vulnerability
Amazon Linux AMI 2: CVE-2022-0563: Security patch for util-linux (ALAS-2022-1901)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
2 | (AV:L/AC:M/Au:N/C:P/I:N/A:N) | Feb 21, 2022 | Dec 7, 2022 | Dec 7, 2022 |
Severity
2
CVSS
(AV:L/AC:M/Au:N/C:P/I:N/A:N)
Published
Feb 21, 2022
Added
Dec 7, 2022
Modified
Dec 7, 2022
Description
A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.
Solution(s)
amazon-linux-ami-2-upgrade-libblkidamazon-linux-ami-2-upgrade-libblkid-develamazon-linux-ami-2-upgrade-libfdiskamazon-linux-ami-2-upgrade-libfdisk-develamazon-linux-ami-2-upgrade-libmountamazon-linux-ami-2-upgrade-libmount-develamazon-linux-ami-2-upgrade-libsmartcolsamazon-linux-ami-2-upgrade-libsmartcols-develamazon-linux-ami-2-upgrade-libuuidamazon-linux-ami-2-upgrade-libuuid-develamazon-linux-ami-2-upgrade-python-libmountamazon-linux-ami-2-upgrade-util-linuxamazon-linux-ami-2-upgrade-util-linux-debuginfoamazon-linux-ami-2-upgrade-util-linux-useramazon-linux-ami-2-upgrade-uuidd

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.