Sicherheit: Ausführen von Code mit höheren Privilegien in sudo
Aktuelle Meldungen Distributionen
Name: Ausführen von Code mit höheren Privilegien in sudo
ID: FEDORA-2017-8b250ebe97
Distribution: Fedora
Plattformen: Fedora 26
Datum: Sa, 10. Juni 2017, 12:05
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000367
Applikationen: sudo


Fedora Update Notification
2017-06-09 18:48:36.548614

Name : sudo
Product : Fedora 26
Version : 1.8.20p2
Release : 1.fc26
URL : http://www.courtesan.com/sudo/
Summary : Allows restricted root access for specified users
Description :
Sudo (superuser do) allows a system administrator to give certain
users (or groups of users) the ability to run some (or all) commands
as root while logging all commands and arguments. Sudo operates on a
per-command basis. It is not a replacement for the shell. Features
include: the ability to restrict what commands a user may run on a
per-host basis, copious logging of each command (providing a clear
audit trail of who did what), a configurable timeout of the sudo
command, and the ability to use the same configuration file (sudoers)
on many different machines.

Update Information:

- update to 1.8.20p2 - added sudo package to dnf/yum protected packages
---- - update to 1.8.20p1 - fixes CVE-2017-1000367

[ 1 ] Bug #1453074 - CVE-2017-1000367 sudo: Privilege escalation in via
improper get_process_ttyname() parsing

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade sudo' at the command line.
For more information, refer to the dnf documentation available at

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Pro-Linux @Facebook
Neue Nachrichten