{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-31250","assignerOrgId":"404e59f5-483d-4b8a-8e7a-e67604dd8afb","assignerShortName":"suse","datePublished":"2022-07-20T07:55:11.167Z","dateUpdated":"2024-09-17T01:06:35.227Z","dateReserved":"2022-05-20T00:00:00.000Z"},"containers":{"cna":{"title":"keylime %post scriplet allows for privilege escalation from keylime user to root","datePublic":"2022-06-24T00:00:00.000Z","providerMetadata":{"orgId":"404e59f5-483d-4b8a-8e7a-e67604dd8afb","shortName":"suse","dateUpdated":"2022-10-13T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A UNIX Symbolic Link (Symlink) Following vulnerability in keylime of openSUSE Tumbleweed allows local attackers to escalate from the keylime user to root. This issue affects: openSUSE Tumbleweed keylime versions prior to 6.4.2-1.1."}],"affected":[{"vendor":"openSUSE","product":"Tumbleweed","versions":[{"version":"keylime","status":"affected","lessThan":"6.4.2-1.1","versionType":"custom"}]}],"references":[{"url":"https://bugzilla.suse.com/show_bug.cgi?id=1200885"}],"credits":[{"lang":"en","value":"Johannes Segitz from SUSE"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":7.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-59: Improper Link Resolution Before File Access ('Link Following')","cweId":"CWE-59"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"advisory":"https://bugzilla.suse.com/show_bug.cgi?id=1200885","defect":["1200885"],"discovery":"INTERNAL"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T07:11:39.902Z"},"title":"CVE Program Container","references":[{"url":"https://bugzilla.suse.com/show_bug.cgi?id=1200885","tags":["x_transferred"]}]}]}}