First published: Thu Dec 22 2016(Updated: )
sudo: It was discovered that the default sudo configuration on Red Hat Enterprise Linux and possibly other Linux implementations preserves the value of INPUTRC which could lead to information disclosure. A local user with sudo access to a restricted program that uses readline could use this flaw to read content from specially formatted files with elevated privileges provided by sudo.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | ||
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7091 has a medium severity rating due to its potential for information disclosure.
To fix CVE-2016-7091, update to the latest version of sudo provided by Red Hat or apply the recommended patches.
CVE-2016-7091 primarily affects Red Hat Enterprise Linux 7.0 and its variants, including Workstation and Server editions.
CVE-2016-7091 does not directly lead to privilege escalation but may allow information disclosure for users with sudo access.
CVE-2016-7091 is not remotely exploitable as it requires local access to the affected system.