Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2016-2593

Опубликовано: 09 нояб. 2016
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2016-2593: sudo security, bug fix, and enhancement update (LOW)

[1.8.6p7-20]

  • RHEL 7.3 erratum
    • fixed visudo's -q flag Resolves: rhbz#1350828

[1.8.6p7-19]

  • RHEL 7.3 erratum
    • removed INPUTRC from env_keep to prevent a potential info leak Resolves: rhbz#1340700

[1.8.6p7-18]

  • RHEL 7.3 erratum
    • removed requiretty flag from the default sudoers policy
    • backported pam_service and pam_login_service defaults options
    • implemented netgroup_tuple defaults option for changing netgroup processing semantics
    • fixed user matching logic in the LDAP nss backend
    • don't allow visudo to accept an invalid sudoers file
    • fixed a bug causing that non-root users can list privileges of other users
    • modified digest check documentation to mention the raciness of the checking mechanism Resolves: rhbz#1196451 Resolves: rhbz#1247230 Resolves: rhbz#1334331 Resolves: rhbz#1334360 Resolves: rhbz#1261998 Resolves: rhbz#1313364 Resolves: rhbz#1312486 Resolves: rhbz#1268958 Resolves: rhbz#1335039 Resolves: rhbz#1335042 Resolves: rhbz#1335045 Resolves: rhbz#1273243 Resolves: rhbz#1299883

Обновленные пакеты

Oracle Linux 7

Oracle Linux x86_64

sudo

1.8.6p7-20.el7

sudo-devel

1.8.6p7-20.el7

Связанные CVE

Связанные уязвимости

CVSS3: 4.4
ubuntu
больше 8 лет назад

sudo: It was discovered that the default sudo configuration on Red Hat Enterprise Linux and possibly other Linux implementations preserves the value of INPUTRC which could lead to information disclosure. A local user with sudo access to a restricted program that uses readline could use this flaw to read content from specially formatted files with elevated privileges provided by sudo.

redhat
больше 9 лет назад

sudo: It was discovered that the default sudo configuration on Red Hat Enterprise Linux and possibly other Linux implementations preserves the value of INPUTRC which could lead to information disclosure. A local user with sudo access to a restricted program that uses readline could use this flaw to read content from specially formatted files with elevated privileges provided by sudo.

CVSS3: 4.4
nvd
больше 8 лет назад

sudo: It was discovered that the default sudo configuration on Red Hat Enterprise Linux and possibly other Linux implementations preserves the value of INPUTRC which could lead to information disclosure. A local user with sudo access to a restricted program that uses readline could use this flaw to read content from specially formatted files with elevated privileges provided by sudo.

CVSS3: 4.4
debian
больше 8 лет назад

sudo: It was discovered that the default sudo configuration on Red Hat ...

CVSS3: 4.4
github
больше 3 лет назад

sudo: It was discovered that the default sudo configuration on Red Hat Enterprise Linux and possibly other Linux implementations preserves the value of INPUTRC which could lead to information disclosure. A local user with sudo access to a restricted program that uses readline could use this flaw to read content from specially formatted files with elevated privileges provided by sudo.