Upstream information

CVE-2022-21944 at MITRE

Description

A UNIX Symbolic Link (Symlink) Following vulnerability in the systemd service file for watchman of openSUSE Backports SLE-15-SP3, Factory allows local attackers to escalate to root. This issue affects: openSUSE Backports SLE-15-SP3 watchman versions prior to 4.9.0. openSUSE Factory watchman versions prior to 4.9.0-9.1.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.2
Vector AV:L/AC:L/Au:N/C:C/I:C/A:C
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
CVSS v3 Scores
  National Vulnerability Database
Base Score 7.8
Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Access Vector Local
Access Complexity Low
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
CVSSv3 Version 3.1
SUSE Bugzilla entry: 1194470 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub 15 SP3
  • python3-watchman >= 1.4.0-bp153.2.3.1
  • watchman >= 4.9.0-bp153.2.3.1
Patchnames:
openSUSE-2022-16
openSUSE Leap 15.3
  • python3-watchman >= 1.4.0-bp153.2.3.1
  • watchman >= 4.9.0-bp153.2.3.1
Patchnames:
openSUSE-2022-16
openSUSE Tumbleweed
  • python3-watchman >= 1.4.0-6.1
  • watchman >= 4.9.0-6.1
Patchnames:
openSUSE Tumbleweed GA python3-watchman-1.4.0-6.1