CVE-2023-32182
Summary
| CVE | CVE-2023-32182 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-09-19 16:15:00 UTC |
| Updated | 2023-09-25 16:32:00 UTC |
| Description | A Improper Link Resolution Before File Access ('Link Following') vulnerability in SUSE SUSE Linux Enterprise Desktop 15 SP5 postfix, SUSE SUSE Linux Enterprise High Performance Computing 15 SP5 postfix, SUSE openSUSE Leap 15.5 postfix.This issue affects SUSE Linux Enterprise Desktop 15 SP5: before 3.7.3-150500.3.5.1; SUSE Linux Enterprise High Performance Computing 15 SP5: before 3.7.3-150500.3.5.1; openSUSE Leap 15.5 : before 3.7.3-150500.3.5.1. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| 1211196 – (CVE-2023-32182) VUL-0: CVE-2023-32182: postfix: config_postfix SUSE specific script potentially bad /tmp file usage |
MISC |
bugzilla.suse.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 754904 SUSE Enterprise Linux Security Update for postfix (SUSE-SU-2023:3732-1)
- 754928 SUSE Enterprise Linux Security Update for postfix (SUSE-SU-2023:3791-1)
- 755023 SUSE Enterprise Linux Security Update for postfix (SUSE-SU-2023:3945-1)