SCIENTIFIC-LINUX-ERRATA Archives

July 2012

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Patrick Riehecky <[log in to unmask]>
Reply To:
Date:
Mon, 16 Jul 2012 16:25:49 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (34 lines)
Synopsis:    Moderate: sudo security update
Issue Date:  2012-07-16
CVE Numbers: CVE-2012-2337


The sudo (superuser do) utility allows system administrators to give
certain users the ability to run commands as root.

A flaw was found in the way the network matching code in sudo handled
multiple IP networks listed in user specification configuration directives.
A user, who is authorized to run commands with sudo on specific hosts,
could use this flaw to bypass intended restrictions and run those commands
on hosts not matched by any of the network specifications. (CVE-2012-2337)

All users of sudo are advised to upgrade to this updated package, which
contains a backported patch to correct this issue.

SL5:
  i386
     sudo-1.7.2p1-14.el5_8.i386.rpm
     sudo-debuginfo-1.7.2p1-14.el5_8.i386.rpm
  x86_64
     sudo-1.7.2p1-14.el5_8.x86_64.rpm
     sudo-debuginfo-1.7.2p1-14.el5_8.x86_64.rpm
SL6:
  i386
     sudo-1.7.4p5-12.el6_3.i686.rpm
     sudo-debuginfo-1.7.4p5-12.el6_3.i686.rpm
  x86_64
     sudo-1.7.4p5-12.el6_3.x86_64.rpm
     sudo-debuginfo-1.7.4p5-12.el6_3.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2