First published: Fri Jan 24 2020(Updated: )
UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of gnump3d in openSUSE Leap 15.1 allows local attackers to escalate from user gnump3d to root. This issue affects: openSUSE Leap 15.1 gnump3d version 3.0-lp151.2.1 and prior versions.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Gnump3d | <=3.0 | |
openSUSE | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3697 has a high severity level as it allows local attackers to escalate privileges from user gnump3d to root.
To fix CVE-2019-3697, upgrade gnump3d to version 3.0-lp151.2.2 or later in openSUSE Leap 15.1.
CVE-2019-3697 affects users of openSUSE Leap 15.1 with gnump3d version 3.0-lp151.2.1 and earlier.
CVE-2019-3697 is a UNIX Symbolic Link (Symlink) Following vulnerability.
No, CVE-2019-3697 can only be exploited by local attackers with access to the affected system.