Lucene search

K
slackwareSlackware Linux ProjectSSA-2015-047-03
HistoryFeb 16, 2015 - 9:15 p.m.

[slackware-security] sudo

2015-02-1621:15:57
Slackware Linux Project
www.slackware.com
18

3.3 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.0004 Low

EPSS

Percentile

5.2%

New sudo packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
and -current to fix a security issue.

Here are the details from the Slackware 14.1 ChangeLog:

patches/packages/sudo-1.8.12-i486-1_slack14.1.txz: Upgraded.
This update fixes a potential security issue by only passing the TZ
environment variable it is considered safe. This prevents exploiting bugs
in glibc’s TZ parser that could be used to read files that the user does
not have access to, or to cause a denial of service.
For more information, see:
http://www.sudo.ws/sudo/alerts/tz.html
https://vulners.com/cve/CVE-2014-9680
(* Security fix *)

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/sudo-1.8.12-i486-1_slack13.0.txz

Updated package for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/sudo-1.8.12-x86_64-1_slack13.0.txz

Updated package for Slackware 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/sudo-1.8.12-i486-1_slack13.1.txz

Updated package for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/sudo-1.8.12-x86_64-1_slack13.1.txz

Updated package for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/sudo-1.8.12-i486-1_slack13.37.txz

Updated package for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/sudo-1.8.12-x86_64-1_slack13.37.txz

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/sudo-1.8.12-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/sudo-1.8.12-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/sudo-1.8.12-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/sudo-1.8.12-x86_64-1_slack14.1.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/ap/sudo-1.8.12-i486-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/ap/sudo-1.8.12-x86_64-1.txz

MD5 signatures:

Slackware 13.0 package:
035101ffefe581d4147bc82cae995f20 sudo-1.8.12-i486-1_slack13.0.txz

Slackware x86_64 13.0 package:
cb041dc9ae54add3a7933e1c0c0697fb sudo-1.8.12-x86_64-1_slack13.0.txz

Slackware 13.1 package:
942fe050f8dfc56d4c163ccaaec04f29 sudo-1.8.12-i486-1_slack13.1.txz

Slackware x86_64 13.1 package:
5240ada948250e29773823a179bd5f7c sudo-1.8.12-x86_64-1_slack13.1.txz

Slackware 13.37 package:
ee8fc289076d61cf11f2ccf820704d00 sudo-1.8.12-i486-1_slack13.37.txz

Slackware x86_64 13.37 package:
9a37c7f40f496ea9531295910483a23c sudo-1.8.12-x86_64-1_slack13.37.txz

Slackware 14.0 package:
8ff36c6c8b9034b2da68ae44e4a9e779 sudo-1.8.12-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
941e59e982171bae13c3b41bb178a1af sudo-1.8.12-x86_64-1_slack14.0.txz

Slackware 14.1 package:
e2cb4be14b19cd9272373e10e0bd9882 sudo-1.8.12-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
5cda2e6cb8079542819f1daeb3e7c656 sudo-1.8.12-x86_64-1_slack14.1.txz

Slackware -current package:
1b2e4523131873d75de134673f26f876 ap/sudo-1.8.12-i486-1.txz

Slackware x86_64 -current package:
74264293c2e69cbdf7f58dbb87b9c2ae ap/sudo-1.8.12-x86_64-1.txz

Installation instructions:

Upgrade the package as root:
> upgradepkg sudo-1.8.12-i486-1_slack14.1.txz

3.3 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.0004 Low

EPSS

Percentile

5.2%