Описание
ELSA-2022-8453: device-mapper-multipath security update (IMPORTANT)
[0.8.7-12.1]
- Add 0062-multipathd-ignore-duplicated-multipathd-command-keys.patch
- Resolves: bz #2133998
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
device-mapper-multipath
0.8.7-12.el9_1.1
device-mapper-multipath-devel
0.8.7-12.el9_1.1
device-mapper-multipath-libs
0.8.7-12.el9_1.1
kpartx
0.8.7-12.el9_1.1
Oracle Linux x86_64
device-mapper-multipath
0.8.7-12.el9_1.1
device-mapper-multipath-devel
0.8.7-12.el9_1.1
device-mapper-multipath-libs
0.8.7-12.el9_1.1
kpartx
0.8.7-12.el9_1.1
Связанные CVE
Связанные уязвимости
A vulnerability was found in the device-mapper-multipath. The device-mapper-multipath allows local users to obtain root access, exploited alone or in conjunction with CVE-2022-41973. Local users that are able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This issue occurs because an attacker can repeat a keyword, which is mishandled when arithmetic ADD is used instead of bitwise OR. This could lead to local privilege escalation to root.
A vulnerability was found in the device-mapper-multipath. The device-mapper-multipath allows local users to obtain root access, exploited alone or in conjunction with CVE-2022-41973. Local users that are able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This issue occurs because an attacker can repeat a keyword, which is mishandled when arithmetic ADD is used instead of bitwise OR. This could lead to local privilege escalation to root.
A vulnerability was found in the device-mapper-multipath. The device-mapper-multipath allows local users to obtain root access, exploited alone or in conjunction with CVE-2022-41973. Local users that are able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This issue occurs because an attacker can repeat a keyword, which is mishandled when arithmetic ADD is used instead of bitwise OR. This could lead to local privilege escalation to root.