U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2019-3695

Change History

CVE Modified by SUSE 3/03/2020 7:15:11 AM

Action Type Old Value New Value
Changed Description
A Improper Control of Generation of Code vulnerability in the packaging of pcp of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Module for Development Tools 15-SP1, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows the user pcp to run code as root by placing it into /var/log/pcp/configs.sh
This issue affects:
SUSE Linux Enterprise High Performance Computing 15-ESPOS
pcp versions prior to 3.11.9-5.8.1.
SUSE Linux Enterprise High Performance Computing 15-LTSS
pcp versions prior to 3.11.9-5.8.1.
SUSE Linux Enterprise Module for Development Tools 15
pcp versions prior to 3.11.9-5.8.1.
SUSE Linux Enterprise Module for Development Tools 15-SP1
pcp versions prior to 4.3.1-3.5.3.
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15
pcp versions prior to 3.11.9-5.8.1.
SUSE Linux Enterprise Server 15-LTSS
pcp versions prior to 3.11.9-5.8.1.
SUSE Linux Enterprise Server for SAP 15
pcp versions prior to 3.11.9-5.8.1.
SUSE Linux Enterprise Software Development Kit 12-SP4
pcp versions prior to 3.11.9-6.14.1.
SUSE Linux Enterprise Software Development Kit 12-SP5
pcp versions prior to 3.11.9-6.14.1.
openSUSE Leap 15.1
pcp versions prior to 4.3.1-lp151.2.3.1.
A Improper Control of Generation of Code vulnerability in the packaging of pcp of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Module for Development Tools 15-SP1, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows the user pcp to run code as root by placing it into /var/log/pcp/configs.sh This issue affects: SUSE Linux Enterprise High Performance Computing 15-ESPOS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise High Performance Computing 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15-SP1 pcp versions prior to 4.3.1-3.5.3. SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server for SAP 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Software Development Kit 12-SP4 pcp versions prior to 3.11.9-6.14.1. SUSE Linux Enterprise Software Development Kit 12-SP5 pcp versions prior to 3.11.9-6.14.1. openSUSE Leap 15.1 pcp versions prior to 4.3.1-lp151.2.3.1.
Added CVSS V3.1

								
							
							
						
SUSE AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Removed CVSS V3.1
[email protected] AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

								
						
Added CWE

								
							
							
						
SUSE CWE-94
Removed CWE
[email protected] CWE-94