7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.3 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:S/C:P/I:P/A:P
0.0005 Low
EPSS
Percentile
14.4%
multipath-tools is vulnerable to Privilege Escalation. The vulnerability exists due to incorrect symlink handling which allows an attacker to do file writes outside of the /dev/shm directory.
git://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2022-41973
packetstormsecurity.com/files/169611/Leeloo-Multipath-Authorization-Bypass-Symlink-Attack.html
packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html
seclists.org/fulldisclosure/2022/Dec/4
seclists.org/fulldisclosure/2022/Oct/25
www.openwall.com/lists/oss-security/2022/10/24/2
www.openwall.com/lists/oss-security/2022/11/30/2
bugzilla.suse.com/show_bug.cgi?id=1202739
github.com/opensvc/multipath-tools/releases/tag/0.9.2
lists.debian.org/debian-lts-announce/2022/12/msg00037.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QIGZM5NOOMFDCITOLQEJNNX5SCRQLQVV/
lists.fedoraproject.org/archives/list/[email protected]/message/QIGZM5NOOMFDCITOLQEJNNX5SCRQLQVV/
www.debian.org/security/2023/dsa-5366
www.qualys.com/2022/10/24/leeloo-multipath/leeloo-multipath.txt
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.3 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:S/C:P/I:P/A:P
0.0005 Low
EPSS
Percentile
14.4%