Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2022-41720: SUSE Linux Security Advisory

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

SUSE: CVE-2022-41720: SUSE Linux Security Advisory

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
12/07/2022
Created
12/12/2022
Added
12/12/2022
Modified
05/31/2023

Description

On Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and http.Dir type provide access to a tree of files rooted at a given directory. These functions permit access to Windows device files under that root. For example, os.DirFS("C:/tmp").Open("COM1") opens the COM1 device. Both os.DirFS and http.Dir only provide read-only filesystem access. In addition, on Windows, an os.DirFS for the directory (the root of the current drive) can permit a maliciously crafted path to escape from the drive and access any path on the system. With fix applied, the behavior of os.DirFS("") has changed. Previously, an empty root was treated equivalently to "/", so os.DirFS("").Open("tmp") would open the path "/tmp". This now returns an error.

Solution(s)

  • suse-upgrade-container-suseconnect
  • suse-upgrade-go1-18
  • suse-upgrade-go1-18-doc
  • suse-upgrade-go1-18-openssl
  • suse-upgrade-go1-18-openssl-doc
  • suse-upgrade-go1-18-openssl-race
  • suse-upgrade-go1-18-race
  • suse-upgrade-go1-19
  • suse-upgrade-go1-19-doc
  • suse-upgrade-go1-19-race

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;