| Summary: | sudo new security issue CVE-2015-5602 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | critical | ||
| Priority: | Normal | CC: | davidwhodgins, sysadmin-bugs, wilcal.int |
| Version: | 5 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/663793/ | ||
| Whiteboard: | has_procedure mga5-32-ok mga5-64-ok advisory | ||
| Source RPM: | sudo-1.8.12-2.mga5.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2015-11-09 21:54:32 CET
Basic sudo setup if you haven't used it before: https://wiki.mageia.org/en/Configuring_sudo $ sudo echo rpm -q sudo [sudo] password for claire: sudo-1.8.15-1.mga5 Whiteboard:
(none) =>
has_procedure mga5-64-ok OOps copy/paste error.. $ sudo rpm -q sudo [sudo] password for claire: sudo-1.8.15-1.mga5 $ sudo echo "slaps self" slaps self $ sudo whoami root In VirtualBox, M5, KDE, 32-bit Package(s) under test: sudo default install of sudo [root@localhost wilcal]# urpmi sudo Package sudo-1.8.12-2.mga5.i586 is already installed [root@localhost wilcal]# sudo rpm -q sudo sudo-1.8.12-2.mga5 [root@localhost wilcal]# sudo echo "slaps self" slaps self [root@localhost wilcal]# sudo whoami root install sudo from updates_testing [root@localhost wilcal]# urpmi sudo Package sudo-1.8.15-1.mga5.i586 is already installed [root@localhost wilcal]# sudo rpm -q sudo sudo-1.8.15-1.mga5 [root@localhost wilcal]# sudo echo "slaps self" slaps self [root@localhost wilcal]# sudo whoami root CC:
(none) =>
wilcal.int
William Kenney
2015-11-10 17:26:32 CET
Whiteboard:
has_procedure mga5-64-ok =>
has_procedure mga5-32-ok mga5-64-ok This update works fine. Testing complete for MGA5, 32-bit & 64-bit Validating the update. Could someone from the sysadmin team push to updates. Thanks Keywords:
(none) =>
validated_update
Dave Hodgins
2015-11-10 20:40:04 CET
CC:
(none) =>
davidwhodgins An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2015-0443.html Status:
NEW =>
RESOLVED Upstream has issued an advisory on October 26, 2016: https://www.sudo.ws/alerts/noexec_bypass.html LWN reference: http://lwn.net/Vulnerabilities/706476/ That issue, CVE-2016-7032, was also fixed by this update. |