A UNIX Symbolic Link (Symlink) Following vulnerability in chkstat of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 11 set permissions intended for specific binaries on other binaries because it erroneously followed symlinks. The symlinks can't be controlled by attackers on default systems, so exploitation is difficult. This issue affects: SUSE Linux Enterprise Server 12 permissions versions prior to 2015.09.28.1626-17.27.1. SUSE Linux Enterprise Server 15 permissions versions prior to 20181116-9.23.1. SUSE Linux Enterprise Server 11 permissions versions prior to 2013.1.7-0.6.12.1.
References
Link | Resource |
---|---|
https://bugzilla.suse.com/show_bug.cgi?id=1163922 | Issue Tracking Vendor Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00010.html | Mailing List Vendor Advisory |
Information
Published : 2020-03-02 09:15
Updated : 2022-12-07 19:09
NVD link : CVE-2020-8013
Mitre link : CVE-2020-8013
JSON object : View
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
Products Affected
suse
- linux_enterprise_server
opensuse
- leap