{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-8017","assignerOrgId":"404e59f5-483d-4b8a-8e7a-e67604dd8afb","assignerShortName":"suse","datePublished":"2020-04-02T14:05:18.643Z","dateUpdated":"2024-09-17T01:50:50.369Z","dateReserved":"2020-01-27T00:00:00.000Z"},"containers":{"cna":{"title":"race condition on texlive-filesystem cron job allows for the deletion of unintended files","datePublic":"2020-04-02T00:00:00.000Z","providerMetadata":{"orgId":"404e59f5-483d-4b8a-8e7a-e67604dd8afb","shortName":"suse","dateUpdated":"2022-10-13T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A Race Condition Enabling Link Following vulnerability in the cron job shipped with texlive-filesystem of SUSE Linux Enterprise Module for Desktop Applications 15-SP1, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows local users in group mktex to delete arbitrary files on the system This issue affects: SUSE Linux Enterprise Module for Desktop Applications 15-SP1 texlive-filesystem versions prior to 2017.135-9.5.1. SUSE Linux Enterprise Software Development Kit 12-SP4 texlive-filesystem versions prior to 2013.74-16.5.1. SUSE Linux Enterprise Software Development Kit 12-SP5 texlive-filesystem versions prior to 2013.74-16.5.1. openSUSE Leap 15.1 texlive-filesystem versions prior to 2017.135-lp151.8.3.1."}],"affected":[{"vendor":"SUSE","product":"SUSE Linux Enterprise Module for Desktop Applications 15-SP1","versions":[{"version":"texlive-filesystem","status":"affected","lessThan":"2017.135-9.5.1","versionType":"custom"}]},{"vendor":"SUSE","product":"SUSE Linux Enterprise Software Development Kit 12-SP4","versions":[{"version":"texlive-filesystem","status":"affected","lessThan":"2013.74-16.5.1","versionType":"custom"}]},{"vendor":"SUSE","product":"SUSE Linux Enterprise Software Development Kit 12-SP5","versions":[{"version":"texlive-filesystem","status":"affected","lessThan":"2013.74-16.5.1","versionType":"custom"}]},{"vendor":"openSUSE","product":"openSUSE Leap 15.1","versions":[{"version":"texlive-filesystem","status":"affected","lessThan":"2017.135-lp151.8.3.1","versionType":"custom"}]}],"references":[{"name":"openSUSE-SU-2020:0804","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00021.html"},{"url":"https://bugzilla.suse.com/show_bug.cgi?id=1158910"}],"credits":[{"lang":"en","value":"Matthias Gerstner of SUSE"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":6.2,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition","cweId":"CWE-367"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"advisory":"https://bugzilla.suse.com/show_bug.cgi?id=1158910","defect":["1158910"],"discovery":"INTERNAL"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T09:48:24.833Z"},"title":"CVE Program Container","references":[{"name":"openSUSE-SU-2020:0804","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00021.html"},{"url":"https://bugzilla.suse.com/show_bug.cgi?id=1158910","tags":["x_transferred"]}]}]}}