A code injection in the supportconfig data collection tool in supportutils in SUSE Linux Enterprise Server 12 and 12-SP1 and SUSE Linux Enterprise Desktop 12 and 12-SP1 could be used by local attackers to execute code as the user running supportconfig (usually root).
[
{
"product": "supportconfig",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "supportconfig"
}
]
}
]