Information Exposure Through Log Files Affecting cifs-utils package, versions <2:6.8-2+deb10u1
Threat Intelligence
EPSS
0.77% (82nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-CIFSUTILS-2805479
- published 28 Apr 2022
- disclosed 28 Apr 2022
Introduced: 28 Apr 2022
CVE-2022-29869 Open this link in a new tabHow to fix?
Upgrade Debian:10 cifs-utils to version 2:6.8-2+deb10u1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream cifs-utils package and not the cifs-utils package as distributed by Debian.
See How to fix? for Debian:10 relevant fixed versions and status.
cifs-utils through 6.14, with verbose logging, can cause an information leak when a file contains = (equal sign) characters but is not a valid credentials file.
References
- https://security-tracker.debian.org/tracker/CVE-2022-29869
- https://github.com/piastry/cifs-utils/pull/7
- https://github.com/piastry/cifs-utils/commit/8acc963a2e7e9d63fe1f2e7f73f5a03f83d9c379
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QIYZ4L6SLSYJQ446VJAO2VGAESURQNSP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HXKZLJYJJEC3TIBFLXUORRMZUKG5W676/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WBOLMANBYJILXQKRRK7OCR774PXJAYY/
- https://lists.debian.org/debian-lts-announce/2022/05/msg00020.html
- https://www.debian.org/security/2022/dsa-5157
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5WBOLMANBYJILXQKRRK7OCR774PXJAYY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXKZLJYJJEC3TIBFLXUORRMZUKG5W676/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QIYZ4L6SLSYJQ446VJAO2VGAESURQNSP/
- https://security.gentoo.org/glsa/202311-05
CVSS Scores
version 3.1