporary files and directories that lead to local privilege escalation. Before the insights-client has been registered on the system by root, an unprivileged local user or attacker could create the /var/tmp/insights-client directory (owning the directory with read, write, and execute permissions) on the system. After the insights-client is registered by root, an attacker could then control the directory content that insights are using by putting malicious scripts into it and executing arbitrary code as root (trivially bypassing SELinux protections because insights processes are allowed to disable SELinux system-wide).
Fixes

Solution

No solution given by the vendor.


Workaround

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

History

Sat, 23 Nov 2024 02:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-20T07:23:35.681Z

Reserved: 2023-07-27T12:10:37.684Z

Link: CVE-2023-3972

cve-icon Vulnrichment

Updated: 2024-08-02T07:08:50.763Z

cve-icon NVD

Status : Modified

Published: 2023-11-01T16:15:08.517

Modified: 2024-11-21T08:18:25.853

Link: CVE-2023-3972

cve-icon Redhat

Severity : Important

Publid Date: 2023-11-01T11:00:00Z

Links: CVE-2023-3972 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses