Login
Newsletter
Werbung

Sicherheit: Preisgabe von Informationen in sudo
Aktuelle Meldungen Distributionen
Name: Preisgabe von Informationen in sudo
ID: FEDORA-2015-2281
Distribution: Fedora
Plattformen: Fedora 21
Datum: So, 22. Februar 2015, 10:48
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9680
Applikationen: sudo

Originalnachricht

Name        : sudo
Product : Fedora 21
Version : 1.8.12
Release : 1.fc21
URL : http://www.courtesan.com/sudo/
Summary : Allows restricted root access for specified users
Description :
Sudo (superuser do) allows a system administrator to give certain
users (or groups of users) the ability to run some (or all) commands
as root while logging all commands and arguments. Sudo operates on a
per-command basis. It is not a replacement for the shell. Features
include: the ability to restrict what commands a user may run on a
per-host basis, copious logging of each command (providing a clear
audit trail of who did what), a configurable timeout of the sudo
command, and the ability to use the same configuration file (sudoers)
on many different machines.

-------------------------------------------------------------------------------
-
Update Information:

- update to 1.8.12
- fixes CVE-2014-9680
-------------------------------------------------------------------------------
-
ChangeLog:

* Wed Feb 18 2015 Daniel Kopecek <dkopecek@redhat.com> - 1.8.12
- update to 1.8.12
- fixes CVE-2014-9680
* Mon Nov 3 2014 Daniel Kopecek <dkopecek@redhat.com> - 1.8.11p2-1
- update to 1.8.11p2
- added patch to fix upstream bug #671 -- exiting immediately
when audit is disabled
* Tue Sep 30 2014 Daniel Kopecek <dkopecek@redhat.com> - 1.8.11-1
- update to 1.8.11
- major changes & fixes:
- when running a command in the background, sudo will now forward
SIGINFO to the command
- the passwords in ldap.conf and ldap.secret may now be encoded in base64.
- SELinux role changes are now audited. For sudoedit, we now audit
the actual editor being run, instead of just the sudoedit command.
- it is now possible to match an environment variable's value as well as
its name using env_keep and env_check
- new files created via sudoedit as a non-root user now have the proper group
id
- sudoedit now works correctly in conjunction with sudo's SELinux RBAC
support
- it is now possible to disable network interface probing in sudo.conf by
changing the value of the probe_interfaces setting
- when listing a user's privileges (sudo -l), the sudoers plugin will now
prompt
for the user's password even if the targetpw, rootpw or runaspw options
are set.
- the new use_netgroups sudoers option can be used to explicitly enable or
disable
netgroups support
- visudo can now export a sudoers file in JSON format using the new -x flag
- added patch to read ldap.conf more closely to nss_ldap
- require /usr/bin/vi instead of vim-minimal
- include pam.d/system-auth in PAM session phase from pam.d/sudo
- include pam.d/sudo in PAM session phase from pam.d/sudo-i
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1191144 - CVE-2014-9680 sudo: unsafe handling of TZ environment
variable
https://bugzilla.redhat.com/show_bug.cgi?id=1191144
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update sudo' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung