First published: Wed Jan 26 2022(Updated: )
A UNIX Symbolic Link (Symlink) Following vulnerability in the systemd service file for watchman of openSUSE Backports SLE-15-SP3, Factory allows local attackers to escalate to root. This issue affects: openSUSE Backports SLE-15-SP3 watchman versions prior to 4.9.0. openSUSE Factory watchman versions prior to 4.9.0-9.1.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE Factory watchman | <=4.9.1 | |
SUSE SUSE Linux Enterprise Server | =15-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2022-21944.
The severity of CVE-2022-21944 is high, with a severity value of 7.8.
The affected software for CVE-2022-21944 is openSUSE Backports SLE-15-SP3 watchman versions prior to 4.9.0 and openSUSE Factory watchman versions prior to 4.9.1.
The vulnerability allows local attackers to escalate to root by exploiting a UNIX Symbolic Link (Symlink) Following vulnerability in the systemd service file for watchman.
To fix CVE-2022-21944, update to openSUSE Backports SLE-15-SP3 watchman version 4.9.0 or later, or update to openSUSE Factory watchman version 4.9.1 or later.