<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">chkstat-1550_20210901-29.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11165</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">chkstat-1550_20210901-29.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the chkstat-1550_20210901-29.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11165</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:11165</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3687/</URL>
      <Description>SUSE CVE CVE-2019-3687 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3688/</URL>
      <Description>SUSE CVE CVE-2019-3688 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3690/</URL>
      <Description>SUSE CVE CVE-2019-3690 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-8013/</URL>
      <Description>SUSE CVE CVE-2020-8013 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="chkstat-1550_20210901-29.2">
      <FullProductName ProductID="chkstat-1550_20210901-29.2">chkstat-1550_20210901-29.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="permissions-20210901.1550-29.2">
      <FullProductName ProductID="permissions-20210901.1550-29.2">permissions-20210901.1550-29.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="permissions-config-1550_20210901-29.2">
      <FullProductName ProductID="permissions-config-1550_20210901-29.2">permissions-config-1550_20210901-29.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="permissions-zypp-plugin-20210901.1550-29.2">
      <FullProductName ProductID="permissions-zypp-plugin-20210901.1550-29.2">permissions-zypp-plugin-20210901.1550-29.2</FullProductName>
    </Branch>
    <Relationship ProductReference="chkstat-1550_20210901-29.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:chkstat-1550_20210901-29.2">chkstat-1550_20210901-29.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="permissions-20210901.1550-29.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:permissions-20210901.1550-29.2">permissions-20210901.1550-29.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="permissions-config-1550_20210901-29.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:permissions-config-1550_20210901-29.2">permissions-config-1550_20210901-29.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="permissions-zypp-plugin-20210901.1550-29.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:permissions-zypp-plugin-20210901.1550-29.2">permissions-zypp-plugin-20210901.1550-29.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The permission package in SUSE Linux Enterprise Server allowed all local users to run dumpcap in the "easy" permission profile and sniff network traffic. This issue affects: SUSE Linux Enterprise Server permissions versions starting from 85c83fef7e017f8ab7f8602d3163786d57344439 to 081d081dcfaf61710bda34bc21c80c66276119aa.</Note>
    </Notes>
    <CVE>CVE-2019-3687</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:chkstat-1550_20210901-29.2</ProductID>
        <ProductID>openSUSE Tumbleweed:permissions-20210901.1550-29.2</ProductID>
        <ProductID>openSUSE Tumbleweed:permissions-config-1550_20210901-29.2</ProductID>
        <ProductID>openSUSE Tumbleweed:permissions-zypp-plugin-20210901.1550-29.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3687.html</URL>
        <Description>CVE-2019-3687</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148788</URL>
        <Description>SUSE Bug 1148788</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180102</URL>
        <Description>SUSE Bug 1180102</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The /usr/sbin/pinger binary packaged with squid in SUSE Linux Enterprise Server 15 before and including version 4.8-5.8.1 and in SUSE Linux Enterprise Server 12 before and including 3.5.21-26.17.1 had squid:root, 0750 permissions. This allowed an attacker that compromissed the squid user to gain persistence by changing the binary</Note>
    </Notes>
    <CVE>CVE-2019-3688</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:chkstat-1550_20210901-29.2</ProductID>
        <ProductID>openSUSE Tumbleweed:permissions-20210901.1550-29.2</ProductID>
        <ProductID>openSUSE Tumbleweed:permissions-config-1550_20210901-29.2</ProductID>
        <ProductID>openSUSE Tumbleweed:permissions-zypp-plugin-20210901.1550-29.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3688.html</URL>
        <Description>CVE-2019-3688</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093414</URL>
        <Description>SUSE Bug 1093414</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149108</URL>
        <Description>SUSE Bug 1149108</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The chkstat tool in the permissions package followed symlinks before commit a9e1d26cd49ef9ee0c2060c859321128a6dd4230 (please also check the additional hardenings after this fix). This allowed local attackers with control over a path that is traversed by chkstat to escalate privileges.</Note>
    </Notes>
    <CVE>CVE-2019-3690</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:chkstat-1550_20210901-29.2</ProductID>
        <ProductID>openSUSE Tumbleweed:permissions-20210901.1550-29.2</ProductID>
        <ProductID>openSUSE Tumbleweed:permissions-config-1550_20210901-29.2</ProductID>
        <ProductID>openSUSE Tumbleweed:permissions-zypp-plugin-20210901.1550-29.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3690.html</URL>
        <Description>CVE-2019-3690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148336</URL>
        <Description>SUSE Bug 1148336</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1150734</URL>
        <Description>SUSE Bug 1150734</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1157880</URL>
        <Description>SUSE Bug 1157880</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1157883</URL>
        <Description>SUSE Bug 1157883</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160594</URL>
        <Description>SUSE Bug 1160594</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160764</URL>
        <Description>SUSE Bug 1160764</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1163922</URL>
        <Description>SUSE Bug 1163922</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A UNIX Symbolic Link (Symlink) Following vulnerability in chkstat of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 11 set permissions intended for specific binaries on other binaries because it erroneously followed symlinks. The symlinks can't be controlled by attackers on default systems, so exploitation is difficult. This issue affects: SUSE Linux Enterprise Server 12 permissions versions prior to 2015.09.28.1626-17.27.1. SUSE Linux Enterprise Server 15 permissions versions prior to 20181116-9.23.1. SUSE Linux Enterprise Server 11 permissions versions prior to 2013.1.7-0.6.12.1.</Note>
    </Notes>
    <CVE>CVE-2020-8013</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:chkstat-1550_20210901-29.2</ProductID>
        <ProductID>openSUSE Tumbleweed:permissions-20210901.1550-29.2</ProductID>
        <ProductID>openSUSE Tumbleweed:permissions-config-1550_20210901-29.2</ProductID>
        <ProductID>openSUSE Tumbleweed:permissions-zypp-plugin-20210901.1550-29.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-8013.html</URL>
        <Description>CVE-2020-8013</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1163922</URL>
        <Description>SUSE Bug 1163922</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
