Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
home:Alexander_Naumov:SLE-12:Update
patchinfo.4837
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.4837
<patchinfo incident="4837"> <issue id="1039361" tracker="bnc">EMU: VUL-0: EMBARGOED: CVE-2017-1000367: sudo: Qualys new root/setuid privilege escalation method 05-2017</issue> <issue id="1024145" tracker="bnc">Sudoers fqdn not working as expected in SLES12SP2 compared to SLES11SP4</issue> <issue id="981124" tracker="bnc">sudo krb5_ccname does not work</issue> <issue id="1039361" tracker="bnc">EMU: VUL-0: EMBARGOED: CVE-2017-1000367: sudo: path traversal race conditions</issue> <issue id="1015351" tracker="bnc">sudo is not able to resolve sudo for users when using LDAP - fixed upstream</issue> <issue id="2017-1000367" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>kstreitova</packager> <description> This update for sudo fixes the following issues: CVE-2017-1000367: - Due to incorrect assumptions in /proc/[pid]/stat parsing, a local attacker can pretend that his tty is any file on the filesystem, thus gaining arbitrary file write access on SELinux-enabled systems. [bsc#1039361] - Fix FQDN for hostname. [bsc#1024145] - Filter netgroups, they aren't handled by SSSD. [bsc#1015351] - Fix problems related to "krb5_ccname" option [bsc#981124] </description> <summary>Security update for sudo</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor