Vulnerability Description
A Improper Access Control vulnerability in the systemd service of cana in openSUSE Backports SLE-15-SP3, openSUSE Backports SLE-15-SP4 allows local users to hijack the UNIX domain socket This issue affects: openSUSE Backports SLE-15-SP3 canna versions prior to canna-3.7p3-bp153.2.3.1. openSUSE Backports SLE-15-SP4 canna versions prior to 3.7p3-bp154.3.3.1. openSUSE Factory was also affected. Instead of fixing the package it was deleted there.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opensuse | Canna | < 3.7p3-bp153.2.3.1 |
| Opensuse | Backports Sle | 15.0 |
| Opensuse | Factory | - |
| Suse | Linux Enterprise | 12.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.suse.com/show_bug.cgi?id=1199280Issue TrackingVendor Advisory
- https://bugzilla.suse.com/show_bug.cgi?id=1199280Issue TrackingVendor Advisory
FAQ
What is CVE-2022-21950?
CVE-2022-21950 is a vulnerability with a CVSS score of 5.3 (MEDIUM). A Improper Access Control vulnerability in the systemd service of cana in openSUSE Backports SLE-15-SP3, openSUSE Backports SLE-15-SP4 allows local users to hijack the UNIX domain socket This issue af...
How severe is CVE-2022-21950?
CVE-2022-21950 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-21950?
Check the references section above for vendor advisories and patch information. Affected products include: Opensuse Canna, Opensuse Backports Sle, Opensuse Factory, Suse Linux Enterprise.