Описание
ELSA-2019-3755: sudo security update (IMPORTANT)
[1.8.6p3-29.0.1.el6_10.2]
- Fixes [OraBug: 28747380] sudo does not honor env_keep-='KRB5CCNAME' after 'sudo -k' (isaac.chen@oracle.com)
[1.8.6p3-29.2]
- RHEL-6.10.z ERRATUM
- fixed CVE-2019-14287 Resolves: rhbz#1760684
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
sudo
1.8.6p3-29.0.1.el6_10.2
sudo-devel
1.8.6p3-29.0.1.el6_10.2
Oracle Linux i686
sudo
1.8.6p3-29.0.1.el6_10.2
sudo-devel
1.8.6p3-29.0.1.el6_10.2
Связанные CVE
Связанные уязвимости
In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.
In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.
In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.
In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer a ...