sudo-1.8.29-7.el8

エラータID: AXSA:2021-1920:05

Release date: 
Friday, June 11, 2021 - 07:24
Subject: 
sudo-1.8.29-7.el8
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
Low
Description: 

The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root.

Security Fix(es):

* sudo: symbolic link attack in SELinux-enabled sudoedit (CVE-2021-23240)
* sudo: possible directory existence test due to race condition in sudoedit (CVE-2021-23239)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2021-23239
The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.
CVE-2021-23240
selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. sudo-1.8.29-7.el8.src.rpm
    MD5: 4d978b2b32821549a389e5f3194844de
    SHA-256: 6bc94e46097221bb35cee47c8d9b3c041a66f7657d8442e1a7d89119d4d1d8f2
    Size: 3.26 MB

Asianux Server 8 for x86_64
  1. sudo-1.8.29-7.el8.x86_64.rpm
    MD5: 3d228ca1557cf5669652b0e8a91286b5
    SHA-256: caf6b42b10b46fe5862105d57d98b90a200278af2619cfbfc406940755e44d83
    Size: 923.98 kB