7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for watchman fixes the following issues:
ship README.suse that explains how to use the template systemd units
add user writable bit for systemd service and socket files
properly handle state directory creation in /run/watchman/$USER-state.
The former approach was susceptible to a local privilege escalation
using symlinks (CVE-2022-21944, boo#1194470).
Added hardening to systemd service(s) (boo#1181400). Modified:
removed python2 bindings
enabled python3 bindings as python3-watchman
Changes in 4.8.0:
flush-subscriptions
to synchronize subscriptionscontent.sha1hex
. This field expands to the SHA1 hashperf_logger_command
is enabled in the global configurationdrop
, defer
) options.since
generator behavior when using unix timestamps ratherPatch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
openSUSE Backports SLE-15-SP3:
zypper in -t patch openSUSE-2022-16=1
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
openSUSE Backports SLE | 15-SP3 | aarch64 | - opensuse backports sle | < 15-SP3 (aarch64 i586 ppc64le s390x x86_64): | - openSUSE Backports SLE-15-SP3 (aarch64 i586 ppc64le s390x x86_64):.aarch64.rpm |
openSUSE Backports SLE | 15-SP3 | i586 | - opensuse backports sle | < 15-SP3 (aarch64 i586 ppc64le s390x x86_64): | - openSUSE Backports SLE-15-SP3 (aarch64 i586 ppc64le s390x x86_64):.i586.rpm |
openSUSE Backports SLE | 15-SP3 | ppc64le | - opensuse backports sle | < 15-SP3 (aarch64 i586 ppc64le s390x x86_64): | - openSUSE Backports SLE-15-SP3 (aarch64 i586 ppc64le s390x x86_64):.ppc64le.rpm |
openSUSE Backports SLE | 15-SP3 | s390x | - opensuse backports sle | < 15-SP3 (aarch64 i586 ppc64le s390x x86_64): | - openSUSE Backports SLE-15-SP3 (aarch64 i586 ppc64le s390x x86_64):.s390x.rpm |
openSUSE Backports SLE | 15-SP3 | x86_64 | - opensuse backports sle | < 15-SP3 (aarch64 i586 ppc64le s390x x86_64): | - openSUSE Backports SLE-15-SP3 (aarch64 i586 ppc64le s390x x86_64):.x86_64.rpm |
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C