[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2021:0227-1 -- SLES sudo

ID: oval:org.secpod.oval:def:89047251Date: (C)2022-10-21   (M)2024-02-07
Class: PATCHFamily: unix




This update for sudo fixes the following issues: - A Heap-based buffer overflow in sudo could be exploited to allow a user to gain root privileges [bsc#1181090,CVE-2021-3156] - It was possible for a user to test for the existence of a directory due to a Race Condition in `sudoedit` [bsc#1180684,CVE-2021-23239] - A Possible Symlink Attack vector existed in `sudoedit` if SELinux was running in permissive mode [bsc#1180685, CVE-2021-23240] - It was possible for a User to enable Debug Settings not Intended for them [bsc#1180687]

Platform:
SUSE Linux Enterprise Server 15 SP2
SUSE Linux Enterprise Server 15 SP3
SUSE Linux Enterprise Desktop 15 SP2
SUSE Linux Enterprise Desktop 15 SP3
Product:
sudo
Reference:
SUSE-SU-2021:0227-1
CVE-2021-23239
CVE-2021-23240
CVE-2021-3156
CVE    3
CVE-2021-23239
CVE-2021-23240
CVE-2021-3156
CPE    5
cpe:/a:todd_miller:sudo
cpe:/o:suse:suse_linux_enterprise_server:15:sp3
cpe:/o:suse:suse_linux_enterprise_server:15:sp2
cpe:/o:suse:suse_linux_enterprise_desktop:15:sp3
...

© SecPod Technologies