{"id":"CVE-2019-3690","details":"The chkstat tool in the permissions package followed symlinks before commit a9e1d26cd49ef9ee0c2060c859321128a6dd4230 (please also check the additional hardenings after this fix). This allowed local attackers with control over a path that is traversed by chkstat to escalate privileges.","modified":"2026-03-14T09:37:09.992547Z","published":"2019-12-05T16:15:11.147Z","related":["SUSE-SU-2019:14237-1","SUSE-SU-2019:3180-1","SUSE-SU-2019:3182-1","SUSE-SU-2019:3183-1","SUSE-SU-2020:1163-1","SUSE-SU-2021:2280-1","openSUSE-SU-2019:2672-1","openSUSE-SU-2024:11165-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00024.html"},{"type":"REPORT","url":"https://bugzilla.suse.com/show_bug.cgi?id=1150734"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-3690.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"15.1"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}