
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-29869 affects cifs-utils through version 6.14, a Common Internet File System utilities package. The vulnerability was discovered and reported by Jeffrey Bencteux in April 2022. When verbose logging is enabled, the software can cause an information leak when a file contains equal sign (=) characters but is not a valid credentials file (NVD, Debian LTS).
The vulnerability is classified as an information disclosure issue with a CVSS v3.1 Base Score of 5.3 (Medium) and vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N. The weakness is categorized as CWE-532: Insertion of Sensitive Information into Log File (NVD).
When verbose logging is enabled, invalid credentials file lines may be dumped to stderr, potentially leading to information disclosure in particular conditions when the credentials file given is sensitive and contains equal sign characters (Gentoo Security).
The vulnerability has been fixed in cifs-utils version 6.15. Users are advised to upgrade to this version or later. Multiple distributions have released security updates including Debian (versions 2:6.8-2+deb10u1 for buster and 2:6.11-3.1+deb11u1 for bullseye), Fedora (version 6.15-1 for Fedora 34, 35, and 36), and Gentoo (version 6.15) (Debian Security, Fedora Update, Gentoo Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."