CVE Vulnerabilities

CVE-2020-8025

Incorrect Execution-Assigned Permissions

Published: Aug 07, 2020 | Modified: Aug 12, 2020
CVSS 3.x
9.3
CRITICAL
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CVSS 2.x
4.6 MEDIUM
AV:L/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

A Incorrect Execution-Assigned Permissions vulnerability in the permissions package of SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15; openSUSE Leap 15.1, openSUSE Tumbleweed sets the permissions for some of the directories of the pcp package to unintended settings. This issue affects: SUSE Linux Enterprise Server 12-SP4 permissions versions prior to 20170707-3.24.1. SUSE Linux Enterprise Server 15-LTSS permissions versions prior to 20180125-3.27.1. SUSE Linux Enterprise Server for SAP 15 permissions versions prior to 20180125-3.27.1. openSUSE Leap 15.1 permissions versions prior to 20181116-lp151.4.24.1. openSUSE Tumbleweed permissions versions prior to 20200624.

Weakness

While it is executing, the product sets the permissions of an object in a way that violates the intended permissions that have been specified by the user.

Affected Software

Name Vendor Start Version End Version
Linux_enterprise_high_performance_computing Suse 15 (including) 15 (including)
Linux_enterprise_server Suse 15 (including) 15 (including)
Linux_enterprise_server Suse 15-sp1 (including) 15-sp1 (including)
Linux_enterprise_server Suse 15-sp2 (including) 15-sp2 (including)
Linux_enterprise_software_development_kit Suse 12-sp4 (including) 12-sp4 (including)
Linux_enterprise_software_development_kit Suse 12-sp5 (including) 12-sp5 (including)

Potential Mitigations

  • Compartmentalize the system to have “safe” areas where trust boundaries can be unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary and always be careful when interfacing with a compartment outside of the safe area.
  • Ensure that appropriate compartmentalization is built into the system design, and the compartmentalization allows for and reinforces privilege separation functionality. Architects and designers should rely on the principle of least privilege to decide the appropriate time to use privileges and the time to drop privileges.

References