SB2020072107 - OpenSUSE Linux update for google-compute-engine 



SB2020072107 - OpenSUSE Linux update for google-compute-engine

Published: July 21, 2020

Security Bulletin ID SB2020072107
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Incorrect default permissions (CVE-ID: CVE-2020-8903)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to incorrect default permissions for files and folders that are set by the application. A local user with "roles/compute.osLogin" role can use their membership to the "adm" group and escalate their privileges to root.


2) Incorrect default permissions (CVE-ID: CVE-2020-8907)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to incorrect default permissions for files and folders that are set by the application. A local user with "roles/compute.osLogin" role can use their membership to the "docker" group and escalate their privileges to root.


3) Incorrect default permissions (CVE-ID: CVE-2020-8933)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to incorrect default permissions for files and folders that are set by the application. A local user with "roles/compute.osLogin" role can use their membership to the "lxd" group and escalate their privileges to root.


Remediation

Install update from vendor's website.