UBUNTU-CVE-2023-32190

Source
https://ubuntu.com/security/CVE-2023-32190
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-32190.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2023-32190
Related
Withdrawn
2025-06-23T15:56:51Z
Published
2024-10-16T12:15:00Z
Modified
2024-10-23T04:39:40Z
Summary
[none]
Details

mlocate's %post script allows RUNUPDATEDBAS user to make arbitrary files world readable by abusing insecure file operations that run with root privileges.

References

Affected packages

Ubuntu:Pro:14.04:LTS / mlocate

Package

Name
mlocate
Purl
pkg:deb/ubuntu/mlocate?arch=src?distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.26-1ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:16.04:LTS / mlocate

Package

Name
mlocate
Purl
pkg:deb/ubuntu/mlocate?arch=src?distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.26-1ubuntu2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:18.04:LTS / mlocate

Package

Name
mlocate
Purl
pkg:deb/ubuntu/mlocate?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.26-2ubuntu1
0.26-2ubuntu2
0.26-2ubuntu3.1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:20.04:LTS / mlocate

Package

Name
mlocate
Purl
pkg:deb/ubuntu/mlocate?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.26-3ubuntu3

Ecosystem specific

{
    "ubuntu_priority": "medium"
}