First published: Mon Sep 26 2016(Updated: )
libstorage, libstorage-ng, and yast-storage improperly store passphrases for encrypted storage devices in a temporary file on disk, which might allow local users to obtain sensitive information by reading the file, as demonstrated by /tmp/libstorage-XXXXXX/pwdf.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
opensuse libstorage | ||
opensuse libstorage-ng | ||
yast yast-storage | ||
openSUSE | =42.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5746 is considered a medium severity vulnerability due to the potential for sensitive information disclosure.
To fix CVE-2016-5746, update to the latest version of libstorage, libstorage-ng, or yast-storage that addresses this vulnerability.
CVE-2016-5746 can lead to local users obtaining passphrases for encrypted storage devices, compromising sensitive data.
CVE-2016-5746 affects openSUSE's libstorage, libstorage-ng, and yast-storage applications.
Yes, local access is required to exploit CVE-2016-5746, as it involves reading temporary files on disk.