Skip to main content

CVE-2022-0563: CWE-209 in util-linux

Medium
VulnerabilityCVE-2022-0563cvecve-2022-0563cwe-209
Published: Mon Feb 21 2022 (02/21/2022, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: util-linux

Description

A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.

AI-Powered Analysis

AILast updated: 07/10/2025, 20:48:21 UTC

Technical Analysis

CVE-2022-0563 is a medium-severity vulnerability affecting the util-linux package, specifically the chfn and chsh utilities when compiled with Readline support. The Readline library uses the INPUTRC environment variable to specify a path to its configuration file. If the specified configuration file cannot be parsed correctly, Readline outputs an error message that inadvertently includes data read from the file. This behavior can be exploited by an unprivileged user to read contents of root-owned files, which normally should be inaccessible. The vulnerability arises because the error message leaks sensitive file contents, violating confidentiality. The affected versions are util-linux prior to 2.37.4, and the flaw was publicly disclosed in February 2022. The CVSS v3.1 base score is 5.5, reflecting a medium severity with a vector indicating local attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, high confidentiality impact, and no integrity or availability impact. There are no known exploits in the wild, and no official patch links were provided in the source data, but the fixed version is 2.37.4 or later. This vulnerability is categorized under CWE-209 (Information Exposure Through an Error Message). Exploitation requires local access and the ability to influence the INPUTRC environment variable for the chfn or chsh utilities, which are commonly used for changing user information and shell settings on Linux systems.

Potential Impact

For European organizations, this vulnerability poses a risk primarily in environments where util-linux is deployed with Readline support and where users have local access to systems running vulnerable versions. The ability for an unprivileged user to read root-owned files can lead to exposure of sensitive configuration files, credentials, or other critical data, potentially enabling further privilege escalation or lateral movement within the network. This is particularly concerning for organizations with multi-user Linux servers, shared hosting environments, or critical infrastructure systems relying on util-linux utilities. Although the vulnerability does not directly impact integrity or availability, the confidentiality breach can undermine trust, compliance with data protection regulations such as GDPR, and overall system security posture. The medium severity and local attack vector limit the scope to insider threats or attackers with initial foothold, but the potential to escalate privileges makes it a significant concern for sensitive environments.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading util-linux to version 2.37.4 or later, where the issue is resolved. In environments where immediate upgrade is not feasible, administrators should consider restricting access to the chfn and chsh utilities to trusted users only, using file permissions or access control mechanisms. Additionally, environment variables such as INPUTRC should be sanitized or restricted to prevent untrusted users from influencing them. Monitoring and auditing usage of these utilities can help detect suspicious activity. Employing mandatory access controls (e.g., SELinux, AppArmor) to limit the ability of unprivileged users to execute or manipulate these utilities can further reduce risk. Finally, organizations should review and harden local user permissions and consider isolating critical systems to minimize the impact of potential local exploits.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2022-02-10T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f5d1b0bd07c3938e5ec

Added to database: 6/10/2025, 6:54:21 PM

Last enriched: 7/10/2025, 8:48:21 PM

Last updated: 8/21/2025, 5:49:44 PM

Views: 22

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats