Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2021:2280-1

Опубликовано: 09 июл. 2021
Источник: suse-cvrf

Описание

Security update for permissions

This update for permissions fixes the following issues:

  • Fork package for 12-SP5 (bsc#1155939)
  • make btmp root:utmp (bsc#1050467, bsc#1182899)
  • pcp: remove no longer needed / conflicting entries (bsc#1171883). Fixes a potential security issue.
  • do not follow symlinks that are the final path element (CVE-2020-8013, bsc#1163922)
  • fix handling of relative directory symlinks in chkstat
  • whitelist postgres sticky directories (bsc#1123886)
  • fix regression where chkstat breaks without /proc available (bsc#1160764, bsc#1160594)
  • fix capability handling when doing multiple permission changes at once (bsc#1161779,
  • fix invalid free() when permfiles points to argv (bsc#1157198)
  • the eror should be reported for permfiles[i], not argv[i], as these are not the same files. (bsc#1047247, bsc#1097665)
  • fix /usr/sbin/pinger ownership to root:squid (bsc#1093414, CVE-2019-3688)
  • fix privilege escalation through untrusted symlinks (bsc#1150734, CVE-2019-3690)

Список пакетов

Container suse/ltss/sle12.5/sles12sp5:latest
permissions-20170707-6.4.1
Container suse/sles12sp5:latest
permissions-20170707-6.4.1
Image SLES12-SP5-Azure-BYOS
permissions-20170707-6.4.1
Image SLES12-SP5-Azure-Basic-On-Demand
permissions-20170707-6.4.1
Image SLES12-SP5-Azure-HPC-BYOS
permissions-20170707-6.4.1
Image SLES12-SP5-Azure-HPC-On-Demand
permissions-20170707-6.4.1
Image SLES12-SP5-Azure-SAP-BYOS
permissions-20170707-6.4.1
Image SLES12-SP5-Azure-SAP-On-Demand
permissions-20170707-6.4.1
Image SLES12-SP5-Azure-Standard-On-Demand
permissions-20170707-6.4.1
Image SLES12-SP5-EC2-BYOS
permissions-20170707-6.4.1
Image SLES12-SP5-EC2-ECS-On-Demand
permissions-20170707-6.4.1
Image SLES12-SP5-EC2-On-Demand
permissions-20170707-6.4.1
Image SLES12-SP5-EC2-SAP-BYOS
permissions-20170707-6.4.1
Image SLES12-SP5-EC2-SAP-On-Demand
permissions-20170707-6.4.1
Image SLES12-SP5-GCE-BYOS
permissions-20170707-6.4.1
Image SLES12-SP5-GCE-On-Demand
permissions-20170707-6.4.1
Image SLES12-SP5-GCE-SAP-BYOS
permissions-20170707-6.4.1
Image SLES12-SP5-GCE-SAP-On-Demand
permissions-20170707-6.4.1
Image SLES12-SP5-OCI-BYOS-BYOS
permissions-20170707-6.4.1
Image SLES12-SP5-OCI-BYOS-SAP-BYOS
permissions-20170707-6.4.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
permissions-20170707-6.4.1
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production
permissions-20170707-6.4.1
SUSE Linux Enterprise Server 12 SP5
permissions-20170707-6.4.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
permissions-20170707-6.4.1

Описание

The /usr/sbin/pinger binary packaged with squid in SUSE Linux Enterprise Server 15 before and including version 4.8-5.8.1 and in SUSE Linux Enterprise Server 12 before and including 3.5.21-26.17.1 had squid:root, 0750 permissions. This allowed an attacker that compromissed the squid user to gain persistence by changing the binary


Затронутые продукты
Container suse/ltss/sle12.5/sles12sp5:latest:permissions-20170707-6.4.1
Container suse/sles12sp5:latest:permissions-20170707-6.4.1
Image SLES12-SP5-Azure-BYOS:permissions-20170707-6.4.1
Image SLES12-SP5-Azure-Basic-On-Demand:permissions-20170707-6.4.1

Ссылки

Описание

The chkstat tool in the permissions package followed symlinks before commit a9e1d26cd49ef9ee0c2060c859321128a6dd4230 (please also check the additional hardenings after this fix). This allowed local attackers with control over a path that is traversed by chkstat to escalate privileges.


Затронутые продукты
Container suse/ltss/sle12.5/sles12sp5:latest:permissions-20170707-6.4.1
Container suse/sles12sp5:latest:permissions-20170707-6.4.1
Image SLES12-SP5-Azure-BYOS:permissions-20170707-6.4.1
Image SLES12-SP5-Azure-Basic-On-Demand:permissions-20170707-6.4.1

Ссылки

Описание

A UNIX Symbolic Link (Symlink) Following vulnerability in chkstat of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 11 set permissions intended for specific binaries on other binaries because it erroneously followed symlinks. The symlinks can't be controlled by attackers on default systems, so exploitation is difficult. This issue affects: SUSE Linux Enterprise Server 12 permissions versions prior to 2015.09.28.1626-17.27.1. SUSE Linux Enterprise Server 15 permissions versions prior to 20181116-9.23.1. SUSE Linux Enterprise Server 11 permissions versions prior to 2013.1.7-0.6.12.1.


Затронутые продукты
Container suse/ltss/sle12.5/sles12sp5:latest:permissions-20170707-6.4.1
Container suse/sles12sp5:latest:permissions-20170707-6.4.1
Image SLES12-SP5-Azure-BYOS:permissions-20170707-6.4.1
Image SLES12-SP5-Azure-Basic-On-Demand:permissions-20170707-6.4.1

Ссылки
Уязвимость SUSE-SU-2021:2280-1