{"id":"UBUNTU-CVE-2022-3560","details":"A flaw was found in pesign. The pesign package provides a systemd service used to start the pesign daemon. This service unit runs a script to set ACLs for /etc/pki/pesign and /run/pesign directories to grant access privileges to users in the 'pesign' group. However, the script doesn't check for symbolic links. This could allow an attacker to gain access to privileged files and directories via a path traversal attack.","modified":"2026-01-20T17:53:10.670826Z","published":"2023-02-02T21:22:00Z","upstream":["CVE-2022-3560"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3560"},{"type":"REPORT","url":"https://www.openwall.com/lists/oss-security/2023/01/31/6"},{"type":"REPORT","url":"https://github.com/rhboot/pesign/commit/d8a8c259994d0278c59b30b41758a8dd0abff998"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2022-3560"}],"affected":[{"package":{"name":"pesign","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/pesign@0.110-2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.110-2"],"ecosystem_specific":{"binaries":[{"binary_version":"0.110-2","binary_name":"pesign"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-3560.json"}},{"package":{"name":"pesign","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/pesign@0.112-4?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.112-4"],"ecosystem_specific":{"binaries":[{"binary_version":"0.112-4","binary_name":"pesign"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-3560.json"}},{"package":{"name":"pesign","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/pesign@0.112-5?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.112-5"],"ecosystem_specific":{"binaries":[{"binary_version":"0.112-5","binary_name":"pesign"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-3560.json"}},{"package":{"name":"pesign","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/pesign@0.112-6?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.112-6"],"ecosystem_specific":{"binaries":[{"binary_version":"0.112-6","binary_name":"pesign"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-3560.json"}},{"package":{"name":"pesign","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/pesign@116-7?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.112-6","116-6","116-7"],"ecosystem_specific":{"binaries":[{"binary_version":"116-7","binary_name":"pesign"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-3560.json"}},{"package":{"name":"pesign","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/pesign@116-8.1?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["116-8","116-8.1"],"ecosystem_specific":{"binaries":[{"binary_version":"116-8.1","binary_name":"pesign"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-3560.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]}