In the ebuild package through logcheck-1.3.23.ebuild for Logcheck on Gentoo, it is possible to achieve root privilege escalation from the logcheck user because of insecure recursive chown calls.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://bugs.gentoo.org/630752 | issue tracking third party advisory patch exploit |
https://security.gentoo.org/glsa/202209-10 | vendor advisory third party advisory |