CVE-2020-8013

permissions: chkstat sets unintended setuid/capabilities for mrsh and wodim

Description

A UNIX Symbolic Link (Symlink) Following vulnerability in chkstat of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 11 set permissions intended for specific binaries on other binaries because it erroneously followed symlinks. The symlinks can't be controlled by attackers on default systems, so exploitation is difficult. This issue affects: SUSE Linux Enterprise Server 12 permissions versions prior to 2015.09.28.1626-17.27.1. SUSE Linux Enterprise Server 15 permissions versions prior to 20181116-9.23.1. SUSE Linux Enterprise Server 11 permissions versions prior to 2013.1.7-0.6.12.1.

Category

2.2
CVSS
Severity: Low
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.06%
Vendor Advisory opensuse.org Vendor Advisory suse.com
Affected: SUSE SUSE Linux Enterprise Server 12
Affected: SUSE SUSE Linux Enterprise Server 15
Affected: SUSE SUSE Linux Enterprise Server 11
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2020-8013?
CVE-2020-8013 has been scored as a low severity vulnerability.
How to fix CVE-2020-8013?
To fix CVE-2020-8013, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2020-8013 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2020-8013 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2020-8013?
CVE-2020-8013 affects SUSE SUSE Linux Enterprise Server 12, SUSE SUSE Linux Enterprise Server 15, SUSE SUSE Linux Enterprise Server 11.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.