CVE-2022-41973
Publication date 24 October 2022
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
multipath-tools 0.7.7 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited in conjunction with CVE-2022-41974. Local users able to access /dev/shm can change symlinks in multipathd due to incorrect symlink handling, which could lead to controlled file writes outside of the /dev/shm directory. This could be used indirectly for local privilege escalation to root.
Status
Package | Ubuntu Release | Status |
---|---|---|
multipath-tools | ||
22.04 LTS jammy |
Fixed 0.8.8-1ubuntu1.22.04.1
|
|
20.04 LTS focal |
Fixed 0.8.3-1ubuntu2.1
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
Notes
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 · High |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-5731-1
- multipath-tools vulnerabilities
- 17 November 2022