sudo: It was discovered that the default sudo configuration on Red Hat Enterprise Linux and possibly other Linux implementations preserves the value of INPUTRC which could lead to information disclosure. A local user with sudo access to a restricted program that uses readline could use this flaw to read content from specially formatted files with elevated privileges provided by sudo.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/92615 | Third Party Advisory VDB Entry |
https://lists.gnu.org/archive/html/bug-readline/2016-05/msg00009.html | Third Party Advisory |
https://rhn.redhat.com/errata/RHSA-2016-2593.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/92615 | Third Party Advisory VDB Entry |
https://lists.gnu.org/archive/html/bug-readline/2016-05/msg00009.html | Third Party Advisory |
https://rhn.redhat.com/errata/RHSA-2016-2593.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/92615 - Third Party Advisory, VDB Entry | |
References | () https://lists.gnu.org/archive/html/bug-readline/2016-05/msg00009.html - Third Party Advisory | |
References | () https://rhn.redhat.com/errata/RHSA-2016-2593.html - Patch, Vendor Advisory |
Information
Published : 2016-12-22 21:59
Updated : 2024-11-21 02:57
NVD link : CVE-2016-7091
Mitre link : CVE-2016-7091
CVE.ORG link : CVE-2016-7091
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux
- enterprise_linux_desktop
- enterprise_linux_hpc_node
- enterprise_linux_workstation
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor