libstorage, libstorage-ng, and yast-storage improperly store passphrases for encrypted storage devices in a temporary file on disk, which might allow local users to obtain sensitive information by reading the file, as demonstrated by /tmp/libstorage-XXXXXX/pwdf.
References
Link | Resource |
---|---|
https://github.com/openSUSE/libstorage/pull/163 | Patch |
http://lists.opensuse.org/opensuse-updates/2016-09/msg00032.html | Third Party Advisory |
https://github.com/yast/yast-storage/pull/226 | Patch |
https://bugzilla.suse.com/show_bug.cgi?id=986971 | Exploit Issue Tracking Vendor Advisory Patch VDB Entry |
https://github.com/yast/yast-storage/pull/227 | Patch |
https://github.com/yast/yast-storage/pull/223 | Patch |
https://github.com/yast/yast-storage/pull/224 | Patch |
https://github.com/openSUSE/libstorage/pull/162 | Patch |
https://github.com/openSUSE/libstorage-ng/pull/123 | Vendor Advisory |
http://www.securityfocus.com/bid/93169 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2016-09-26 08:59
Updated : 2018-10-30 09:27
NVD link : CVE-2016-5746
Mitre link : CVE-2016-5746
JSON object : View
CWE
Products Affected
opensuse
- libstorage
- libstorage-ng
- leap
yast
- yast-storage