Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2009-0267

Опубликовано: 05 фев. 2009
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2009-0267: sudo security update (MODERATE)

[1.6.9p17-3.el5_3.1]

  • audit patch rediff (one chunk failed to apply due to fuzz=0)
  • Fix for incorrect handling of groups in Runas_User (#481720) Resolves: #481820

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

sudo

1.6.9p17-3.el5_3.1

Oracle Linux i386

sudo

1.6.9p17-3.el5_3.1

Связанные CVE

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 16 лет назад

parse.c in sudo 1.6.9p17 through 1.6.9p19 does not properly interpret a system group (aka %group) in the sudoers file during authorization decisions for a user who belongs to that group, which allows local users to leverage an applicable sudoers file and gain root privileges via a sudo command.

redhat
больше 16 лет назад

parse.c in sudo 1.6.9p17 through 1.6.9p19 does not properly interpret a system group (aka %group) in the sudoers file during authorization decisions for a user who belongs to that group, which allows local users to leverage an applicable sudoers file and gain root privileges via a sudo command.

CVSS3: 7.8
nvd
больше 16 лет назад

parse.c in sudo 1.6.9p17 through 1.6.9p19 does not properly interpret a system group (aka %group) in the sudoers file during authorization decisions for a user who belongs to that group, which allows local users to leverage an applicable sudoers file and gain root privileges via a sudo command.

CVSS3: 7.8
debian
больше 16 лет назад

parse.c in sudo 1.6.9p17 through 1.6.9p19 does not properly interpret ...

CVSS3: 7.8
github
около 3 лет назад

parse.c in sudo 1.6.9p17 through 1.6.9p19 does not properly interpret a system group (aka %group) in the sudoers file during authorization decisions for a user who belongs to that group, which allows local users to leverage an applicable sudoers file and gain root privileges via a sudo command.