Description
A Incorrect Default Permissions vulnerability in the SLES15-SP1-CHOST-BYOS and SLES15-SP1-CAP-Deployment-BYOS images of SUSE Linux Enterprise Server 15 SP1 allows local attackers with the UID 1000 to escalate to root due to a /etc directory owned by the user This issue affects: SUSE Linux Enterprise Server 15 SP1 SLES15-SP1-CAP-Deployment-BYOS version 1.0.1 and prior versions; SLES15-SP1-CHOST-BYOS versions prior to 1.0.3 and prior versions;
Published: 2020-05-04
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-28931 A Incorrect Default Permissions vulnerability in the SLES15-SP1-CHOST-BYOS and SLES15-SP1-CAP-Deployment-BYOS images of SUSE Linux Enterprise Server 15 SP1 allows local attackers with the UID 1000 to escalate to root due to a /etc directory owned by the user This issue affects: SUSE Linux Enterprise Server 15 SP1 SLES15-SP1-CAP-Deployment-BYOS version 1.0.1 and prior versions; SLES15-SP1-CHOST-BYOS versions prior to 1.0.3 and prior versions;
History

No history.

Subscriptions

Suse Linux Enterprise Desktop
cve-icon MITRE

Status: PUBLISHED

Assigner: suse

Published:

Updated: 2024-09-16T20:47:16.896Z

Reserved: 2020-01-27T00:00:00.000Z

Link: CVE-2020-8018

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-05-04T12:15:12.840

Modified: 2024-11-21T05:38:13.693

Link: CVE-2020-8018

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses