CVE-2022-0563

Name
CVE-2022-0563
Description
A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Mailing List https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
CONFIRM https://security.netapp.com/advisory/ntap-20220331-0002/
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
secalert@redhat.com https://security.gentoo.org/glsa/202401-08

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:* util-linux >= None < 2.37.4

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
util-linux 3.15-main 2.37.4-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
util-linux 3.14-main 2.37.4-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
util-linux 3.12-main 2.37.4-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
util-linux 3.13-main 2.37.4-r0 Natanael Copa <ncopa@alpinelinux.org> fixed