First published: Thu Oct 06 2022(Updated: )
A Incorrect Authorization vulnerability in chkstat of SUSE Linux Enterprise Server 12-SP5; openSUSE Leap 15.3, openSUSE Leap 15.4, openSUSE Leap Micro 5.2 did not consider group writable path components, allowing local attackers with access to a group what can write to a location included in the path to a privileged binary to influence path resolution. This issue affects: SUSE Linux Enterprise Server 12-SP5 permissions versions prior to 20170707. openSUSE Leap 15.3 permissions versions prior to 20200127. openSUSE Leap 15.4 permissions versions prior to 20201225. openSUSE Leap Micro 5.2 permissions versions prior to 20181225.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE Leap | =15.3 | |
openSUSE Leap | =15.4 | |
openSUSE Leap Micro | =5.2 | |
SUSE Linux Enterprise Server | =12-sp5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31252 refers to an Incorrect Authorization vulnerability in chkstat of SUSE Linux Enterprise Server 12-SP5; openSUSE Leap 15.3, openSUSE Leap 15.4, openSUSE Leap Micro 5.2.
The severity of CVE-2022-31252 is medium with a CVSS score of 4.4.
SUSE Linux Enterprise Server 12-SP5, openSUSE Leap 15.3, openSUSE Leap 15.4, and openSUSE Leap Micro 5.2 are affected by CVE-2022-31252.
CVE-2022-31252 allows local attackers with access to a group to write to a location included in the path.
Yes, a fix is available for CVE-2022-31252. Please refer to the official reference for more information.