Bug 2274984 (CVE-2024-32019) - CVE-2024-32019 netdata: privilege escalation and command execution
Summary: CVE-2024-32019 netdata: privilege escalation and command execution
Keywords:
Status: NEW
Alias: CVE-2024-32019
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2274985 2274986
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-04-14 14:22 UTC by ybuenos
Modified: 2024-04-15 21:28 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description ybuenos 2024-04-14 14:22:57 UTC
Netdata is an open source observability tool. In affected versions the `ndsudo` tool shipped with affected versions of the Netdata Agent allows an attacker to run arbitrary programs with root permissions. The `ndsudo` tool is packaged as a `root`-owned executable with the SUID bit set. It only runs a restricted set of external commands, but its search paths are supplied by the `PATH` environment variable. This allows an attacker to control where `ndsudo` looks for these commands, which may be a path the attacker has write access to. This may lead to local privilege escalation. This vulnerability has been addressed in versions 1.45.3 and 1.45.2-169. Users are advised to upgrade. There are no known workarounds for this vulnerability.

https://github.com/netdata/netdata/pull/17377
https://github.com/netdata/netdata/security/advisories/GHSA-pmhq-4cxq-wj93

Comment 1 ybuenos 2024-04-14 14:23:14 UTC
Created netdata tracking bugs for this issue:

Affects: epel-all [bug 2274986]
Affects: fedora-all [bug 2274985]

Comment 2 Didier Fabert (tartare) 2024-04-15 21:28:14 UTC
netdata 1.45.3 has already be pushed for all fedora (38, 39, 40 and rawhide) and epel (epel8 and epel9) repositories, and before this bug report.


Note You need to log in before you can comment on or make changes to this bug.