clone-master-clean-up: dangerous file system operations
CVE-2021-32000
3.2LOW
Key Information
- Vendor
- Suse
- Status
- Suse Linux Enterprise Server 12 Sp3
- Suse Linux Enterprise Server 15 Sp1
- Factory
- Vendor
- CVE Published:
- 28 July 2021
Summary
A UNIX Symbolic Link (Symlink) Following vulnerability in the clone-master-clean-up.sh script of clone-master-clean-up in SUSE Linux Enterprise Server 12 SP3, SUSE Linux Enterprise Server 15 SP1; openSUSE Factory allows local attackers to delete arbitrary files. This issue affects: SUSE Linux Enterprise Server 12 SP3 clone-master-clean-up version 1.6-4.6.1 and prior versions. SUSE Linux Enterprise Server 15 SP1 clone-master-clean-up version 1.6-3.9.1 and prior versions. openSUSE Factory clone-master-clean-up version 1.6-1.4 and prior versions.
Affected Version(s)
SUSE Linux Enterprise Server 12 SP3 <= 1.6-4.6.1
SUSE Linux Enterprise Server 15 SP1 <= 1.6-3.9.1
Factory <= 1.6-1.4
CVSS V3.1
Score:
3.2
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
Low
Attack Vector:
Physical
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Risk change from: 7.1 to: 3.2 - (LOW)
Vulnerability published.
Vulnerability Reserved.
Collectors
NVD DatabaseMitre Database
Credit
Matthias Gerstner of SUSE