sudo: It was discovered that the default sudo configuration on Red Hat Enterprise Linux and possibly other Linux implementations preserves the value of INPUTRC which could lead to information disclosure. A local user with sudo access to a restricted program that uses readline could use this flaw to read content from specially formatted files with elevated privileges provided by sudo.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/92615 | Third Party Advisory VDB Entry |
https://lists.gnu.org/archive/html/bug-readline/2016-05/msg00009.html | Third Party Advisory |
https://rhn.redhat.com/errata/RHSA-2016-2593.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2016-12-22 21:59
Updated : 2024-02-04 19:11
NVD link : CVE-2016-7091
Mitre link : CVE-2016-7091
CVE.ORG link : CVE-2016-7091
JSON object : View
Products Affected
redhat
- enterprise_linux_hpc_node
- enterprise_linux_workstation
- enterprise_linux_server
- enterprise_linux
- enterprise_linux_desktop
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor