sudo vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 ESM
Summary
Sudo could be made to overwrite files if it received a specially crafted input.
Software Description
- sudo - Provide limited super user privileges to specific users
Details
USN-3968-1 fixed a vulnerability in Sudo. This update provides the corresponding update for Ubuntu 14.04 ESM.
Original advisory details:
It was discovered that Sudo did not properly parse the contents of /proc/[pid]/stat when attempting to determine its controlling tty. A local attacker in some configurations could possibly use this to overwrite any file on the filesystem, bypassing intended permissions. (CVE-2017-1000368)
Update instructions
The problem can be corrected by updating your system to the following package versions:
- Ubuntu 14.04 ESM
- sudo - 1.8.9p5-1ubuntu1.5+esm1
- sudo-ldap - 1.8.9p5-1ubuntu1.5+esm1
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.
References
from Ubuntu Security Notices http://bit.ly/2JKzYjs
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.