Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2021-25317: SUSE Linux Security Advisory

Back to Search

SUSE: CVE-2021-25317: SUSE Linux Security Advisory

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:P/A:N)
Published
04/30/2021
Created
05/04/2021
Added
05/01/2021
Modified
10/22/2021

Description

A Incorrect Default Permissions vulnerability in the packaging of cups of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Leap 15.2, Factory allows local attackers with control of the lp users to create files as root with 0644 permissions without the ability to set the content. This issue affects: SUSE Linux Enterprise Server 11-SP4-LTSS cups versions prior to 1.3.9. SUSE Manager Server 4.0 cups versions prior to 2.2.7. SUSE OpenStack Cloud Crowbar 9 cups versions prior to 1.7.5. openSUSE Leap 15.2 cups versions prior to 2.2.7. openSUSE Factory cups version 2.3.3op2-2.1 and prior versions.

Solution(s)

  • suse-upgrade-cups
  • suse-upgrade-cups-client
  • suse-upgrade-cups-config
  • suse-upgrade-cups-ddk
  • suse-upgrade-cups-devel
  • suse-upgrade-cups-devel-32bit
  • suse-upgrade-cups-libs
  • suse-upgrade-cups-libs-32bit
  • suse-upgrade-libcups2
  • suse-upgrade-libcups2-32bit
  • suse-upgrade-libcupscgi1
  • suse-upgrade-libcupscgi1-32bit
  • suse-upgrade-libcupsimage2
  • suse-upgrade-libcupsimage2-32bit
  • suse-upgrade-libcupsmime1
  • suse-upgrade-libcupsmime1-32bit
  • suse-upgrade-libcupsppdc1
  • suse-upgrade-libcupsppdc1-32bit

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;