Incorrect Default Permissions Affecting goreleaser-1.18 package, versions <1.18.2-r12


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.05% (25th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Default Permissions vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CHAINGUARDLATEST-GORELEASER118-6968913
  • published22 May 2024
  • disclosed30 May 2023

Introduced: 30 May 2023

CVE-2023-32698  (opens in a new tab)
CWE-276  (opens in a new tab)

How to fix?

Upgrade Chainguard goreleaser-1.18 to version 1.18.2-r12 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream goreleaser-1.18 package and not the goreleaser-1.18 package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

nFPM is an alternative to fpm. The file permissions on the checked-in files were not maintained. Hence, when nfpm packaged the files (without extra config for enforcing it’s own permissions) files could go out with bad permissions (chmod 666 or 777). Anyone using nfpm for creating packages without checking/setting file permissions before packaging could result in bad permissions for files/folders.

CVSS Scores

version 3.1