Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-0563: CWE-209 in util-linux

0
Medium
VulnerabilityCVE-2022-0563cvecve-2022-0563cwe-209
Published: Mon Feb 21 2022 (02/21/2022, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: util-linux

Description

A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.

AI-Powered Analysis

AILast updated: 07/10/2025, 20:48:21 UTC

Technical Analysis

CVE-2022-0563 is a medium-severity vulnerability affecting the util-linux package, specifically the chfn and chsh utilities when compiled with Readline support. The Readline library uses the INPUTRC environment variable to specify a path to its configuration file. If the specified configuration file cannot be parsed correctly, Readline outputs an error message that inadvertently includes data read from the file. This behavior can be exploited by an unprivileged user to read contents of root-owned files, which normally should be inaccessible. The vulnerability arises because the error message leaks sensitive file contents, violating confidentiality. The affected versions are util-linux prior to 2.37.4, and the flaw was publicly disclosed in February 2022. The CVSS v3.1 base score is 5.5, reflecting a medium severity with a vector indicating local attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, high confidentiality impact, and no integrity or availability impact. There are no known exploits in the wild, and no official patch links were provided in the source data, but the fixed version is 2.37.4 or later. This vulnerability is categorized under CWE-209 (Information Exposure Through an Error Message). Exploitation requires local access and the ability to influence the INPUTRC environment variable for the chfn or chsh utilities, which are commonly used for changing user information and shell settings on Linux systems.

Potential Impact

For European organizations, this vulnerability poses a risk primarily in environments where util-linux is deployed with Readline support and where users have local access to systems running vulnerable versions. The ability for an unprivileged user to read root-owned files can lead to exposure of sensitive configuration files, credentials, or other critical data, potentially enabling further privilege escalation or lateral movement within the network. This is particularly concerning for organizations with multi-user Linux servers, shared hosting environments, or critical infrastructure systems relying on util-linux utilities. Although the vulnerability does not directly impact integrity or availability, the confidentiality breach can undermine trust, compliance with data protection regulations such as GDPR, and overall system security posture. The medium severity and local attack vector limit the scope to insider threats or attackers with initial foothold, but the potential to escalate privileges makes it a significant concern for sensitive environments.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading util-linux to version 2.37.4 or later, where the issue is resolved. In environments where immediate upgrade is not feasible, administrators should consider restricting access to the chfn and chsh utilities to trusted users only, using file permissions or access control mechanisms. Additionally, environment variables such as INPUTRC should be sanitized or restricted to prevent untrusted users from influencing them. Monitoring and auditing usage of these utilities can help detect suspicious activity. Employing mandatory access controls (e.g., SELinux, AppArmor) to limit the ability of unprivileged users to execute or manipulate these utilities can further reduce risk. Finally, organizations should review and harden local user permissions and consider isolating critical systems to minimize the impact of potential local exploits.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2022-02-10T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f5d1b0bd07c3938e5ec

Added to database: 6/10/2025, 6:54:21 PM

Last enriched: 7/10/2025, 8:48:21 PM

Last updated: 2/7/2026, 12:39:25 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats