sudo-1.8.23-4.el7.2

エラータID: AXSA:2020-4467:01

Release date: 
Tuesday, February 18, 2020 - 16:46
Subject: 
sudo-1.8.23-4.el7.2
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root.

Security Fix(es):

* sudo: Stack based buffer overflow when pwfeedback is enabled (CVE-2019-18634)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2019-18634
In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. sudo-1.8.23-4.el7.2.src.rpm
    MD5: 32dac2d7f5ddf09af19406edd752aa96
    SHA-256: a8bf688029441e190bd8679b75ebbd0c13e12b08fd2299aa19b0f77e6cde85d3
    Size: 3.06 MB

Asianux Server 7 for x86_64
  1. sudo-1.8.23-4.el7.2.x86_64.rpm
    MD5: 00f9e907b38dc1f8d7701c88a9f00029
    SHA-256: 20bfb0c356c2cb87b445c5df66633cad9b8dfd795dc095fd500589a16866f861
    Size: 840.64 kB