Vulnerability Description
enlightenment_sys in Enlightenment before 0.25.4 allows local users to gain privileges because it is setuid root, and the system library function mishandles pathnames that begin with a /dev/.. substring.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Enlightenment | Enlightenment | < 0.25.4 |
Related Weaknesses (CWE)
References
- https://git.enlightenment.org/enlightenment/enlightenment/commit/cae78cbb169f237PatchThird Party Advisory
- https://git.enlightenment.org/enlightenment/enlightenment/commit/cc7faeccf77fef8PatchThird Party Advisory
- https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploitExploitThird Party Advisory
- https://git.enlightenment.org/enlightenment/enlightenment/commit/cae78cbb169f237PatchThird Party Advisory
- https://git.enlightenment.org/enlightenment/enlightenment/commit/cc7faeccf77fef8PatchThird Party Advisory
- https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploitExploitThird Party Advisory
FAQ
What is CVE-2022-37706?
CVE-2022-37706 is a vulnerability with a CVSS score of 7.8 (HIGH). enlightenment_sys in Enlightenment before 0.25.4 allows local users to gain privileges because it is setuid root, and the system library function mishandles pathnames that begin with a /dev/.. substri...
How severe is CVE-2022-37706?
CVE-2022-37706 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-37706?
Check the references section above for vendor advisories and patch information. Affected products include: Enlightenment Enlightenment.