drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Preisgabe von Informationen in sudo
Name: |
Preisgabe von Informationen in sudo |
|
ID: |
FEDORA-2015-2281 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 21 |
|
Datum: |
So, 22. Februar 2015, 10:48 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9680 |
|
Applikationen: |
sudo |
|
Originalnachricht |
Name : sudo Product : Fedora 21 Version : 1.8.12 Release : 1.fc21 URL : http://www.courtesan.com/sudo/ Summary : Allows restricted root access for specified users Description : Sudo (superuser do) allows a system administrator to give certain users (or groups of users) the ability to run some (or all) commands as root while logging all commands and arguments. Sudo operates on a per-command basis. It is not a replacement for the shell. Features include: the ability to restrict what commands a user may run on a per-host basis, copious logging of each command (providing a clear audit trail of who did what), a configurable timeout of the sudo command, and the ability to use the same configuration file (sudoers) on many different machines.
------------------------------------------------------------------------------- - Update Information:
- update to 1.8.12
- fixes CVE-2014-9680 ------------------------------------------------------------------------------- - ChangeLog:
* Wed Feb 18 2015 Daniel Kopecek <dkopecek@redhat.com> - 1.8.12 - update to 1.8.12 - fixes CVE-2014-9680 * Mon Nov 3 2014 Daniel Kopecek <dkopecek@redhat.com> - 1.8.11p2-1 - update to 1.8.11p2 - added patch to fix upstream bug #671 -- exiting immediately when audit is disabled * Tue Sep 30 2014 Daniel Kopecek <dkopecek@redhat.com> - 1.8.11-1 - update to 1.8.11 - major changes & fixes: - when running a command in the background, sudo will now forward SIGINFO to the command - the passwords in ldap.conf and ldap.secret may now be encoded in base64. - SELinux role changes are now audited. For sudoedit, we now audit the actual editor being run, instead of just the sudoedit command. - it is now possible to match an environment variable's value as well as its name using env_keep and env_check - new files created via sudoedit as a non-root user now have the proper group id - sudoedit now works correctly in conjunction with sudo's SELinux RBAC support - it is now possible to disable network interface probing in sudo.conf by changing the value of the probe_interfaces setting - when listing a user's privileges (sudo -l), the sudoers plugin will now prompt for the user's password even if the targetpw, rootpw or runaspw options are set. - the new use_netgroups sudoers option can be used to explicitly enable or disable netgroups support - visudo can now export a sudoers file in JSON format using the new -x flag - added patch to read ldap.conf more closely to nss_ldap - require /usr/bin/vi instead of vim-minimal - include pam.d/system-auth in PAM session phase from pam.d/sudo - include pam.d/sudo in PAM session phase from pam.d/sudo-i ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1191144 - CVE-2014-9680 sudo: unsafe handling of TZ environment variable https://bugzilla.redhat.com/show_bug.cgi?id=1191144 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update sudo' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|