{"id":"CVE-2022-41973","details":"multipath-tools 0.7.7 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited in conjunction with CVE-2022-41974. Local users able to access /dev/shm can change symlinks in multipathd due to incorrect symlink handling, which could lead to controlled file writes outside of the /dev/shm directory. This could be used indirectly for local privilege escalation to root.","modified":"2026-04-16T04:40:05.576416369Z","published":"2022-10-29T18:15:12.993Z","related":["ALSA-2023:2459","ALSA-2023:2948","SUSE-SU-2022:3707-1","SUSE-SU-2022:3708-1","SUSE-SU-2022:3709-1","SUSE-SU-2022:3710-1","SUSE-SU-2022:3711-1","openSUSE-SU-2024:12443-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QIGZM5NOOMFDCITOLQEJNNX5SCRQLQVV/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00037.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5366"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202311-06"},{"type":"ADVISORY","url":"https://github.com/opensvc/multipath-tools/releases/tag/0.9.2"},{"type":"REPORT","url":"https://bugzilla.suse.com/show_bug.cgi?id=1202739"},{"type":"EVIDENCE","url":"https://www.qualys.com/2022/10/24/leeloo-multipath/leeloo-multipath.txt"},{"type":"EVIDENCE","url":"http://seclists.org/fulldisclosure/2022/Dec/4"},{"type":"EVIDENCE","url":"http://seclists.org/fulldisclosure/2022/Oct/25"},{"type":"EVIDENCE","url":"http://www.openwall.com/lists/oss-security/2022/10/24/2"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/169611/Leeloo-Multipath-Authorization-Bypass-Symlink-Attack.html"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html"},{"type":"EVIDENCE","url":"http://www.openwall.com/lists/oss-security/2022/11/30/2"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/opensvc/multipath-tools","events":[{"introduced":"386d288b5595fc2c01dffe698b6eb306c6674908"},{"fixed":"66664cdb52f548b821b2ea28e49613c068e9375d"}],"database_specific":{"versions":[{"introduced":"0.7.7"},{"fixed":"0.9.2"}]}}],"versions":["0.7.7","0.7.8","0.7.9","0.8.0","0.8.1","0.8.2","0.8.3","0.8.4","0.8.5","0.8.6","0.8.7","0.8.8","0.8.9","0.9.0","0.9.1"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"36"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-41973.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}