CVE-2020-8013
Summary
| CVE | CVE-2020-8013 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-03-02 17:15:00 UTC |
| Updated | 2022-12-08 03:09:00 UTC |
| Description | A UNIX Symbolic Link (Symlink) Following vulnerability in chkstat of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 11 set permissions intended for specific binaries on other binaries because it erroneously followed symlinks. The symlinks can't be controlled by attackers on default systems, so exploitation is difficult. This issue affects: SUSE Linux Enterprise Server 12 permissions versions prior to 2015.09.28.1626-17.27.1. SUSE Linux Enterprise Server 15 permissions versions prior to 20181116-9.23.1. SUSE Linux Enterprise Server 11 permissions versions prior to 2013.1.7-0.6.12.1. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [security-announce] openSUSE-SU-2020:0302-1: moderate: Security update f |
SUSE |
lists.opensuse.org |
|
| Bug 1163922 – VUL-0: CVE-2020-8013: permissions: chkstat sets unintended setuid/capabilities for mrsh and wodim |
CONFIRM |
bugzilla.suse.com |
Issue Tracking, Vendor Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 750751 SUSE Enterprise Linux Security Update for permissions (SUSE-SU-2021:2280-1)
- 751472 OpenSUSE Security Update for permissions (openSUSE-SU-2021:1520-1)