First published: Fri Jan 24 2020(Updated: )
The packaging of inn on SUSE Linux Enterprise Server 11; openSUSE Factory, Leap 15.1 allows local attackers to escalate from user inn to root via symlink attacks. This issue affects: SUSE Linux Enterprise Server 11 inn version 2.4.2-170.21.3.1 and prior versions. openSUSE Factory inn version 2.6.2-2.2 and prior versions. openSUSE Leap 15.1 inn version 2.5.4-lp151.2.47 and prior versions.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
Suse Inn | <=2.4.2-170.21.3.1 | |
SUSE Linux Enterprise Server | =11 | |
Suse Inn | <=2.6.2-2.2 | |
openSUSE Factory | ||
Suse Inn | <=2.5.4-lp151.2.47 | |
openSUSE Leap | =15.1 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Leap | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3692 is a vulnerability that allows local attackers to escalate privileges on SUSE Linux Enterprise Server 11 and openSUSE Factory Leap 15.1 through symlink attacks.
The severity of CVE-2019-3692 is high, with a CVSS score of 7.8.
CVE-2019-3692 affects SUSE Linux Enterprise Server 11 inn version 2.4.2-170.21.3.1 and prior versions, as well as openSUSE Factory inn version 2.6.2-2.2 and Suse Inn version 2.5.4-lp151.2.47.
To fix the CVE-2019-3692 vulnerability, it is recommended to update the affected software to a version that includes the necessary security patches.
More information about CVE-2019-3692 can be found in the references provided: http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00027.html, http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00028.html, and https://bugzilla.suse.com/show_bug.cgi?id=1154302.