CVE-2023-31438

SOURCE - nist

Summary

An issue was discovered in systemd 253. An attacker can truncate a sealed log file and then resume log sealing such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent "a reply denying that any of the finding was a security vulnerability."

EPSS Score: 0.00064 (0.274)

Common Weakness Enumeration (CWE)

SOURCE - nist

Improper Validation of Integrity Check Value


debian

CREATED


UPDATED



EXPLOITABILITY SCORE

-


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

N/Alow
PackageTypeOS NameOS VersionAffected RangesFix Versions
debian/systemddebdebian12>=252.22-1~deb12u1Not yet available
debian/systemddebdebianunstable>=256~rc2-3Not yet available
debian/systemddebdebian11>=247.3-7+deb11u4Not yet available
debian/systemddebdebian10>=241-7~deb10u8Not yet available
debian/systemddebdebian13>=255.5-1Not yet available

Severity and metrics

No CVSS data available from this source.

nist

CREATED


UPDATED



EXPLOITABILITY SCORE

3.9


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

5.3medium

ubuntu

CREATED


UPDATED



EXPLOITABILITY SCORE

3.9


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

5.3medium

chainguard

CREATED


UPDATED


SOURCE ID

CVE-2023-31438


EXPLOITABILITY SCORE

-


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)-
RATING UNAVAILABLE FROM SOURCE

wolfi

CREATED


UPDATED


SOURCE ID

CVE-2023-31438


EXPLOITABILITY SCORE

-


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)-
RATING UNAVAILABLE FROM SOURCE