Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2019-3695: SUSE Linux Security Advisory

Back to Search

SUSE: CVE-2019-3695: SUSE Linux Security Advisory

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
02/07/2020
Created
02/11/2020
Added
02/08/2020
Modified
10/22/2021

Description

A Improper Control of Generation of Code vulnerability in the packaging of pcp of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Module for Development Tools 15-SP1, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows the user pcp to run code as root by placing it into /var/log/pcp/configs.sh This issue affects: SUSE Linux Enterprise High Performance Computing 15-ESPOS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise High Performance Computing 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15-SP1 pcp versions prior to 4.3.1-3.5.3. SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server for SAP 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Software Development Kit 12-SP4 pcp versions prior to 3.11.9-6.14.1. SUSE Linux Enterprise Software Development Kit 12-SP5 pcp versions prior to 3.11.9-6.14.1. openSUSE Leap 15.1 pcp versions prior to 4.3.1-lp151.2.3.1.

Solution(s)

  • suse-upgrade-libpcp-devel
  • suse-upgrade-libpcp3
  • suse-upgrade-libpcp_gui2
  • suse-upgrade-libpcp_import1
  • suse-upgrade-libpcp_mmv1
  • suse-upgrade-libpcp_trace2
  • suse-upgrade-libpcp_web1
  • suse-upgrade-pcp
  • suse-upgrade-pcp-conf
  • suse-upgrade-pcp-devel
  • suse-upgrade-pcp-doc
  • suse-upgrade-pcp-export-pcp2elasticsearch
  • suse-upgrade-pcp-export-pcp2graphite
  • suse-upgrade-pcp-export-pcp2influxdb
  • suse-upgrade-pcp-export-pcp2json
  • suse-upgrade-pcp-export-pcp2spark
  • suse-upgrade-pcp-export-pcp2xml
  • suse-upgrade-pcp-export-pcp2zabbix
  • suse-upgrade-pcp-export-zabbix-agent
  • suse-upgrade-pcp-gui
  • suse-upgrade-pcp-import-collectl2pcp
  • suse-upgrade-pcp-import-ganglia2pcp
  • suse-upgrade-pcp-import-iostat2pcp
  • suse-upgrade-pcp-import-mrtg2pcp
  • suse-upgrade-pcp-import-sar2pcp
  • suse-upgrade-pcp-manager
  • suse-upgrade-pcp-pmda-activemq
  • suse-upgrade-pcp-pmda-apache
  • suse-upgrade-pcp-pmda-bash
  • suse-upgrade-pcp-pmda-bind2
  • suse-upgrade-pcp-pmda-bonding
  • suse-upgrade-pcp-pmda-cifs
  • suse-upgrade-pcp-pmda-cisco
  • suse-upgrade-pcp-pmda-dbping
  • suse-upgrade-pcp-pmda-dm
  • suse-upgrade-pcp-pmda-docker
  • suse-upgrade-pcp-pmda-ds389
  • suse-upgrade-pcp-pmda-ds389log
  • suse-upgrade-pcp-pmda-elasticsearch
  • suse-upgrade-pcp-pmda-gfs2
  • suse-upgrade-pcp-pmda-gluster
  • suse-upgrade-pcp-pmda-gpfs
  • suse-upgrade-pcp-pmda-gpsd
  • suse-upgrade-pcp-pmda-haproxy
  • suse-upgrade-pcp-pmda-infiniband
  • suse-upgrade-pcp-pmda-json
  • suse-upgrade-pcp-pmda-kvm
  • suse-upgrade-pcp-pmda-libvirt
  • suse-upgrade-pcp-pmda-lio
  • suse-upgrade-pcp-pmda-lmsensors
  • suse-upgrade-pcp-pmda-logger
  • suse-upgrade-pcp-pmda-lustre
  • suse-upgrade-pcp-pmda-lustrecomm
  • suse-upgrade-pcp-pmda-mailq
  • suse-upgrade-pcp-pmda-memcache
  • suse-upgrade-pcp-pmda-mic
  • suse-upgrade-pcp-pmda-mounts
  • suse-upgrade-pcp-pmda-mysql
  • suse-upgrade-pcp-pmda-named
  • suse-upgrade-pcp-pmda-netfilter
  • suse-upgrade-pcp-pmda-news
  • suse-upgrade-pcp-pmda-nfsclient
  • suse-upgrade-pcp-pmda-nginx
  • suse-upgrade-pcp-pmda-nutcracker
  • suse-upgrade-pcp-pmda-nvidia-gpu
  • suse-upgrade-pcp-pmda-oracle
  • suse-upgrade-pcp-pmda-papi
  • suse-upgrade-pcp-pmda-pdns
  • suse-upgrade-pcp-pmda-perfevent
  • suse-upgrade-pcp-pmda-postfix
  • suse-upgrade-pcp-pmda-prometheus
  • suse-upgrade-pcp-pmda-redis
  • suse-upgrade-pcp-pmda-roomtemp
  • suse-upgrade-pcp-pmda-rpm
  • suse-upgrade-pcp-pmda-rsyslog
  • suse-upgrade-pcp-pmda-samba
  • suse-upgrade-pcp-pmda-sendmail
  • suse-upgrade-pcp-pmda-shping
  • suse-upgrade-pcp-pmda-slurm
  • suse-upgrade-pcp-pmda-smart
  • suse-upgrade-pcp-pmda-snmp
  • suse-upgrade-pcp-pmda-summary
  • suse-upgrade-pcp-pmda-systemd
  • suse-upgrade-pcp-pmda-trace
  • suse-upgrade-pcp-pmda-unbound
  • suse-upgrade-pcp-pmda-vmware
  • suse-upgrade-pcp-pmda-weblog
  • suse-upgrade-pcp-pmda-zimbra
  • suse-upgrade-pcp-pmda-zswap
  • suse-upgrade-pcp-system-tools
  • suse-upgrade-pcp-testsuite
  • suse-upgrade-pcp-webapi
  • suse-upgrade-pcp-zeroconf
  • suse-upgrade-perl-pcp-logimport
  • suse-upgrade-perl-pcp-logsummary
  • suse-upgrade-perl-pcp-mmv
  • suse-upgrade-perl-pcp-pmda
  • suse-upgrade-python-pcp
  • suse-upgrade-python3-pcp

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;