First published: Fri Jul 24 2020(Updated: )
A Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 allows local attackers with control of the new user to escalate their privileges to root. This issue affects: openSUSE Leap 15.2 inn version 2.6.2-lp152.1.26 and prior versions. openSUSE Tumbleweed inn version 2.6.2-4.2 and prior versions. openSUSE Leap 15.1 inn version 2.5.4-lp151.3.3.1 and prior versions.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Backports SLE | =15.0-sp2 | |
openSUSE Tumbleweed | <=2.6.2-4.2 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8026 is a vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 that allows local attackers with control of the new user to escalate their privileges to root.
CVE-2020-8026 affects openSUSE Leap 15.2 inn version 2.6.2-lp152.1.26 and prior, openSUSE Tumbleweed inn version up to 2.6.2-4.2, openSUSE Leap 15.1.
CVE-2020-8026 has a severity rating of 7.8 (high).
An attacker with control of the new user can exploit CVE-2020-8026 to escalate their privileges to root.
Yes, you can find more information about CVE-2020-8026 at the following references: [Reference 1](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00063.html), [Reference 2](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00064.html), [Reference 3](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00074.html).