Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-47952
HistoryJan 01, 2023 - 12:00 a.m.

CVE-2022-47952

2023-01-0100:00:00
ubuntu.com
ubuntu.com
14
lxc-user-nic
setuid root
file inference
cve-2022-47952
bugzilla
launchpad
unix

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

3.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

33.6%

lxc-user-nic in lxc through 5.0.1 is installed setuid root, and may allow
local users to infer whether any file exists, even within a protected
directory tree, because “Failed to open” often indicates that a file does
not exist, whereas “does not refer to a network namespace path” often
indicates that a file exists. NOTE: this is different from CVE-2018-6556
because the CVE-2018-6556 fix design was based on the premise that “we will
report back to the user that the open() failed but the user has no way of
knowing why it failed”; however, in many realistic cases, there are no
plausible reasons for failing except that the file does not exist.

Bugs

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

3.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

33.6%