Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2019-4822

Опубликовано: 15 окт. 2019
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2019-4822: sudo security update (IMPORTANT)

[1.8.25-4.0.1.el8.1]

  • Treat an ID of -1 as invalid since that means 'no change' [Orabug: 30421281] {CVE-2019-14287}
  • Add sudo_strtoid() tests for -1 and range errors. [Orabug: 30421281]

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

sudo

1.8.25p1-4.0.1.el8_0.1

Oracle Linux x86_64

sudo

1.8.25p1-4.0.1.el8_0.1

Связанные CVE

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 6 лет назад

In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.

CVSS3: 7
redhat
больше 6 лет назад

In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.

CVSS3: 8.8
nvd
больше 6 лет назад

In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.

CVSS3: 8.8
debian
больше 6 лет назад

In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer a ...

suse-cvrf
больше 6 лет назад

Security update for sudo