### [CVE-2024-22029](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22029) ![](https://img.shields.io/static/v1?label=Product&message=Container%20suse%2Fmanager%2F5.0%2Fx86_64%2Fserver%3A5.0.0-beta1.2.122&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SUSE%20Enterprise%20Storage%207.1&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP6&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2015%20SP5&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2015%20SP6&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SUSE%20Linux%20Enterprise%20Server%2015%20SP5&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SUSE%20Linux%20Enterprise%20Server%2015%20SP6&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP6&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SUSE%20Manager%20Server%204.3&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=openSUSE%20Leap%2015.5&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=openSUSE%20Tumbleweed&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3F%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource&color=brightgreen) ### Description Insecure permissions in the packaging of tomcat allow local users that win a race during package installation to escalate to root ### POC #### Reference - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2024-22029 #### Github No PoCs found on GitHub currently.