Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2022-41974
Description:multipath-tools 0.7.0 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited alone or in conjunction with CVE-2022-41973. Local users able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This can lead to local privilege escalation to root. This occurs because an attacker can repeat a keyword, which is mishandled because arithmetic ADD is used instead of bitwise OR.
Test IDs: 1.3.6.1.4.1.25623.1.1.2.2024.2262   1.3.6.1.4.1.25623.1.1.2.2023.2140   1.3.6.1.4.1.25623.1.1.4.2022.3713.1   1.3.6.1.4.1.25623.1.1.2.2023.2420   1.3.6.1.4.1.25623.1.0.884251   1.3.6.1.4.1.25623.1.1.4.2022.3714.1   1.3.6.1.4.1.25623.1.1.4.2022.3712.1   1.3.6.1.4.1.25623.1.1.4.2022.3715.1   1.3.6.1.4.1.25623.1.1.2.2023.1428   1.3.6.1.4.1.25623.1.0.893250   1.3.6.1.4.1.25623.1.1.2.2023.1413  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2022-41974
Debian Security Information: DSA-5366 (Google Search)
https://www.debian.org/security/2023/dsa-5366
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QIGZM5NOOMFDCITOLQEJNNX5SCRQLQVV/
http://seclists.org/fulldisclosure/2022/Oct/25
http://seclists.org/fulldisclosure/2022/Dec/4
https://security.gentoo.org/glsa/202311-06
http://packetstormsecurity.com/files/169611/Leeloo-Multipath-Authorization-Bypass-Symlink-Attack.html
http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html
http://www.openwall.com/lists/oss-security/2022/10/24/2
https://bugzilla.suse.com/show_bug.cgi?id=1202739
https://github.com/opensvc/multipath-tools/releases/tag/0.9.2
https://www.qualys.com/2022/10/24/leeloo-multipath/leeloo-multipath.txt
https://lists.debian.org/debian-lts-announce/2022/12/msg00037.html
http://www.openwall.com/lists/oss-security/2022/11/30/2




© 1998-2025 E-Soft Inc. All rights reserved.