ALT-BU-2019-4039-1
Branch p8 update bulletin.
Closed vulnerabilities
BDU:2017-01283
Уязвимость функции get_process_ttyname программы системного администрирования Sudo может позволить нарушителю повысить привилегии до уровня суперпользователя и выполнить произвольный код
BDU:2019-03696
Уязвимость программы системного администрирования Sudo, существующая из-за недостаточной проверки входных данных, выполнить произвольные команды с привилегиями root
BDU:2020-00855
Уязвимость функции stdin getln программы системного администрирования Sudo, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-21
CVE-2017-1000367
Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution.
- SUSE-SU-2017:1446
- SUSE-SU-2017:1446
- SUSE-SU-2017:1450
- SUSE-SU-2017:1450
- openSUSE-SU-2017:1455
- openSUSE-SU-2017:1455
- http://packetstormsecurity.com/files/142783/Sudo-get_process_ttyname-Race-Condition.html
- http://packetstormsecurity.com/files/142783/Sudo-get_process_ttyname-Race-Condition.html
- 20170602 Qualys Security Advisory - CVE-2017-1000367 in Sudo's get_process_ttyname() for Linux
- 20170602 Qualys Security Advisory - CVE-2017-1000367 in Sudo's get_process_ttyname() for Linux
- DSA-3867
- DSA-3867
- [oss-security] 20170530 Qualys Security Advisory - CVE-2017-1000367 in Sudo's get_process_ttyname() for Linux
- [oss-security] 20170530 Qualys Security Advisory - CVE-2017-1000367 in Sudo's get_process_ttyname() for Linux
- [oss-security] 20221222 Re: [Linux] /proc/pid/stat parsing bugs
- [oss-security] 20221222 Re: [Linux] /proc/pid/stat parsing bugs
- [oss-security] 20221222 Re: [Linux] /proc/pid/stat parsing bugs
- [oss-security] 20221222 Re: [Linux] /proc/pid/stat parsing bugs
- 98745
- 98745
- 1038582
- 1038582
- USN-3304-1
- USN-3304-1
- RHSA-2017:1381
- RHSA-2017:1381
- RHSA-2017:1382
- RHSA-2017:1382
- FEDORA-2017-54580efa82
- FEDORA-2017-54580efa82
- GLSA-201705-15
- GLSA-201705-15
- 42183
- 42183
- https://www.sudo.ws/alerts/linux_tty.html
- https://www.sudo.ws/alerts/linux_tty.html
Modified: 2024-11-21
CVE-2019-14287
In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.
- openSUSE-SU-2019:2316
- openSUSE-SU-2019:2316
- openSUSE-SU-2019:2333
- openSUSE-SU-2019:2333
- http://packetstormsecurity.com/files/154853/Slackware-Security-Advisory-sudo-Updates.html
- http://packetstormsecurity.com/files/154853/Slackware-Security-Advisory-sudo-Updates.html
- [oss-security] 20191014 Sudo: CVE-2019-14287
- [oss-security] 20191014 Sudo: CVE-2019-14287
- [oss-security] 20191023 Membership application for linux-distros - VMware
- [oss-security] 20191023 Membership application for linux-distros - VMware
- [oss-security] 20191029 Re: Membership application for linux-distros - VMware
- [oss-security] 20191029 Re: Membership application for linux-distros - VMware
- [oss-security] 20210914 Re: Oracle Solaris membership in the distros list
- [oss-security] 20210914 Re: Oracle Solaris membership in the distros list
- RHBA-2019:3248
- RHBA-2019:3248
- RHSA-2019:3197
- RHSA-2019:3197
- RHSA-2019:3204
- RHSA-2019:3204
- RHSA-2019:3205
- RHSA-2019:3205
- RHSA-2019:3209
- RHSA-2019:3209
- RHSA-2019:3219
- RHSA-2019:3219
- RHSA-2019:3278
- RHSA-2019:3278
- RHSA-2019:3694
- RHSA-2019:3694
- RHSA-2019:3754
- RHSA-2019:3754
- RHSA-2019:3755
- RHSA-2019:3755
- RHSA-2019:3895
- RHSA-2019:3895
- RHSA-2019:3916
- RHSA-2019:3916
- RHSA-2019:3941
- RHSA-2019:3941
- RHSA-2019:4191
- RHSA-2019:4191
- RHSA-2020:0388
- RHSA-2020:0388
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1964-1] sudo security update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1964-1] sudo security update
- FEDORA-2019-9cb221f2be
- FEDORA-2019-9cb221f2be
- FEDORA-2019-72755db9c7
- FEDORA-2019-72755db9c7
- FEDORA-2019-67998e9f7e
- FEDORA-2019-67998e9f7e
- https://resources.whitesourcesoftware.com/blog-whitesource/new-vulnerability-in-sudo-cve-2019-14287
- https://resources.whitesourcesoftware.com/blog-whitesource/new-vulnerability-in-sudo-cve-2019-14287
- 20191015 [slackware-security] sudo (SSA:2019-287-01)
- 20191015 [slackware-security] sudo (SSA:2019-287-01)
- 20191015 [SECURITY] [DSA 4543-1] sudo security update
- 20191015 [SECURITY] [DSA 4543-1] sudo security update
- GLSA-202003-12
- GLSA-202003-12
- https://security.netapp.com/advisory/ntap-20191017-0003/
- https://security.netapp.com/advisory/ntap-20191017-0003/
- https://support.f5.com/csp/article/K53746212?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K53746212?utm_source=f5support&%3Butm_medium=RSS
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03976en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03976en_us
- USN-4154-1
- USN-4154-1
- DSA-4543
- DSA-4543
- [oss-security] 20191015 Re: Sudo: CVE-2019-14287
- [oss-security] 20191015 Re: Sudo: CVE-2019-14287
- https://www.sudo.ws/alerts/minus_1_uid.html
- https://www.sudo.ws/alerts/minus_1_uid.html
Modified: 2024-11-21
CVE-2019-18634
In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.
- openSUSE-SU-2020:0244
- openSUSE-SU-2020:0244
- http://packetstormsecurity.com/files/156174/Slackware-Security-Advisory-sudo-Updates.html
- http://packetstormsecurity.com/files/156174/Slackware-Security-Advisory-sudo-Updates.html
- http://packetstormsecurity.com/files/156189/Sudo-1.8.25p-Buffer-Overflow.html
- http://packetstormsecurity.com/files/156189/Sudo-1.8.25p-Buffer-Overflow.html
- 20200131 APPLE-SA-2020-1-28-2 macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra
- 20200131 APPLE-SA-2020-1-28-2 macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra
- [oss-security] 20200130 CVE-2019-18634: buffer overflow in sudo when pwfeedback is enabled
- [oss-security] 20200130 CVE-2019-18634: buffer overflow in sudo when pwfeedback is enabled
- [oss-security] 20200131 Re: CVE-2019-18634: buffer overflow in sudo when pwfeedback is enabled
- [oss-security] 20200131 Re: CVE-2019-18634: buffer overflow in sudo when pwfeedback is enabled
- [oss-security] 20200205 Re: CVE-2019-18634: buffer overflow in sudo when pwfeedback is enabled
- [oss-security] 20200205 Re: CVE-2019-18634: buffer overflow in sudo when pwfeedback is enabled
- [oss-security] 20200205 Re: CVE-2019-18634: buffer overflow in sudo when pwfeedback is enabled
- [oss-security] 20200205 Re: CVE-2019-18634: buffer overflow in sudo when pwfeedback is enabled
- RHSA-2020:0487
- RHSA-2020:0487
- RHSA-2020:0509
- RHSA-2020:0509
- RHSA-2020:0540
- RHSA-2020:0540
- RHSA-2020:0726
- RHSA-2020:0726
- [debian-lts-announce] 20200201 [SECURITY] [DLA 2094-1] sudo security update
- [debian-lts-announce] 20200201 [SECURITY] [DLA 2094-1] sudo security update
- FEDORA-2020-7c1b270959
- FEDORA-2020-7c1b270959
- FEDORA-2020-8b563bc5f4
- FEDORA-2020-8b563bc5f4
- 20200203 [SECURITY] [DSA 4614-1] sudo security update
- 20200203 [SECURITY] [DSA 4614-1] sudo security update
- 20200203 [slackware-security] sudo (SSA:2020-031-01)
- 20200203 [slackware-security] sudo (SSA:2020-031-01)
- 20200129 APPLE-SA-2020-1-28-2 macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra
- 20200129 APPLE-SA-2020-1-28-2 macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra
- GLSA-202003-12
- GLSA-202003-12
- https://security.netapp.com/advisory/ntap-20200210-0001/
- https://security.netapp.com/advisory/ntap-20200210-0001/
- https://support.apple.com/kb/HT210919
- https://support.apple.com/kb/HT210919
- USN-4263-1
- USN-4263-1
- USN-4263-2
- USN-4263-2
- DSA-4614
- DSA-4614
- https://www.sudo.ws/alerts/pwfeedback.html
- https://www.sudo.ws/alerts/pwfeedback.html
- https://www.sudo.ws/security.html
- https://www.sudo.ws/security.html
Closed bugs
Использование sudo для группы wheel по умолчанию
%post(sudo-1:1.8.25p1-alt2.mipsel) scriptlet failed
CVE-2019-14287 в sudo < 1.8.28