Sicherheit: Pufferüberlauf in sudo
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in sudo
ID: FEDORA-2012-1028
Distribution: Fedora
Plattformen: Fedora 16
Datum: Mi, 1. Februar 2012, 07:37
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0809
Applikationen: sudo


Name        : sudo
Product : Fedora 16
Version : 1.8.3p1
Release : 2.fc16
URL : http://www.courtesan.com/sudo/
Summary : Allows restricted root access for specified users
Description :
Sudo (superuser do) allows a system administrator to give certain
users (or groups of users) the ability to run some (or all) commands
as root while logging all commands and arguments. Sudo operates on a
per-command basis. It is not a replacement for the shell. Features
include: the ability to restrict what commands a user may run on a
per-host basis, copious logging of each command (providing a clear
audit trail of who did what), a configurable timeout of the sudo
command, and the ability to use the same configuration file (sudoers)
on many different machines.

Update Information:

- fixed CVE-2012-0809


* Thu Jan 26 2012 Daniel Kopecek <dkopecek@redhat.com> - 1.8.3p1-2
- added patch for CVE-2012-0809
* Thu Nov 10 2011 Daniel Kopecek <dkopecek@redhat.com> - 1.8.3p1-1
- update to 1.8.3p1
- disable output word wrapping if the output is piped

[ 1 ] Bug #784443 - CVE-2012-0809 sudo: format string flaw in sudo_debug()

This update can be installed with the "yum" update program. Use
su -c 'yum update sudo' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list
Pro-Linux @Facebook
Neue Nachrichten