|
|
Subscribe / Log in / New account

Mageia alert MGASA-2016-0261 (sudo)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2016-0261: Updated sudo packages fix security vulnerability
Date:  Tue, 26 Jul 2016 23:16:56 +0200
Message-ID:  <20160726211656.89F4D9F76A@duvel.mageia.org>

MGASA-2016-0261 - Updated sudo packages fix security vulnerability Publication date: 26 Jul 2016 URL: http://advisories.mageia.org/MGASA-2016-0261.html Type: security Affected Mageia releases: 5 CVE: CVE-2015-8239 Description: A vulnerability in functionality for adding support of SHA-2 digests along with the command was found. The sudoers plugin performs this digest verification while matching rules, and later independently calls execve() to execute the binary. This results in a race condition if the digest functionality is used as suggested (in fact, the rules are matched before the user is prompted for a password, so there is not negligible time frame to replace the binary from underneath sudo) (CVE-2015-8239). References: - https://bugs.mageia.org/show_bug.cgi?id=18989 - https://lists.fedoraproject.org/archives/list/package-ann... - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8239 SRPMS: - 5/core/sudo-1.8.17p1-1.mga5


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds