CVE Vulnerabilities

CVE-2022-41973

Improper Link Resolution Before File Access ('Link Following')

Published: Oct 29, 2022 | Modified: Nov 25, 2023
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7 MODERATE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM

multipath-tools 0.7.7 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited in conjunction with CVE-2022-41974. Local users able to access /dev/shm can change symlinks in multipathd due to incorrect symlink handling, which could lead to controlled file writes outside of the /dev/shm directory. This could be used indirectly for local privilege escalation to root.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

Name Vendor Start Version End Version
Multipath-tools Opensvc 0.7.7 (including) 0.9.2 (excluding)
Red Hat Enterprise Linux 8 RedHat device-mapper-multipath-0:0.8.4-37.el8 *
Red Hat Enterprise Linux 8.6 Extended Update Support RedHat device-mapper-multipath-0:0.8.4-22.el8_6.5 *
Red Hat Enterprise Linux 9 RedHat device-mapper-multipath-0:0.8.7-20.el9 *
Multipath-tools Ubuntu devel *
Multipath-tools Ubuntu focal *
Multipath-tools Ubuntu jammy *
Multipath-tools Ubuntu kinetic *
Multipath-tools Ubuntu trusty *
Multipath-tools Ubuntu xenial *

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References