sudo-rs is a memory safe implementation of sudo and su written in Rust. Prior to version 0.2.6, users with no (or very limited) sudo privileges can determine whether files exists in folders that they otherwise cannot access using `sudo --list <pathname>`. Users with local access to a machine can discover the existence/non-existence of certain files, revealing potentially sensitive information in the file names. This information can also be used in conjunction with other attacks. Version 0.2.6 fixes the vulnerability.
References
Link | Resource |
---|---|
https://github.com/trifectatechfoundation/sudo-rs/releases/tag/v0.2.6 | Release Notes |
https://github.com/trifectatechfoundation/sudo-rs/security/advisories/GHSA-98cv-wqjx-wx8f | Exploit Vendor Advisory |
https://github.com/trifectatechfoundation/sudo-rs/security/advisories/GHSA-98cv-wqjx-wx8f | Exploit Vendor Advisory |
Configurations
History
09 Jul 2025, 01:51
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-12 15:16
Updated : 2025-07-09 01:51
NVD link : CVE-2025-46717
Mitre link : CVE-2025-46717
CVE.ORG link : CVE-2025-46717
JSON object : View
Products Affected
trifectatech
- sudo
CWE