You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa sudo

Sigurnosni nedostaci programskog paketa sudo

——————————————————————————–
Fedora Update Notification
FEDORA-2020-8b563bc5f4
2020-03-06 02:21:35.887216
——————————————————————————–

Name : sudo
Product : Fedora 31
Version : 1.9.0
Release : 0.1.b1.fc31
URL : http://www.courtesan.com/sudo/
Summary : Allows restricted root access for specified users
Description :
Sudo (superuser do) allows a system administrator to give certain
users (or groups of users) the ability to run some (or all) commands
as root while logging all commands and arguments. Sudo operates on a
per-command basis. It is not a replacement for the shell. Features
include: the ability to restrict what commands a user may run on a
per-host basis, copious logging of each command (providing a clear
audit trail of who did what), a configurable timeout of the sudo
command, and the ability to use the same configuration file (sudoers)
on many different machines.

——————————————————————————–
Update Information:

– update to latest development version 1.9.0b1 – added sudo_logsrvd and
sudo_sendlog to files and their appropriate man pages Resolves: rhbz#1787823 –
Stack based buffer overflow in when pwfeedback is enabled Resolves: rhbz#1796945
– fixes: CVE-2019-18634 – By using ! character in the shadow file instead of a
password hash can access to a run as all sudoer account Resolves: rhbz#1786709 –
fixes CVE-2019-19234 – attacker with access to a Runas ALL sudoer account can
impersonate a nonexistent user Resolves: rhbz#1786705 – fixes CVE-2019-19232 –
setrlimit(RLIMIT_CORE): Operation not permitted warning message fix Resolves:
rhbz#1773148
——————————————————————————–
ChangeLog:

* Mon Feb 24 2020 Attila Lakatos <alakatos@redhat.com> – 1.9.0-0.1.b1
– update to latest development version 1.9.0b1
– added sudo_logsrvd and sudo_sendlog to files and their appropriate man pages
Resolves: rhbz#1787823
– Stack based buffer overflow in when pwfeedback is enabled
Resolves: rhbz#1796945
– fixes: CVE-2019-18634
– By using ! character in the shadow file instead of a password hash can access to a run as all sudoer account
Resolves: rhbz#1786709
– fixes CVE-2019-19234
– attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user
Resolves: rhbz#1786705
– fixes CVE-2019-19232
– setrlimit(RLIMIT_CORE): Operation not permitted warning message fix
Resolves: rhbz#1773148
* Mon Nov 11 2019 Radovan Sroka <rsroka@redhat.com> – 1.8.29-1
– rebase to 1.8.29
Resolves: rhbz#1766233
* Tue Oct 22 2019 Radovan Sroka <rsroka@redhat.com> – 1.8.28p1-1
– rebase to 1.8.28p1
Resolves: rhbz#1762350
——————————————————————————–
References:

[ 1 ] Bug #1787823 – sudo-1.8.31 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1787823
[ 2 ] Bug #1796945 – CVE-2019-18634 sudo: Stack based buffer overflow in when pwfeedback is enabled [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1796945
[ 3 ] Bug #1786709 – CVE-2019-19234 sudo: by using ! character in the shadow file instead of a password hash can access to a run as all sudoer account [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1786709
[ 4 ] Bug #1786705 – CVE-2019-19232 sudo: attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1786705
[ 5 ] Bug #1773148 – sudo: setrlimit(RLIMIT_CORE): Operation not permitted
https://bugzilla.redhat.com/show_bug.cgi?id=1773148
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2020-8b563bc5f4’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa squid

Otkriveni su sigurnosni nedostaci u programskom paketu squid za operacijski sustav openSUSE. Otkriveni nedostaci potencijalnim udaljenim napadačima omogućuju izazivanje DoS...

Close