Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2022-0563 | libuuid1 (CWE-209) #880

Open
yeyisan opened this issue Apr 25, 2022 · 0 comments
Open

CVE-2022-0563 | libuuid1 (CWE-209) #880

yeyisan opened this issue Apr 25, 2022 · 0 comments
Labels
bug Something isn't working KONDUKTO

Comments

@yeyisan
Copy link
Collaborator

yeyisan commented Apr 25, 2022

A low severity vulnerability has been discovered in your project.

Project Name: NodeJS2

Scanner Name: trivy

Cwe ID: 209

Cwe Name: Information Exposure Through an Error Message

Cwe Link: https://cwe.mitre.org/data/definitions/209.html

CVE ID: CVE-2022-0563

Target: redis:latest (debian 11.3)

Packages:

  • libuuid1 : 2.36.1-8+deb11u1 - Fixed Version:

References:

Training(Secure Code Warrior):

Tool Description: A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.

Custom Description: bhhh

@yeyisan yeyisan added bug Something isn't working KONDUKTO labels Apr 25, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working KONDUKTO
Projects
None yet
Development

No branches or pull requests

1 participant