First published: Wed Jan 08 2025(Updated: )
Certain Teradata account-handling code through 2024-11-04, used with SUSE Enterprise Linux Server, mismanages groups. Specifically, when there is an operating system move from SUSE Enterprise Linux Server (SLES) 12 Service Pack (SP) 2 or 3 to SLES 15 SP2 on Teradata Database systems, some service/system user accounts, and possibly systems administrator created user accounts, are incorrectly assigned to groups that allow higher system-level privileges than intended for those user accounts. Depending on the usage of these accounts, this may lead to full system compromise.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Teradata Database | <=2024-11-04 | |
SUSE Linux Enterprise Server | >=12 SP2<=15 SP2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52869 has a moderate severity level due to its potential impact on group management during OS migration.
To fix CVE-2024-52869, ensure that you follow the recommended upgrade path and configurations provided by Teradata for the affected versions.
CVE-2024-52869 affects Teradata Database systems running on SUSE Enterprise Linux Server versions transitioning from SLES 12 SP2 or 3 to SLES 15 SP2.
The consequences of CVE-2024-52869 may include mismanagement of user groups, leading to potential permission issues.
As of now, specific patches or updates for CVE-2024-52869 should be checked directly with Teradata for the most accurate information.