<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for inn</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2020:1427-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-09-14T18:22:40Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-09-14T18:22:40Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-09-14T18:22:40Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for inn</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for inn fixes the following issues:

- change file owners in /usr/lib/news to root [boo#1172573] [CVE-2020-8026]

This update was imported from the openSUSE:Leap:15.2:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2020-1427</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00038.html</URL>
      <Description>E-Mail link for openSUSE-SU-2020:1427-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172573</URL>
      <Description>SUSE Bug 1172573</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-8026/</URL>
      <Description>SUSE CVE CVE-2020-8026 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 15 SP2">
      <Branch Type="Product Name" Name="SUSE Package Hub 15 SP2">
        <FullProductName ProductID="SUSE Package Hub 15 SP2">SUSE Package Hub 15 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="inn-2.6.2-bp152.2.4.1">
      <FullProductName ProductID="inn-2.6.2-bp152.2.4.1">inn-2.6.2-bp152.2.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="inn-devel-2.6.2-bp152.2.4.1">
      <FullProductName ProductID="inn-devel-2.6.2-bp152.2.4.1">inn-devel-2.6.2-bp152.2.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mininews-2.6.2-bp152.2.4.1">
      <FullProductName ProductID="mininews-2.6.2-bp152.2.4.1">mininews-2.6.2-bp152.2.4.1</FullProductName>
    </Branch>
    <Relationship ProductReference="inn-2.6.2-bp152.2.4.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP2">
      <FullProductName ProductID="SUSE Package Hub 15 SP2:inn-2.6.2-bp152.2.4.1">inn-2.6.2-bp152.2.4.1 as a component of SUSE Package Hub 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="inn-devel-2.6.2-bp152.2.4.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP2">
      <FullProductName ProductID="SUSE Package Hub 15 SP2:inn-devel-2.6.2-bp152.2.4.1">inn-devel-2.6.2-bp152.2.4.1 as a component of SUSE Package Hub 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mininews-2.6.2-bp152.2.4.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP2">
      <FullProductName ProductID="SUSE Package Hub 15 SP2:mininews-2.6.2-bp152.2.4.1">mininews-2.6.2-bp152.2.4.1 as a component of SUSE Package Hub 15 SP2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 allows local attackers with control of the new user to escalate their privileges to root. This issue affects: openSUSE Leap 15.2 inn version 2.6.2-lp152.1.26 and prior versions. openSUSE Tumbleweed inn version 2.6.2-4.2 and prior versions. openSUSE Leap 15.1 inn version 2.5.4-lp151.3.3.1 and prior versions.</Note>
    </Notes>
    <CVE>CVE-2020-8026</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP2:inn-2.6.2-bp152.2.4.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:inn-devel-2.6.2-bp152.2.4.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP2:mininews-2.6.2-bp152.2.4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00038.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-8026.html</URL>
        <Description>CVE-2020-8026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172573</URL>
        <Description>SUSE Bug 1172573</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
