Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2019-3755

Опубликовано: 07 нояб. 2019
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2019-3755: sudo security update (IMPORTANT)

[1.8.6p3-29.0.1.el6_10.2]

  • Fixes [OraBug: 28747380] sudo does not honor env_keep-='KRB5CCNAME' after 'sudo -k' (isaac.chen@oracle.com)

[1.8.6p3-29.2]

  • RHEL-6.10.z ERRATUM
  • fixed CVE-2019-14287 Resolves: rhbz#1760684

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

sudo

1.8.6p3-29.0.1.el6_10.2

sudo-devel

1.8.6p3-29.0.1.el6_10.2

Oracle Linux i686

sudo

1.8.6p3-29.0.1.el6_10.2

sudo-devel

1.8.6p3-29.0.1.el6_10.2

Связанные CVE

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 6 лет назад

In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.

CVSS3: 7
redhat
больше 6 лет назад

In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.

CVSS3: 8.8
nvd
больше 6 лет назад

In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.

CVSS3: 8.8
debian
больше 6 лет назад

In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer a ...

suse-cvrf
больше 6 лет назад

Security update for sudo