First published: Tue Oct 25 2022(Updated: )
The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices.<br>Security Fix(es):<br><li> device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket (CVE-2022-41974)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/device-mapper-multipath | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/device-mapper-multipath | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/device-mapper-multipath-debuginfo | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/device-mapper-multipath-debuginfo | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/device-mapper-multipath-debugsource | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/device-mapper-multipath-debugsource | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/device-mapper-multipath-libs | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/device-mapper-multipath-libs | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/device-mapper-multipath-libs-debuginfo | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/device-mapper-multipath-libs-debuginfo | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/kpartx | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/kpartx-debuginfo | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/kpartx-debuginfo | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/libdmmp | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/libdmmp | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/libdmmp-debuginfo | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/libdmmp-debuginfo | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/kpartx | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/device-mapper-multipath | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/device-mapper-multipath-debuginfo | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/device-mapper-multipath-debugsource | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/device-mapper-multipath-libs | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/device-mapper-multipath-libs-debuginfo | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/kpartx | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/kpartx-debuginfo | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/libdmmp | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/libdmmp-debuginfo | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/device-mapper-multipath | <0.8.3-3.el8_2.7.aa | 0.8.3-3.el8_2.7.aa |
redhat/device-mapper-multipath-debuginfo | <0.8.3-3.el8_2.7.aa | 0.8.3-3.el8_2.7.aa |
redhat/device-mapper-multipath-debugsource | <0.8.3-3.el8_2.7.aa | 0.8.3-3.el8_2.7.aa |
redhat/device-mapper-multipath-libs | <0.8.3-3.el8_2.7.aa | 0.8.3-3.el8_2.7.aa |
redhat/device-mapper-multipath-libs-debuginfo | <0.8.3-3.el8_2.7.aa | 0.8.3-3.el8_2.7.aa |
redhat/kpartx | <0.8.3-3.el8_2.7.aa | 0.8.3-3.el8_2.7.aa |
redhat/kpartx-debuginfo | <0.8.3-3.el8_2.7.aa | 0.8.3-3.el8_2.7.aa |
redhat/libdmmp | <0.8.3-3.el8_2.7.aa | 0.8.3-3.el8_2.7.aa |
redhat/libdmmp-debuginfo | <0.8.3-3.el8_2.7.aa | 0.8.3-3.el8_2.7.aa |
redhat/device-mapper-multipath-devel | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/device-mapper-multipath-devel | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/device-mapper-multipath-devel | <0.8.3-3.el8_2.7 | 0.8.3-3.el8_2.7 |
redhat/device-mapper-multipath-devel | <0.8.3-3.el8_2.7.aa | 0.8.3-3.el8_2.7.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability RHSA-2022:7188 is an authorization bypass affecting the device-mapper-multipath daemon that listens for client connections on an abstract Unix socket.
The severity of RHSA-2022:7188 has been classified as important, highlighting its potential impact on system security.
To fix the vulnerability RHSA-2022:7188, you should update the affected device-mapper-multipath packages to version 0.8.3-3.el8_2.7 or later.
Affected packages include device-mapper-multipath, device-mapper-multipath-debuginfo, device-mapper-multipath-libs, and several others.
You can check for vulnerability to RHSA-2022:7188 by verifying the installed version of the device-mapper-multipath packages against the remediation version.