First published: Fri Jun 24 2022(Updated: )
A UNIX Symbolic Link (Symlink) Following vulnerability in keylime of openSUSE Tumbleweed allows local attackers to escalate from the keylime user to root. This issue affects: openSUSE Tumbleweed keylime versions prior to 6.4.2-1.1.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE Tumbleweed | <6.4.2-1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-31250.
The severity of CVE-2022-31250 is high (7.8).
CVE-2022-31250 affects openSUSE Tumbleweed keylime versions prior to 6.4.2-1.1.
CVE-2022-31250 can be exploited by local attackers to escalate from the keylime user to root using a UNIX Symbolic Link (Symlink) Following vulnerability.
Yes, upgrading to keylime version 6.4.2-1.1 or later will fix the vulnerability CVE-2022-31250.