{"affected":[{"ecosystem_specific":{"binaries":[{"permissions":"20170707-3.14.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP4","name":"permissions","purl":"pkg:rpm/suse/permissions&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20170707-3.14.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"permissions":"20170707-3.14.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP4","name":"permissions","purl":"pkg:rpm/suse/permissions&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20170707-3.14.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"permissions":"20170707-3.14.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP4","name":"permissions","purl":"pkg:rpm/suse/permissions&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20170707-3.14.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"permissions":"20170707-3.14.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"permissions","purl":"pkg:rpm/suse/permissions&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20170707-3.14.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"permissions":"20170707-3.14.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"permissions","purl":"pkg:rpm/suse/permissions&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20170707-3.14.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for permissions fixes the following issues:\n\nSecurity issues fixed: \n\n- CVE-2019-3688: Changed wrong ownership in /usr/sbin/pinger to root:squid\n  which could have allowed a squid user to gain persistence by changing the \n  binary (bsc#1093414).\n- CVE-2019-3690: Fixed a privilege escalation through untrusted symbolic \n  links (bsc#1150734).\t  \n\nOther issue addressed: \n\n- Corrected a badly constracted file which could have allowed treating of the\n  shell environment as permissions files (bsc#1097665,bsc#1047247).\n- Fixed a regression which caused sagmentation fault (bsc#1157198). \n","id":"SUSE-SU-2019:3183-1","modified":"2019-12-05T10:43:32Z","published":"2019-12-05T10:43:32Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2019/suse-su-20193183-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1047247"},{"type":"REPORT","url":"https://bugzilla.suse.com/1093414"},{"type":"REPORT","url":"https://bugzilla.suse.com/1097665"},{"type":"REPORT","url":"https://bugzilla.suse.com/1150734"},{"type":"REPORT","url":"https://bugzilla.suse.com/1157198"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-3688"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-3690"}],"related":["CVE-2019-3688","CVE-2019-3690"],"summary":"Security update for permissions","upstream":["CVE-2019-3688","CVE-2019-3690"]}