The apt-cacher-ng package of openSUSE Leap 15.1 runs operations in user owned directory /run/apt-cacher-ng with root privileges. This can allow local attackers to influence the outcome of these operations. This issue affects: openSUSE Leap 15.1 apt-cacher-ng versions prior to 3.1-lp151.3.3.1.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00057.html | Mailing List Vendor Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00065.html | Mailing List Vendor Advisory |
https://bugzilla.suse.com/show_bug.cgi?id=1157703 | Issue Tracking Vendor Advisory |
Configurations
History
08 Nov 2022, 02:52
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:* | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00057.html - Mailing List, Vendor Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00065.html - Mailing List, Vendor Advisory |
Information
Published : 2020-01-23 15:15
Updated : 2024-02-04 20:39
NVD link : CVE-2019-18899
Mitre link : CVE-2019-18899
CVE.ORG link : CVE-2019-18899
JSON object : View
Products Affected
opensuse
- leap
- backports
apt-cacher-ng_project
- apt-cacher-ng
CWE
CWE-269
Improper Privilege Management