First published: Mon Mar 02 2020(Updated: )
A UNIX Symbolic Link (Symlink) Following vulnerability in chkstat of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 11 set permissions intended for specific binaries on other binaries because it erroneously followed symlinks. The symlinks can't be controlled by attackers on default systems, so exploitation is difficult. This issue affects: SUSE Linux Enterprise Server 12 permissions versions prior to 2015.09.28.1626-17.27.1. SUSE Linux Enterprise Server 15 permissions versions prior to 20181116-9.23.1. SUSE Linux Enterprise Server 11 permissions versions prior to 2013.1.7-0.6.12.1.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux Enterprise Server | =11 | |
SUSE Linux Enterprise Server | =12 | |
SUSE Linux Enterprise Server | =15 | |
openSUSE Leap | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8013 is a UNIX Symbolic Link (Symlink) Following vulnerability in chkstat of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 11.
The severity of CVE-2020-8013 is low.
CVE-2020-8013 affects SUSE Linux Enterprise Server versions 11, 12, and 15.
To fix CVE-2020-8013, it is recommended to apply the necessary patches provided by SUSE Linux.
You can find more information about CVE-2020-8013 in the following references: [1] http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00010.html [2] https://bugzilla.suse.com/show_bug.cgi?id=1163922