Date: Wed, 24 Aug 2016 16:28:12 +0930 From: Doran Moppert <dmoppert@...hat.com> To: oss-security@...ts.openwall.com Subject: CVE request - sudoers on Red Hat, Fedora, Mageia information disclosure The inclusion of "INPUTRC" in env_keep in /etc/sudoers allowed information disclosure through readline-enabled programs parsing the named file with elevated privileges. Local users with sudo access could read (portions of) specially-formatted files with elevated privileges. Future versions of readline will make the vulnerability more significant by showing error messages for malformed entries, rather than silently ignoring them. This flaw is distribution-specific - upstream sudo does not include INPUTRC, and we are not aware at this time of any other distros that include it. The following packages address this issue: sudo-1.8.15-2.fc22 sudo-1.8.15-2.fc23 sudo-1.8.16-4.fc24 sudo-1.8.17p1-1.mga5 This was brought to our attention by Grisha Levit. https://bugzilla.redhat.com/show_bug.cgi?id=1339935 -- Doran Moppert Red Hat Product Security Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.