Ubuntu alert USN-3968-2 (sudo)
| From: | "Leonidas S. Barbosa" <leo.barbosa@canonical.com> | |
| To: | ubuntu-security-announce@lists.ubuntu.com | |
| Subject: | [USN-3968-2] Sudo vulnerability | |
| Date: | Wed, 29 May 2019 14:36:24 -0300 | |
| Message-ID: | <1559151384.10529.18.camel@canonical.com> |
========================================================================== Ubuntu Security Notice USN-3968-2 May 29, 2019 sudo vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 ESM Summary: Sudo could be made to overwrite files if it received a specially crafted input. Software Description: - sudo: Provide limited super user privileges to specific users Details: USN-3968-1 fixed a vulnerability in Sudo. This update provides the corresponding update for Ubuntu 14.04 ESM. Original advisory details: It was discovered that Sudo did not properly parse the contents of /proc/[pid]/stat when attempting to determine its controlling tty. A local attacker in some configurations could possibly use this to overwrite any file on the filesystem, bypassing intended permissions. (CVE-2017-1000368) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 ESM: sudo 1.8.9p5-1ubuntu1.5+esm1 sudo-ldap 1.8.9p5-1ubuntu1.5+esm1 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/usn/usn-3968-2 https://usn.ubuntu.com/usn/usn-3968-1 CVE-2017-1000368-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...
