Upstream information

CVE-2020-12050 at MITRE

Description

SQLiteODBC 0.9996, as packaged for certain Linux distributions as 0.9996-4, has a race condition leading to root privilege escalation because any user can replace a /tmp/sqliteodbc$$ file with new contents that cause loading of an arbitrary library.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 6.9
Vector AV:L/AC:M/Au:N/C:C/I:C/A:C
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
CVSS v3 Scores
  National Vulnerability Database
Base Score 7
Vector CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector Local
Attack Complexity High
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
CVSSv3 Version 3.1
SUSE Bugzilla entry: 1171041 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub 15 SP1
  • sqliteodbc >= 0.9996-bp151.4.3.1
  • sqliteodbc-doc >= 0.9996-bp151.4.3.1
Patchnames:
openSUSE-2020-612
openSUSE Leap 15.1
  • sqliteodbc >= 0.9996-lp151.3.3.1
  • sqliteodbc-doc >= 0.9996-lp151.3.3.1
Patchnames:
openSUSE-2020-628
openSUSE Tumbleweed
  • sqliteodbc >= 0.9998-1.7
  • sqliteodbc-doc >= 0.9998-1.7
Patchnames:
openSUSE Tumbleweed GA sqliteodbc-0.9998-1.7


SUSE Timeline for this CVE

CVE page created: Fri May 1 00:56:57 2020
CVE page last modified: Thu Dec 7 13:27:54 2023