First published: Mon Mar 02 2020(Updated: )
A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of salt of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15; openSUSE Factory allows local attackers to escalate privileges from user salt to root. This issue affects: SUSE Linux Enterprise Server 12 salt-master version 2019.2.0-46.83.1 and prior versions. SUSE Linux Enterprise Server 15 salt-master version 2019.2.0-6.21.1 and prior versions. openSUSE Factory salt-master version 2019.2.2-3.1 and prior versions.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux Enterprise Server | =12 | |
SUSE Linux Enterprise Server | =15 | |
openSUSE Leap | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18897 is a UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of salt of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, and openSUSE Factory that allows local attackers to escalate privileges from user salt to root.
CVE-2019-18897 affects SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, and openSUSE Factory.
The severity of CVE-2019-18897 is high with a CVSS score of 7.8.
In CVE-2019-18897, a local attacker can escalate privileges from user salt to root.
To fix CVE-2019-18897, it is recommended to update the affected software to the latest version available.