Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2021:1275-1

Опубликовано: 20 апр. 2021
Источник: suse-cvrf

Описание

Security update for sudo

This update for sudo fixes the following issues:

  • L3: Tenable Scan reports sudo is vulnerable to CVE-2021-3156 (bsc#1183936)

Список пакетов

Container ses/6/cephcsi/cephcsi:latest
sudo-1.8.22-4.18.1
Container ses/6/rook/ceph:latest
sudo-1.8.22-4.18.1
Container ses/7/cephcsi/cephcsi:latest
sudo-1.8.22-4.18.1
Container ses/7/rook/ceph:latest
sudo-1.8.22-4.18.1
Image SLES15-Azure-BYOS
sudo-1.8.22-4.18.1
Image SLES15-EC2-CHOST-HVM-BYOS
sudo-1.8.22-4.18.1
Image SLES15-EC2-HVM-BYOS
sudo-1.8.22-4.18.1
Image SLES15-GCE-BYOS
sudo-1.8.22-4.18.1
Image SLES15-SAP-Azure
sudo-1.8.22-4.18.1
Image SLES15-SAP-Azure-BYOS
sudo-1.8.22-4.18.1
Image SLES15-SAP-Azure-LI-BYOS-Production
sudo-1.8.22-4.18.1
Image SLES15-SAP-Azure-VLI-BYOS-Production
sudo-1.8.22-4.18.1
Image SLES15-SAP-EC2-HVM
sudo-1.8.22-4.18.1
Image SLES15-SAP-EC2-HVM-BYOS
sudo-1.8.22-4.18.1
Image SLES15-SAP-GCE
sudo-1.8.22-4.18.1
Image SLES15-SAP-GCE-BYOS
sudo-1.8.22-4.18.1
Image SLES15-SP1-Azure-BYOS
sudo-1.8.22-4.18.1
Image SLES15-SP1-Azure-HPC-BYOS
sudo-1.8.22-4.18.1
Image SLES15-SP1-CHOST-BYOS-Azure
sudo-1.8.22-4.18.1
Image SLES15-SP1-CHOST-BYOS-EC2
sudo-1.8.22-4.18.1
Image SLES15-SP1-CHOST-BYOS-GCE
sudo-1.8.22-4.18.1
Image SLES15-SP1-EC2-HPC-HVM-BYOS
sudo-1.8.22-4.18.1
Image SLES15-SP1-EC2-HVM-BYOS
sudo-1.8.22-4.18.1
Image SLES15-SP1-GCE-BYOS
sudo-1.8.22-4.18.1
Image SLES15-SP1-SAP-Azure
sudo-1.8.22-4.18.1
Image SLES15-SP1-SAP-Azure-BYOS
sudo-1.8.22-4.18.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production
sudo-1.8.22-4.18.1
Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production
sudo-1.8.22-4.18.1
Image SLES15-SP1-SAP-EC2-HVM
sudo-1.8.22-4.18.1
Image SLES15-SP1-SAP-EC2-HVM-BYOS
sudo-1.8.22-4.18.1
Image SLES15-SP1-SAP-GCE
sudo-1.8.22-4.18.1
Image SLES15-SP1-SAP-GCE-BYOS
sudo-1.8.22-4.18.1
Image SLES15-SP1-SAPCAL-Azure
sudo-1.8.22-4.18.1
Image SLES15-SP1-SAPCAL-EC2-HVM
sudo-1.8.22-4.18.1
Image SLES15-SP1-SAPCAL-GCE
sudo-1.8.22-4.18.1
Image SLES15-SP2-Azure-Basic
sudo-1.8.22-4.18.1
Image SLES15-SP2-Azure-Standard
sudo-1.8.22-4.18.1
Image SLES15-SP2-BYOS-Azure
sudo-1.8.22-4.18.1
Image SLES15-SP2-BYOS-EC2-HVM
sudo-1.8.22-4.18.1
Image SLES15-SP2-BYOS-GCE
sudo-1.8.22-4.18.1
Image SLES15-SP2-CHOST-BYOS-Aliyun
sudo-1.8.22-4.18.1
Image SLES15-SP2-CHOST-BYOS-Azure
sudo-1.8.22-4.18.1
Image SLES15-SP2-CHOST-BYOS-EC2
sudo-1.8.22-4.18.1
Image SLES15-SP2-CHOST-BYOS-GCE
sudo-1.8.22-4.18.1
Image SLES15-SP2-EC2-ECS-HVM
sudo-1.8.22-4.18.1
Image SLES15-SP2-EC2-HVM
sudo-1.8.22-4.18.1
Image SLES15-SP2-GCE
sudo-1.8.22-4.18.1
Image SLES15-SP2-HPC-Azure
sudo-1.8.22-4.18.1
Image SLES15-SP2-HPC-BYOS-Azure
sudo-1.8.22-4.18.1
Image SLES15-SP2-HPC-BYOS-EC2-HVM
sudo-1.8.22-4.18.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-Azure
sudo-1.8.22-4.18.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-EC2-HVM
sudo-1.8.22-4.18.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-GCE
sudo-1.8.22-4.18.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure
sudo-1.8.22-4.18.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM
sudo-1.8.22-4.18.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE
sudo-1.8.22-4.18.1
Image SLES15-SP2-SAP-Azure
sudo-1.8.22-4.18.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production
sudo-1.8.22-4.18.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production
sudo-1.8.22-4.18.1
Image SLES15-SP2-SAP-BYOS-Azure
sudo-1.8.22-4.18.1
Image SLES15-SP2-SAP-BYOS-EC2-HVM
sudo-1.8.22-4.18.1
Image SLES15-SP2-SAP-BYOS-GCE
sudo-1.8.22-4.18.1
Image SLES15-SP2-SAP-EC2-HVM
sudo-1.8.22-4.18.1
Image SLES15-SP2-SAP-GCE
sudo-1.8.22-4.18.1
SUSE Enterprise Storage 6
sudo-1.8.22-4.18.1
sudo-devel-1.8.22-4.18.1
SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS
sudo-1.8.22-4.18.1
sudo-devel-1.8.22-4.18.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS
sudo-1.8.22-4.18.1
sudo-devel-1.8.22-4.18.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS
sudo-1.8.22-4.18.1
sudo-devel-1.8.22-4.18.1
SUSE Linux Enterprise High Performance Computing 15-LTSS
sudo-1.8.22-4.18.1
sudo-devel-1.8.22-4.18.1
SUSE Linux Enterprise Micro 5.0
sudo-1.8.22-4.18.1
SUSE Linux Enterprise Module for Basesystem 15 SP2
sudo-1.8.22-4.18.1
sudo-devel-1.8.22-4.18.1
SUSE Linux Enterprise Server 15 SP1-BCL
sudo-1.8.22-4.18.1
sudo-devel-1.8.22-4.18.1
SUSE Linux Enterprise Server 15 SP1-LTSS
sudo-1.8.22-4.18.1
sudo-devel-1.8.22-4.18.1
SUSE Linux Enterprise Server 15-LTSS
sudo-1.8.22-4.18.1
sudo-devel-1.8.22-4.18.1
SUSE Linux Enterprise Server for SAP Applications 15
sudo-1.8.22-4.18.1
sudo-devel-1.8.22-4.18.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1
sudo-1.8.22-4.18.1
sudo-devel-1.8.22-4.18.1
SUSE Manager Proxy 4.0
sudo-1.8.22-4.18.1
sudo-devel-1.8.22-4.18.1
SUSE Manager Retail Branch Server 4.0
sudo-1.8.22-4.18.1
sudo-devel-1.8.22-4.18.1
SUSE Manager Server 4.0
sudo-1.8.22-4.18.1
sudo-devel-1.8.22-4.18.1

Описание

Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.


Затронутые продукты
Container ses/6/cephcsi/cephcsi:latest:sudo-1.8.22-4.18.1
Container ses/6/rook/ceph:latest:sudo-1.8.22-4.18.1
Container ses/7/cephcsi/cephcsi:latest:sudo-1.8.22-4.18.1
Container ses/7/rook/ceph:latest:sudo-1.8.22-4.18.1

Ссылки
Уязвимость SUSE-SU-2021:1275-1