CVE-2016-7091

sudo: It was discovered that the default sudo configuration on Red Hat Enterprise Linux and possibly other Linux implementations preserves the value of INPUTRC which could lead to information disclosure. A local user with sudo access to a restricted program that uses readline could use this flaw to read content from specially formatted files with elevated privileges provided by sudo.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:57

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/92615 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/92615 - Third Party Advisory, VDB Entry
References () https://lists.gnu.org/archive/html/bug-readline/2016-05/msg00009.html - Third Party Advisory () https://lists.gnu.org/archive/html/bug-readline/2016-05/msg00009.html - Third Party Advisory
References () https://rhn.redhat.com/errata/RHSA-2016-2593.html - Patch, Vendor Advisory () https://rhn.redhat.com/errata/RHSA-2016-2593.html - Patch, Vendor Advisory

Information

Published : 2016-12-22 21:59

Updated : 2024-11-21 02:57


NVD link : CVE-2016-7091

Mitre link : CVE-2016-7091

CVE.ORG link : CVE-2016-7091


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux
  • enterprise_linux_desktop
  • enterprise_linux_hpc_node
  • enterprise_linux_workstation
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor