Vulnerability Details : CVE-2022-0563
A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.
Vulnerability category: Gain privilege
Products affected by CVE-2022-0563
- cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-0563
0.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 3 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-0563
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
1.9
|
LOW | AV:L/AC:M/Au:N/C:P/I:N/A:N |
3.4
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2022-0563
-
The product generates an error message that includes sensitive information about its environment, users, or associated data.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2022-0563
-
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
[ANNOUNCE] util-linux v2.37.4
-
https://security.gentoo.org/glsa/202401-08
util-linux: Multiple Vulnerabilities (GLSA 202401-08) — Gentoo security
-
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
[ANNOUNCE] util-linux v2.37.4Mailing List;Patch;Vendor Advisory
-
https://security.netapp.com/advisory/ntap-20220331-0002/
CVE-2022-0563 Util-linux Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory
Jump to