First published: Thu Jan 21 2016(Updated: )
It was reported that when executing a program via "pkexec --user nonpriv program", the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing privilege escalation. Original bug report (contains reproducer): <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - pkexec tty hijacking via TIOCSTI ioctl" href="show_bug.cgi?id=1299955">https://bugzilla.redhat.com/show_bug.cgi?id=1299955</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/policykit-1 | <=0.105-31+deb11u1<=122-3<=125-2 | |
Polkit | ||
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2568 is considered a high severity vulnerability due to its potential to allow privilege escalation.
To fix CVE-2016-2568, update the affected packages in your operating system to the latest versions that have addressed this vulnerability.
CVE-2016-2568 affects systems utilizing policykit-1 and applications that make use of the TIOCSTI ioctl.
If exploited, CVE-2016-2568 allows an unprivileged user to escalate their privileges to execute commands with higher permissions.
CVE-2016-2568 was reported in February 2016, raising concerns about the security of systems using affected software.