First published: Wed Nov 24 2021(Updated: )
When Octopus Tentacle is installed on a Linux operating system, the systemd service file permissions are misconfigured. This could lead to a local unprivileged user modifying the contents of the systemd service file to gain privileged access.
Credit: security@octopus.com
Affected Software | Affected Version | How to fix |
---|---|---|
Octopus Tentacle | >=3.15.4<6.1.1116 | |
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-31822 is considered to have a high severity due to the potential for local privilege escalation.
To fix CVE-2021-31822, ensure the systemd service file permissions for Octopus Tentacle are correctly configured to prevent unprivileged users from modifying the file.
CVE-2021-31822 affects systems running Octopus Tentacle on Linux operating systems with misconfigured systemd service file permissions.
An attacker exploiting CVE-2021-31822 could gain privileged access to the system by modifying the contents of the misconfigured systemd service file.
CVE-2021-31822 impacts Octopus Tentacle versions between 3.15.4 and 6.1.1116.