Lucene search

K
debianDebianDEBIAN:DLA-2918-1:2BFF2
HistoryFeb 11, 2022 - 9:39 p.m.

[SECURITY] [DLA 2918-1] debian-edu-config security update

2022-02-1121:39:27
lists.debian.org
18
debian
debian-edu-config
security update
cve-2021-20001
privilege escalation
php functionality
debian 9
stretch

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.002

Percentile

58.5%


Debian LTS Advisory DLA-2918-1 [email protected]
https://www.debian.org/lts/security/ Utkarsh Gupta
February 12, 2022 https://wiki.debian.org/LTS


Package : debian-edu-config
Version : 1.929+deb9u5
CVE ID : CVE-2021-20001

Marcel Neumann, Robert Altschaffel, Loris Guba and Dustin Hermann
discovered that debian-edu-config, a set of configuration files used
for the Debian Edu blend configured insecure permissions for the user
web shares (~/public_html), which could result in privilege escalation.

If PHP functionality is needed for the user web shares, please refer to
/usr/share/doc/debian-edu-config/README.public_html_with_PHP-CGI+suExec.md

For Debian 9 stretch, this problem has been fixed in version
1.929+deb9u5.

We recommend that you upgrade your debian-edu-config packages.

For the detailed security status of debian-edu-config please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/debian-edu-config

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.002

Percentile

58.5%