Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2012-1081

Опубликовано: 16 июл. 2012
Источник: oracle-oval
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2012-1081: sudo security update (MODERATE)

[1.7.4p5-12]

  • added patch for CVE-2012-2337 Resolves: rhbz#829756

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

sudo

1.7.2p1-14.el5_8

Oracle Linux x86_64

sudo

1.7.2p1-14.el5_8

Oracle Linux i386

sudo

1.7.2p1-14.el5_8

Oracle Linux 6

Oracle Linux x86_64

sudo

1.7.4p5-12.el6_3

Oracle Linux i686

sudo

1.7.4p5-12.el6_3

Связанные CVE

Связанные уязвимости

ubuntu
около 13 лет назад

sudo 1.6.x and 1.7.x before 1.7.9p1, and 1.8.x before 1.8.4p5, does not properly support configurations that use a netmask syntax, which allows local users to bypass intended command restrictions in opportunistic circumstances by executing a command on a host that has an IPv4 address.

redhat
около 13 лет назад

sudo 1.6.x and 1.7.x before 1.7.9p1, and 1.8.x before 1.8.4p5, does not properly support configurations that use a netmask syntax, which allows local users to bypass intended command restrictions in opportunistic circumstances by executing a command on a host that has an IPv4 address.

nvd
около 13 лет назад

sudo 1.6.x and 1.7.x before 1.7.9p1, and 1.8.x before 1.8.4p5, does not properly support configurations that use a netmask syntax, which allows local users to bypass intended command restrictions in opportunistic circumstances by executing a command on a host that has an IPv4 address.

debian
около 13 лет назад

sudo 1.6.x and 1.7.x before 1.7.9p1, and 1.8.x before 1.8.4p5, does no ...

github
больше 3 лет назад

sudo 1.6.x and 1.7.x before 1.7.9p1, and 1.8.x before 1.8.4p5, does not properly support configurations that use a netmask syntax, which allows local users to bypass intended command restrictions in opportunistic circumstances by executing a command on a host that has an IPv4 address.