syslog-ng: Local privilege escalation from new to root in %post
Key Information
- Vendor
- Suse
- Status
- Suse Linux Enterprise Debuginfo 11-sp3
- Suse Linux Enterprise Debuginfo 11-sp4
- Suse Linux Enterprise Module For Legacy Software 12
- Suse Linux Enterprise Point Of Sale 11-sp3
- Vendor
- CVE Published:
- 29 June 2020
Summary
A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of syslog-ng of SUSE Linux Enterprise Debuginfo 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Module for Legacy Software 12, SUSE Linux Enterprise Point of Sale 11-SP3, SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Linux Enterprise Server for SAP 12-SP1; openSUSE Backports SLE-15-SP1, openSUSE Leap 15.1 allowed local attackers controlling the user news to escalate their privileges to root. This issue affects: SUSE Linux Enterprise Debuginfo 11-SP3 syslog-ng versions prior to 2.0.9-27.34.40.5.1. SUSE Linux Enterprise Debuginfo 11-SP4 syslog-ng versions prior to 2.0.9-27.34.40.5.1. SUSE Linux Enterprise Module for Legacy Software 12 syslog-ng versions prior to 3.6.4-12.8.1. SUSE Linux Enterprise Point of Sale 11-SP3 syslog-ng versions prior to 2.0.9-27.34.40.5.1. SUSE Linux Enterprise Server 11-SP4-LTSS syslog-ng versions prior to 2.0.9-27.34.40.5.1. SUSE Linux Enterprise Server for SAP 12-SP1 syslog-ng versions prior to 3.6.4-12.8.1. openSUSE Backports SLE-15-SP1 syslog-ng versions prior to 3.19.1-bp151.4.6.1. openSUSE Leap 15.1 syslog-ng versions prior to 3.19.1-lp151.3.6.1.
Affected Version(s)
SUSE Linux Enterprise Debuginfo 11-SP3 < 2.0.9-27.34.40.5.1
SUSE Linux Enterprise Debuginfo 11-SP4 < 2.0.9-27.34.40.5.1
SUSE Linux Enterprise Module for Legacy Software 12 < 3.6.4-12.8.1
CVSS V3.1
Timeline
Risk change from: 7.8 to: 7.7 - (HIGH)
Vulnerability published.
Vulnerability Reserved.