UBUNTU-CVE-2024-32019

Source
https://ubuntu.com/security/CVE-2024-32019
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-32019.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2024-32019
Related
Withdrawn
2025-06-23T15:58:13Z
Published
2024-04-12T21:15:00Z
Modified
2026-02-04T02:57:17.059292Z
Summary
[none]
Details

Netdata is an open source observability tool. In affected versions the ndsudo tool shipped with affected versions of the Netdata Agent allows an attacker to run arbitrary programs with root permissions. The ndsudo tool is packaged as a root-owned executable with the SUID bit set. It only runs a restricted set of external commands, but its search paths are supplied by the PATH environment variable. This allows an attacker to control where ndsudo looks for these commands, which may be a path the attacker has write access to. This may lead to local privilege escalation. This vulnerability has been addressed in versions 1.45.3 and 1.45.2-169. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References

Affected packages

Ubuntu:Pro:18.04:LTS / netdata

Package

Name
netdata
Purl
pkg:deb/ubuntu/netdata@1.9.0+dfsg-1?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.7.0+dfsg-1
1.8.0+dfsg-1
1.9.0+dfsg-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-32019.json"

Ubuntu:20.04:LTS / netdata

Package

Name
netdata
Purl
pkg:deb/ubuntu/netdata@1.19.0-3ubuntu1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.16.1-2
1.19.0-3ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-32019.json"

Ubuntu:22.04:LTS / netdata

Package

Name
netdata
Purl
pkg:deb/ubuntu/netdata@1.33.1-1ubuntu1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.29.3-4
1.31.0-4
1.33.1-1ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-32019.json"

Ubuntu:24.10 / netdata

Package

Name
netdata
Purl
pkg:deb/ubuntu/netdata@1.44.3-2?arch=source&distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.43.2-1build2
1.44.3-2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-32019.json"

Ubuntu:24.04:LTS / netdata

Package

Name
netdata
Purl
pkg:deb/ubuntu/netdata@1.43.2-1build2?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.42.1-1
1.43.1-1
1.43.2-1
1.43.2-1build1
1.43.2-1build2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-32019.json"