First published: Tue Feb 07 2023(Updated: )
A Incorrect Default Permissions vulnerability in rmt-server-regsharing service of SUSE Linux Enterprise Server for SAP 15, SUSE Linux Enterprise Server for SAP 15-SP1, SUSE Manager Server 4.1; openSUSE Leap 15.3, openSUSE Leap 15.4 allows local attackers with access to the _rmt user to escalate to root. This issue affects: SUSE Linux Enterprise Server for SAP 15 rmt-server versions prior to 2.10. SUSE Linux Enterprise Server for SAP 15-SP1 rmt-server versions prior to 2.10. SUSE Manager Server 4.1 rmt-server versions prior to 2.10. openSUSE Leap 15.3 rmt-server versions prior to 2.10. openSUSE Leap 15.4 rmt-server versions prior to 2.10.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
Opensuse Rmt-server | <2.10 | |
SUSE Manager Server | =4.1 | |
openSUSE Leap | =15.3 | |
openSUSE Leap | =15.4 | |
SUSE Linux Enterprise Server | =15 | |
SUSE Linux Enterprise Server | =15-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31254 is an Incorrect Default Permissions vulnerability in the rmt-server-regsharing service of SUSE Linux Enterprise Server for SAP 15, SUSE Linux Enterprise Server for SAP 15-SP1, SUSE Manager Server 4.1; openSUSE Leap 15.3, openSUSE Leap 15.4 that allows local attackers with access to the _rmt user to escalate privileges.
CVE-2022-31254 has a severity rating of 7.8 (high).
CVE-2022-31254 affects the following software versions: SUSE Linux Enterprise Server for SAP 15, SUSE Linux Enterprise Server for SAP 15-SP1, SUSE Manager Server 4.1; openSUSE Leap 15.3, openSUSE Leap 15.4.
A local attacker with access to the _rmt user can exploit CVE-2022-31254 to escalate privileges.
It is recommended to apply the latest patches and updates provided by the vendor to fix CVE-2022-31254.