The chkstat tool in the permissions package followed symlinks before commit a9e1d26cd49ef9ee0c2060c859321128a6dd4230 (please also check the additional hardenings after this fix). This allowed local attackers with control over a path that is traversed by chkstat to escalate privileges.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00024.html | Third Party Advisory |
https://bugzilla.suse.com/show_bug.cgi?id=1150734 | Issue Tracking Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00024.html | Third Party Advisory |
https://bugzilla.suse.com/show_bug.cgi?id=1150734 | Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 04:42
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 6.8 |
References | () http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00024.html - Third Party Advisory | |
References | () https://bugzilla.suse.com/show_bug.cgi?id=1150734 - Issue Tracking, Third Party Advisory |
Information
Published : 2019-12-05 16:15
Updated : 2024-11-21 04:42
NVD link : CVE-2019-3690
Mitre link : CVE-2019-3690
CVE.ORG link : CVE-2019-3690
JSON object : View
Products Affected
opensuse
- leap
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')