Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-RU-2020:0603-1

Опубликовано: 06 мар. 2020
Источник: suse-cvrf

Описание

Recommended update for permissions

This update for permissions fixes the following issues:

  • CVE-2020-8013: Fixed an improper check which could have allowed the setting of unintented setuid bits (bsc#1163922).
  • Fixed handling of relative directory symlinks in chkstat.
  • Whitelisted postgres sticky directories (bsc#1123886).
  • Fixed regression where chkstat broke when /proc was not available (bsc#1160764, bsc#1160594)
  • Fixed capability handling when doing multiple permission changes at once (bsc#1161779)

Список пакетов

Container suse/sles12sp4:latest
permissions-20170707-3.21.1
Image SLES12-SP4-Azure-BYOS
permissions-20170707-3.21.1
Image SLES12-SP4-EC2-HVM-BYOS
permissions-20170707-3.21.1
Image SLES12-SP4-GCE-BYOS
permissions-20170707-3.21.1
Image SLES12-SP4-OCI-BYOS
permissions-20170707-3.21.1
Image SLES12-SP4-SAP-Azure
permissions-20170707-3.21.1
Image SLES12-SP4-SAP-Azure-BYOS
permissions-20170707-3.21.1
Image SLES12-SP4-SAP-Azure-LI-BYOS-Production
permissions-20170707-3.21.1
Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production
permissions-20170707-3.21.1
Image SLES12-SP4-SAP-EC2-HVM
permissions-20170707-3.21.1
Image SLES12-SP4-SAP-EC2-HVM-BYOS
permissions-20170707-3.21.1
Image SLES12-SP4-SAP-GCE
permissions-20170707-3.21.1
Image SLES12-SP4-SAP-GCE-BYOS
permissions-20170707-3.21.1
Image SLES12-SP4-SAP-OCI-BYOS
permissions-20170707-3.21.1
SUSE Linux Enterprise Desktop 12 SP4
permissions-20170707-3.21.1
SUSE Linux Enterprise Server 12 SP4
permissions-20170707-3.21.1
SUSE Linux Enterprise Server 12 SP5
permissions-20170707-3.21.1
SUSE Linux Enterprise Server for SAP Applications 12 SP4
permissions-20170707-3.21.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
permissions-20170707-3.21.1

Описание

A UNIX Symbolic Link (Symlink) Following vulnerability in chkstat of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 11 set permissions intended for specific binaries on other binaries because it erroneously followed symlinks. The symlinks can't be controlled by attackers on default systems, so exploitation is difficult. This issue affects: SUSE Linux Enterprise Server 12 permissions versions prior to 2015.09.28.1626-17.27.1. SUSE Linux Enterprise Server 15 permissions versions prior to 20181116-9.23.1. SUSE Linux Enterprise Server 11 permissions versions prior to 2013.1.7-0.6.12.1.


Затронутые продукты
Container suse/sles12sp4:latest:permissions-20170707-3.21.1
Image SLES12-SP4-Azure-BYOS:permissions-20170707-3.21.1
Image SLES12-SP4-EC2-HVM-BYOS:permissions-20170707-3.21.1
Image SLES12-SP4-GCE-BYOS:permissions-20170707-3.21.1

Ссылки
Уязвимость SUSE-RU-2020:0603-1