Qualys Security Advisory https://www.qualys.com/2022/10/24/leeloo-multipath/leeloo-multipath.txt https://www.openwall.com/lists/oss-security/2022/10/24/2 ======================================================================== CVE-2022-41974: Authorization bypass ======================================================================== multipath-tools 0.7.0 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited alone or in conjunction with CVE-2022-41973. Local users able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This can lead to local privilege escalation to root. This occurs because an attacker can repeat a keyword, which is mishandled because arithmetic ADD is used instead of bitwise OR.
Created device-mapper-multipath tracking bugs for this issue: Affects: fedora-all [bug 2137416]
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:7185 https://access.redhat.com/errata/RHSA-2022:7185
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2022:7187 https://access.redhat.com/errata/RHSA-2022:7187
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2022:7188 https://access.redhat.com/errata/RHSA-2022:7188
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2022:7186 https://access.redhat.com/errata/RHSA-2022:7186
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:7192 https://access.redhat.com/errata/RHSA-2022:7192
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:7191 https://access.redhat.com/errata/RHSA-2022:7191
This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 Via RHSA-2022:8598 https://access.redhat.com/errata/RHSA-2022:8598
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-41974