|
|
Subscribe / Log in / New account

Debian alert DLA-2094-1 (sudo)

From:  Dylan Aïssi <daissi@debian.org>
To:  debian-lts-announce@lists.debian.org
Subject:  [SECURITY] [DLA 2094-1] sudo security update
Date:  Sat, 1 Feb 2020 23:56:58 +0100
Message-ID:   <CA+6XHwQTUuC=NYbDMLitkdJu0FrQBxqmzYAE3kc+9XHir=GDhQ@mail.gmail.com>

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : sudo Version : 1.8.10p3-1+deb8u7 CVE ID : CVE-2019-18634 A stack-based buffer overflow vulnerability in sudo, a program designed to provide limited super user privileges to specific users, triggerable when configured with the pwfeedback option enabled. An unprivileged user can take advantage of this flaw to obtain full root privileges. For Debian 8 "Jessie", this problem has been fixed in version 1.8.10p3-1+deb8u7. We recommend that you upgrade your sudo packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEmjwHvQbeL0FugTpdYS7xYT4FD1QFAl42AecACgkQYS7xYT4F D1TL5g/+KZvR5pPsEwiWCPUBffc8sZjcU+EEYZ70HASVduHbTNBX+jmvcFvdTO7B wGlAzwJ3aXijg+Gg4YJx9xvUSxGWOLGoYYYKE0yko3yVwC9oAHGiLbZwsOkhKnEm TROqoeOmwN4osozz0siVeM6Nk1BPdkNLfn5B4D4KS2dc5HTQSUTd1X5jkKkkmqxF xNb3++NMH6Mf3IsDitGsAy8jzs6U2OlBrzrPttPFYFvxfXEqwgr5N2grehKo1ERI s8ffrjcPhkrA1tUUzh1lg2/BS6Pyn5bxUkFSB7JUOhxoTHkWoAjbDvSeOvFXdUCC rZqd7sFFSzEzU00AB6DHe+IQuQyK+MRStIHujP/hQesW/fSsRpa1ry9CjZ0AiLEJ jJjRqga+D2PAadcuNiGFCigXWbnPGsa55ZX1cMaNn5+25hRgdCdwr7E5g7vIdKA+ rRIdxjmM922HT1EFaxCcSXDCcozNpOYvJx+I1vQzkJOacpqLghH3yelHwtMVvjE5 WtlEgOfFKzCJFJG9WP1hMUZApfPGzY8aPfQFDBgIIVJS/fd85XHl5Kgb7+ZdMCaq BAIBNqGNRBokgH2niSr0iLc6isrBKr0pSZ8RMyw0HESEyPlXkAkNiGOZsNzr9ykP BTXCl7TDHBFUi+yiDJW4RAKWRCCLtgz7wve3fS1gj+Dm+y7nRZA= =OTaP -----END PGP SIGNATURE-----


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds