[Bugs] [Bug 13278] New: [CVE 21] multipath-tools 0.8.9 CVEs found

bugzilla bugzilla на rosalinux.ru
Ср Май 3 17:00:51 MSK 2023


https://bugzilla.rosalinux.ru/show_bug.cgi?id=13278

          Platform: 2021.1
            Bug ID: 13278
           Summary: [CVE 21] multipath-tools 0.8.9  CVEs found
    Classification: ROSA-based products
           Product: ROSA Fresh
           Version: All
          Hardware: All
               URL: CVE-2022-41973, CVE-2022-41974,
                OS: Linux
            Status: CONFIRMED
          Severity: normal
          Priority: Normal
         Component: System (kernel, glibc, systemd, bash, PAM...)
          Assignee: bugs на lists.rosalinux.ru
          Reporter: y.tumanov на rosalinux.ru
        QA Contact: bugs на lists.rosalinux.ru
                CC: s.matveev на rosalinux.ru, y.tumanov на rosalinux.ru
  Target Milestone: ---
             Flags: secteam_verified?

Please patch CVEs for package multipath-tools version 0.8.9

INFO (CVEs are): multipath-tools 0.8.9
 cves found
CVE-2022-41973
Desc: multipath-tools 0.7.7 through 0.9.x before 0.9.2 allows local users to
obtain root access, as exploited in conjunction with CVE-2022-41974. Local
users able to access /dev/shm can change symlinks in multipathd due to
incorrect symlink handling, which could lead to controlled file writes outside
of the /dev/shm directory. This could be used indirectly for local privilege
escalation to root.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-41973
Severity: HIGH
CVE-2022-41974
Desc: multipath-tools 0.7.0 through 0.9.x before 0.9.2 allows local users to
obtain root access, as exploited alone or in conjunction with CVE-2022-41973.
Local users able to write to UNIX domain sockets can bypass access controls and
manipulate the multipath setup. This can lead to local privilege escalation to
root. This occurs because an attacker can repeat a keyword, which is mishandled
because arithmetic ADD is used instead of bitwise OR.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-41974
Severity: HIGH

-- 
You are receiving this mail because:
You are the QA Contact for the bug.
You are the assignee for the bug.
----------- следущая часть -----------
Вложение в формате HTML было извлечено…
URL: <http://lists.rosalinux.ru/pipermail/bugs/attachments/20230503/7c443c2e/attachment.html>


Подробная информация о списке рассылки Bugs