{"api_version":"1","generated_at":"2026-04-22T19:37:35+00:00","cve":"CVE-2022-47952","urls":{"html":"https://cve.report/CVE-2022-47952","api":"https://cve.report/api/cve/CVE-2022-47952.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-47952","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-47952"},"summary":{"title":"CVE-2022-47952","description":"lxc-user-nic in lxc through 5.0.1 is installed setuid root, and may allow local users to infer whether any file exists, even within a protected directory tree, because \"Failed to open\" often indicates that a file does not exist, whereas \"does not refer to a network namespace path\" often indicates that a file exists. NOTE: this is different from CVE-2018-6556 because the CVE-2018-6556 fix design was based on the premise that \"we will report back to the user that the open() failed but the user has no way of knowing why it failed\"; however, in many realistic cases, there are no plausible reasons for failing except that the file does not exist.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2023-01-01 06:15:00","updated_at":"2023-08-21 23:15:00"},"problem_types":["CWE-203"],"metrics":[],"references":[{"url":"https://github.com/MaherAzzouzi/CVE-2022-47952","name":"https://github.com/MaherAzzouzi/CVE-2022-47952","refsource":"MISC","tags":[],"title":"GitHub - MaherAzzouzi/CVE-2022-47952: LXC Information Disclosure vulnerability.","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00025.html","name":"[debian-lts-announce] 20230821 [SECURITY] [DLA 3533-1] lxc security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3533-1] lxc security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591/comments/45","name":"https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591/comments/45","refsource":"MISC","tags":[],"title":"Comment #45 : Bug #1783591 : Bugs : lxc package : Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/lxc/lxc/blob/0b83d71c2c8f3bac9503f894cd84584f79258bb3/lxc.spec.in#L274","name":"https://github.com/lxc/lxc/blob/0b83d71c2c8f3bac9503f894cd84584f79258bb3/lxc.spec.in#L274","refsource":"MISC","tags":[],"title":"lxc/lxc.spec.in at 0b83d71c2c8f3bac9503f894cd84584f79258bb3 · lxc/lxc · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/lxc/lxc/blob/0b83d71c2c8f3bac9503f894cd84584f79258bb3/src/lxc/cmd/lxc_user_nic.c#L1085-L1104","name":"https://github.com/lxc/lxc/blob/0b83d71c2c8f3bac9503f894cd84584f79258bb3/src/lxc/cmd/lxc_user_nic.c#L1085-L1104","refsource":"MISC","tags":[],"title":"lxc/lxc_user_nic.c at 0b83d71c2c8f3bac9503f894cd84584f79258bb3 · lxc/lxc · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-47952","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-47952","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"47952","vulnerable":"1","versionEndIncluding":"5.0.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linuxcontainers","cpe5":"lxc","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-47952","qid":"183247","title":"Debian Security Update for lxc (CVE-2022-47952)"},{"cve":"CVE-2022-47952","qid":"502626","title":"Alpine Linux Security Update for lxc"},{"cve":"CVE-2022-47952","qid":"502629","title":"Alpine Linux Security Update for lxc"},{"cve":"CVE-2022-47952","qid":"502745","title":"Alpine Linux Security Update for lxc"},{"cve":"CVE-2022-47952","qid":"6000035","title":"Debian Security Update for lxc (DLA 3533-1)"},{"cve":"CVE-2022-47952","qid":"672727","title":"EulerOS Security Update for lxc (EulerOS-SA-2023-1451)"},{"cve":"CVE-2022-47952","qid":"672759","title":"EulerOS Security Update for lxc (EulerOS-SA-2023-1476)"},{"cve":"CVE-2022-47952","qid":"672791","title":"EulerOS Security Update for lxc (EulerOS-SA-2023-1532)"},{"cve":"CVE-2022-47952","qid":"672818","title":"EulerOS Security Update for lxc (EulerOS-SA-2023-1557)"},{"cve":"CVE-2022-47952","qid":"672856","title":"EulerOS Security Update for lxc (EulerOS-SA-2023-1600)"},{"cve":"CVE-2022-47952","qid":"672886","title":"EulerOS Security Update for lxc (EulerOS-SA-2023-1785)"},{"cve":"CVE-2022-47952","qid":"672959","title":"EulerOS Security Update for lxc (EulerOS-SA-2023-1763)"},{"cve":"CVE-2022-47952","qid":"673120","title":"EulerOS Security Update for lxc (EulerOS-SA-2023-2159)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2022-47952","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"lxc-user-nic in lxc through 5.0.1 is installed setuid root, and may allow local users to infer whether any file exists, even within a protected directory tree, because \"Failed to open\" often indicates that a file does not exist, whereas \"does not refer to a network namespace path\" often indicates that a file exists. NOTE: this is different from CVE-2018-6556 because the CVE-2018-6556 fix design was based on the premise that \"we will report back to the user that the open() failed but the user has no way of knowing why it failed\"; however, in many realistic cases, there are no plausible reasons for failing except that the file does not exist."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://github.com/lxc/lxc/blob/0b83d71c2c8f3bac9503f894cd84584f79258bb3/lxc.spec.in#L274","refsource":"MISC","name":"https://github.com/lxc/lxc/blob/0b83d71c2c8f3bac9503f894cd84584f79258bb3/lxc.spec.in#L274"},{"url":"https://github.com/lxc/lxc/blob/0b83d71c2c8f3bac9503f894cd84584f79258bb3/src/lxc/cmd/lxc_user_nic.c#L1085-L1104","refsource":"MISC","name":"https://github.com/lxc/lxc/blob/0b83d71c2c8f3bac9503f894cd84584f79258bb3/src/lxc/cmd/lxc_user_nic.c#L1085-L1104"},{"url":"https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591/comments/45","refsource":"MISC","name":"https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591/comments/45"},{"refsource":"MISC","name":"https://github.com/MaherAzzouzi/CVE-2022-47952","url":"https://github.com/MaherAzzouzi/CVE-2022-47952"},{"refsource":"MLIST","name":"[debian-lts-announce] 20230821 [SECURITY] [DLA 3533-1] lxc security update","url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00025.html"}]}},"nvd":{"publishedDate":"2023-01-01 06:15:00","lastModifiedDate":"2023-08-21 23:15:00","problem_types":["CWE-203"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":3.3,"baseSeverity":"LOW"},"exploitabilityScore":1.8,"impactScore":1.4}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*","versionEndIncluding":"5.0.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}