
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability CVE-2022-31252 affects the permissions package in SUSE Linux Enterprise Server and openSUSE Leap systems. The issue specifically involves the chkstat component not properly checking for group-writable parent directories or target files in the safeOpen() function. This vulnerability was discovered in September 2022 and affects multiple versions of the permissions package, including SUSE Linux Enterprise Server 12-SP5 and openSUSE Leap 15.3 (SUSE Bugzilla).
The vulnerability is classified under CWE-863 (Incorrect Authorization) and involves a security flaw in the chkstat's safeopen() implementation. The core issue lies in the missing group-write checks in the algorithm, which could potentially allow unauthorized modifications to sensitive files. The vulnerability received a CVSS v3.1 score of 6.7, indicating moderate severity ([SUSE Bugzilla](https://bugzilla.suse.com/showbug.cgi?id=1203018)).
The primary impact of this vulnerability is that setuid-root bits or capabilities could potentially be assigned to untrusted binaries. While such configurations are rare in SUSE distributions, it represents a formal security vulnerability that could lead to privilege escalation (SUSE Bugzilla).
The issue has been addressed through security updates across multiple SUSE products. Fixed versions were released for SUSE Linux Enterprise Server 12-SP5 (permissions-20170707-6.10.1), openSUSE Leap 15.3, and other affected systems. Users are advised to update their systems to the patched versions (SUSE Bugzilla).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."