{"affected":[{"ecosystem_specific":{"binaries":[{"permissions":"20180125-3.18.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15","name":"permissions","purl":"pkg:rpm/suse/permissions&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"20180125-3.18.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for permissions fixes the following issues:\n\t  \n- CVE-2019-3688: Changed wrong ownership in /usr/sbin/pinger to root:squid\n  which could have allowed a squid user to gain persistence by changing the \n  binary (bsc#1093414).\n- CVE-2019-3690: Fixed a privilege escalation through untrusted symbolic \n  links (bsc#1150734).\n- Fixed a regression which caused sagmentation fault (bsc#1157198).\n","id":"SUSE-SU-2019:3182-1","modified":"2019-12-05T10:43:17Z","published":"2019-12-05T10:43:17Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2019/suse-su-20193182-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1093414"},{"type":"REPORT","url":"https://bugzilla.suse.com/1150734"},{"type":"REPORT","url":"https://bugzilla.suse.com/1157198"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-3688"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-3690"}],"related":["CVE-2019-3688","CVE-2019-3690"],"summary":"Security update for permissions","upstream":["CVE-2019-3688","CVE-2019-3690"]}