CVE-2022-47952

Summary

CVECVE-2022-47952
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2023-01-01 06:15:00 UTC
Updated2023-08-21 23:15:00 UTC
Descriptionlxc-user-nic in lxc through 5.0.1 is installed setuid root, and may allow local users to infer whether any file exists, even within a protected directory tree, because "Failed to open" often indicates that a file does not exist, whereas "does not refer to a network namespace path" often indicates that a file exists. NOTE: this is different from CVE-2018-6556 because the CVE-2018-6556 fix design was based on the premise that "we will report back to the user that the open() failed but the user has no way of knowing why it failed"; however, in many realistic cases, there are no plausible reasons for failing except that the file does not exist.

Risk And Classification

Problem Types: CWE-203

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Linuxcontainers Lxc All All All All

References

ReferenceSourceLinkTags
GitHub - MaherAzzouzi/CVE-2022-47952: LXC Information Disclosure vulnerability. MISC github.com
[SECURITY] [DLA 3533-1] lxc security update MLIST lists.debian.org
Comment #45 : Bug #1783591 : Bugs : lxc package : Ubuntu MISC bugs.launchpad.net
lxc/lxc.spec.in at 0b83d71c2c8f3bac9503f894cd84584f79258bb3 · lxc/lxc · GitHub MISC github.com
lxc/lxc_user_nic.c at 0b83d71c2c8f3bac9503f894cd84584f79258bb3 · lxc/lxc · GitHub MISC github.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 183247 Debian Security Update for lxc (CVE-2022-47952)
  • 502626 Alpine Linux Security Update for lxc
  • 502629 Alpine Linux Security Update for lxc
  • 502745 Alpine Linux Security Update for lxc
  • 6000035 Debian Security Update for lxc (DLA 3533-1)
  • 672727 EulerOS Security Update for lxc (EulerOS-SA-2023-1451)
  • 672759 EulerOS Security Update for lxc (EulerOS-SA-2023-1476)
  • 672791 EulerOS Security Update for lxc (EulerOS-SA-2023-1532)
  • 672818 EulerOS Security Update for lxc (EulerOS-SA-2023-1557)
  • 672856 EulerOS Security Update for lxc (EulerOS-SA-2023-1600)
  • 672886 EulerOS Security Update for lxc (EulerOS-SA-2023-1785)
  • 672959 EulerOS Security Update for lxc (EulerOS-SA-2023-1763)
  • 673120 EulerOS Security Update for lxc (EulerOS-SA-2023-2159)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report