Wednesday, May 29, 2019

USN-3968-2: Sudo vulnerability

sudo vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 ESM

Summary

Sudo could be made to overwrite files if it received a specially crafted input.

Software Description

  • sudo - Provide limited super user privileges to specific users

Details

USN-3968-1 fixed a vulnerability in Sudo. This update provides the corresponding update for Ubuntu 14.04 ESM.

Original advisory details:

It was discovered that Sudo did not properly parse the contents of /proc/[pid]/stat when attempting to determine its controlling tty. A local attacker in some configurations could possibly use this to overwrite any file on the filesystem, bypassing intended permissions. (CVE-2017-1000368)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 ESM
sudo - 1.8.9p5-1ubuntu1.5+esm1
sudo-ldap - 1.8.9p5-1ubuntu1.5+esm1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References



from Ubuntu Security Notices http://bit.ly/2JKzYjs

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.