|
|
Log in / Subscribe / Register

Ubuntu alert USN-3968-2 (sudo)

From:  "Leonidas S. Barbosa" <leo.barbosa@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-3968-2] Sudo vulnerability
Date:  Wed, 29 May 2019 14:36:24 -0300
Message-ID:  <1559151384.10529.18.camel@canonical.com>

========================================================================== Ubuntu Security Notice USN-3968-2 May 29, 2019 sudo vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 ESM Summary: Sudo could be made to overwrite files if it received a specially crafted input. Software Description: - sudo: Provide limited super user privileges to specific users Details: USN-3968-1 fixed a vulnerability in Sudo. This update provides the corresponding update for Ubuntu 14.04 ESM. Original advisory details:  It was discovered that Sudo did not properly parse the contents of  /proc/[pid]/stat when attempting to determine its controlling tty. A  local attacker in some configurations could possibly use this to  overwrite any file on the filesystem, bypassing intended permissions.  (CVE-2017-1000368) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 ESM:   sudo                            1.8.9p5-1ubuntu1.5+esm1   sudo-ldap                       1.8.9p5-1ubuntu1.5+esm1 In general, a standard system update will make all the necessary changes. References:   https://usn.ubuntu.com/usn/usn-3968-2   https://usn.ubuntu.com/usn/usn-3968-1   CVE-2017-1000368-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds