Incorrect Default Permissions Affecting libzypp package, versions <17.25.5-2


Severity

Recommended
0.0
low
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.04% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Default Permissions vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN12-LIBZYPP-1551724
  • published2 Mar 2020
  • disclosed24 Jan 2020

Introduced: 24 Jan 2020

CVE-2019-18900  (opens in a new tab)
CWE-276  (opens in a new tab)

How to fix?

Upgrade Debian:12 libzypp to version 17.25.5-2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libzypp package and not the libzypp package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

: Incorrect Default Permissions vulnerability in libzypp of SUSE CaaS Platform 3.0, SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15 allowed local attackers to read a cookie store used by libzypp, exposing private cookies. This issue affects: SUSE CaaS Platform 3.0 libzypp versions prior to 16.21.2-27.68.1. SUSE Linux Enterprise Server 12 libzypp versions prior to 16.21.2-2.45.1. SUSE Linux Enterprise Server 15 17.19.0-3.34.1.

CVSS Base Scores

version 3.1