Ubuntu alert USN-4263-2 (sudo)
| From: | "Leonidas S. Barbosa" <leo.barbosa@canonical.com> | |
| To: | ubuntu-security-announce@lists.ubuntu.com | |
| Subject: | [USN-4263-2] Sudo vulnerability | |
| Date: | Wed, 5 Feb 2020 10:40:48 -0300 | |
| Message-ID: | <20200205134048.GA30234@d4rkl41n> |
========================================================================== Ubuntu Security Notice USN-4263-2 February 05, 2020 sudo vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 ESM - Ubuntu 12.04 ESM Summary: Sudo could allow unintended access to the administrator account. Software Description: - sudo: Provide limited super user privileges to specific users Details: USN-4263-1 fixed a vulnerability in Sudo. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Original advisory details: Joe Vennix discovered that Sudo incorrectly handled memory operations when the pwfeedback option is enabled. A local attacker could possibly use this issue to obtain unintended access to the administrator account. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 ESM: sudo 1.8.9p5-1ubuntu1.5+esm3 sudo-ldap 1.8.9p5-1ubuntu1.5+esm3 Ubuntu 12.04 ESM: sudo 1.8.3p1-1ubuntu3.9 sudo-ldap 1.8.3p1-1ubuntu3.9 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/4263-2 https://usn.ubuntu.com/4263-1 CVE-2019-18634 -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...
