|
| 1 | +advisory_id: RHSA-2020:0509-sig-key-alias |
| 2 | +cdn_file_list: |
| 3 | + sudo-1.8.25p1-4.el8_0.3: |
| 4 | + checksums: |
| 5 | + md5: |
| 6 | + sudo-1.8.25p1-4.el8_0.3.ppc64le.rpm: 0d56f302617696d3511e71e1669e62c0 |
| 7 | + sudo-1.8.25p1-4.el8_0.3.src.rpm: f94ab3724b498e3faeab643fe2a67c9c |
| 8 | + sudo-1.8.25p1-4.el8_0.3.x86_64.rpm: 25e9470c4fe96034fe1d7525c04b5d8e |
| 9 | + sudo-debuginfo-1.8.25p1-4.el8_0.3.ppc64le.rpm: e242826fb38f487502cdc1f1a06991d2 |
| 10 | + sudo-debuginfo-1.8.25p1-4.el8_0.3.x86_64.rpm: 91126f02975c06015880d6ea99cb2760 |
| 11 | + sudo-debugsource-1.8.25p1-4.el8_0.3.ppc64le.rpm: d6da7e2e3d9efe050fef2e8d047682be |
| 12 | + sudo-debugsource-1.8.25p1-4.el8_0.3.x86_64.rpm: 6b0967941c0caf626c073dc7da0272b6 |
| 13 | + sha256: |
| 14 | + sudo-1.8.25p1-4.el8_0.3.ppc64le.rpm: 31c4f73af90c6d267cc5281c59e4a93ae3557b2253d9a8e3fef55f3cafca6e54 |
| 15 | + sudo-1.8.25p1-4.el8_0.3.src.rpm: 10d7724302a60d0d2ca890fc7834b8143df55ba1ce0176469ea634ac4ab7aa28 |
| 16 | + sudo-1.8.25p1-4.el8_0.3.x86_64.rpm: 593f872c1869f7beb963c8df2945fc691a1d999945c8c45c6bc7e02731fa016f |
| 17 | + sudo-debuginfo-1.8.25p1-4.el8_0.3.ppc64le.rpm: 04db0c39efb31518ff79bf98d1c27256d46cdc72b967a5b2094a6efec3166df2 |
| 18 | + sudo-debuginfo-1.8.25p1-4.el8_0.3.x86_64.rpm: 1b7d3a7613236ffea7c4553eb9dea69fc19557005ac3a059d7e83efc08c5b754 |
| 19 | + sudo-debugsource-1.8.25p1-4.el8_0.3.ppc64le.rpm: 355cbb9dc348b17782cff57120391685d6a1f6884facc54fac4b7fb54abeffba |
| 20 | + sudo-debugsource-1.8.25p1-4.el8_0.3.x86_64.rpm: 43e318fa49e4df685ea0d5f0925a00a336236b2e20f27f9365c39a48102c2cf6 |
| 21 | + rpms: |
| 22 | + sudo-1.8.25p1-4.el8_0.3.ppc64le.rpm: |
| 23 | + - rhel-8-for-ppc64le-baseos-e4s-rpms__8_DOT_0 |
| 24 | + sudo-1.8.25p1-4.el8_0.3.src.rpm: |
| 25 | + - rhel-8-for-ppc64le-baseos-e4s-source-rpms__8_DOT_0 |
| 26 | + - rhel-8-for-x86_64-baseos-e4s-source-rpms__8_DOT_0 |
| 27 | + sudo-1.8.25p1-4.el8_0.3.x86_64.rpm: |
| 28 | + - rhel-8-for-x86_64-baseos-e4s-rpms__8_DOT_0 |
| 29 | + sudo-debuginfo-1.8.25p1-4.el8_0.3.ppc64le.rpm: |
| 30 | + - rhel-8-for-ppc64le-baseos-e4s-debug-rpms__8_DOT_0 |
| 31 | + sudo-debuginfo-1.8.25p1-4.el8_0.3.x86_64.rpm: |
| 32 | + - rhel-8-for-x86_64-baseos-e4s-debug-rpms__8_DOT_0 |
| 33 | + sudo-debugsource-1.8.25p1-4.el8_0.3.ppc64le.rpm: |
| 34 | + - rhel-8-for-ppc64le-baseos-e4s-debug-rpms__8_DOT_0 |
| 35 | + sudo-debugsource-1.8.25p1-4.el8_0.3.x86_64.rpm: |
| 36 | + - rhel-8-for-x86_64-baseos-e4s-debug-rpms__8_DOT_0 |
| 37 | + sig_key: foo,bar,baz |
| 38 | +cdn_metadata: |
| 39 | + description: 'The sudo packages contain the sudo utility which allows system administrators |
| 40 | + to provide certain users with the permission to execute privileged commands, which |
| 41 | + are used for system management purposes, without having to log in as root. |
| 42 | +
|
| 43 | +
|
| 44 | + Security Fix(es): |
| 45 | +
|
| 46 | +
|
| 47 | + * sudo: Stack based buffer overflow when pwfeedback is enabled (CVE-2019-18634) |
| 48 | +
|
| 49 | +
|
| 50 | + For more details about the security issue(s), including the impact, a CVSS score, |
| 51 | + acknowledgments, and other related information, refer to the CVE page(s) listed |
| 52 | + in the References section.' |
| 53 | + from: release-engineering@redhat.com |
| 54 | + id: RHSA-2020:0509 |
| 55 | + issued: 2020-02-13 19:00:11 UTC |
| 56 | + pkglist: |
| 57 | + - packages: |
| 58 | + - arch: ppc64le |
| 59 | + epoch: '0' |
| 60 | + filename: sudo-1.8.25p1-4.el8_0.3.ppc64le.rpm |
| 61 | + name: sudo |
| 62 | + release: 4.el8_0.3 |
| 63 | + src: sudo-1.8.25p1-4.el8_0.3.src.rpm |
| 64 | + sum: |
| 65 | + - md5 |
| 66 | + - 0d56f302617696d3511e71e1669e62c0 |
| 67 | + - sha256 |
| 68 | + - 31c4f73af90c6d267cc5281c59e4a93ae3557b2253d9a8e3fef55f3cafca6e54 |
| 69 | + version: 1.8.25p1 |
| 70 | + - arch: SRPMS |
| 71 | + epoch: '0' |
| 72 | + filename: sudo-1.8.25p1-4.el8_0.3.src.rpm |
| 73 | + name: sudo |
| 74 | + release: 4.el8_0.3 |
| 75 | + src: sudo-1.8.25p1-4.el8_0.3.src.rpm |
| 76 | + sum: |
| 77 | + - md5 |
| 78 | + - f94ab3724b498e3faeab643fe2a67c9c |
| 79 | + - sha256 |
| 80 | + - 10d7724302a60d0d2ca890fc7834b8143df55ba1ce0176469ea634ac4ab7aa28 |
| 81 | + version: 1.8.25p1 |
| 82 | + - arch: x86_64 |
| 83 | + epoch: '0' |
| 84 | + filename: sudo-1.8.25p1-4.el8_0.3.x86_64.rpm |
| 85 | + name: sudo |
| 86 | + release: 4.el8_0.3 |
| 87 | + src: sudo-1.8.25p1-4.el8_0.3.src.rpm |
| 88 | + sum: |
| 89 | + - md5 |
| 90 | + - 25e9470c4fe96034fe1d7525c04b5d8e |
| 91 | + - sha256 |
| 92 | + - 593f872c1869f7beb963c8df2945fc691a1d999945c8c45c6bc7e02731fa016f |
| 93 | + version: 1.8.25p1 |
| 94 | + - arch: ppc64le |
| 95 | + epoch: '0' |
| 96 | + filename: sudo-debuginfo-1.8.25p1-4.el8_0.3.ppc64le.rpm |
| 97 | + name: sudo-debuginfo |
| 98 | + release: 4.el8_0.3 |
| 99 | + src: sudo-1.8.25p1-4.el8_0.3.src.rpm |
| 100 | + sum: |
| 101 | + - md5 |
| 102 | + - e242826fb38f487502cdc1f1a06991d2 |
| 103 | + - sha256 |
| 104 | + - 04db0c39efb31518ff79bf98d1c27256d46cdc72b967a5b2094a6efec3166df2 |
| 105 | + version: 1.8.25p1 |
| 106 | + - arch: x86_64 |
| 107 | + epoch: '0' |
| 108 | + filename: sudo-debuginfo-1.8.25p1-4.el8_0.3.x86_64.rpm |
| 109 | + name: sudo-debuginfo |
| 110 | + release: 4.el8_0.3 |
| 111 | + src: sudo-1.8.25p1-4.el8_0.3.src.rpm |
| 112 | + sum: |
| 113 | + - md5 |
| 114 | + - 91126f02975c06015880d6ea99cb2760 |
| 115 | + - sha256 |
| 116 | + - 1b7d3a7613236ffea7c4553eb9dea69fc19557005ac3a059d7e83efc08c5b754 |
| 117 | + version: 1.8.25p1 |
| 118 | + - arch: ppc64le |
| 119 | + epoch: '0' |
| 120 | + filename: sudo-debugsource-1.8.25p1-4.el8_0.3.ppc64le.rpm |
| 121 | + name: sudo-debugsource |
| 122 | + release: 4.el8_0.3 |
| 123 | + src: sudo-1.8.25p1-4.el8_0.3.src.rpm |
| 124 | + reboot_suggested: true |
| 125 | + sum: |
| 126 | + - md5 |
| 127 | + - d6da7e2e3d9efe050fef2e8d047682be |
| 128 | + - sha256 |
| 129 | + - 355cbb9dc348b17782cff57120391685d6a1f6884facc54fac4b7fb54abeffba |
| 130 | + version: 1.8.25p1 |
| 131 | + - arch: x86_64 |
| 132 | + epoch: '0' |
| 133 | + filename: sudo-debugsource-1.8.25p1-4.el8_0.3.x86_64.rpm |
| 134 | + name: sudo-debugsource |
| 135 | + release: 4.el8_0.3 |
| 136 | + src: sudo-1.8.25p1-4.el8_0.3.src.rpm |
| 137 | + sum: |
| 138 | + - md5 |
| 139 | + - 6b0967941c0caf626c073dc7da0272b6 |
| 140 | + - sha256 |
| 141 | + - 43e318fa49e4df685ea0d5f0925a00a336236b2e20f27f9365c39a48102c2cf6 |
| 142 | + version: 1.8.25p1 |
| 143 | + pulp_user_metadata: |
| 144 | + content_types: |
| 145 | + - rpm |
| 146 | + pushcount: '3' |
| 147 | + reboot_suggested: false |
| 148 | + references: |
| 149 | + - href: https://access.redhat.com/errata/RHSA-2020:0509 |
| 150 | + id: null |
| 151 | + title: RHSA-2020:0509 |
| 152 | + type: self |
| 153 | + - href: https://bugzilla.redhat.com/show_bug.cgi?id=1796944 |
| 154 | + id: '1796944' |
| 155 | + title: 'CVE-2019-18634 sudo: Stack based buffer overflow when pwfeedback is enabled' |
| 156 | + type: bugzilla |
| 157 | + - href: https://www.redhat.com/security/data/cve/CVE-2019-18634.html |
| 158 | + id: CVE-2019-18634 |
| 159 | + title: CVE-2019-18634 |
| 160 | + type: cve |
| 161 | + - href: https://access.redhat.com/security/updates/classification/#important |
| 162 | + id: classification |
| 163 | + title: important |
| 164 | + type: other |
| 165 | + release: '0' |
| 166 | + rights: Copyright 2020 Red Hat Inc |
| 167 | + severity: Important |
| 168 | + solution: 'For details on how to apply this update, which includes the changes described |
| 169 | + in this advisory, refer to: |
| 170 | +
|
| 171 | +
|
| 172 | + https://access.redhat.com/articles/11258' |
| 173 | + status: final |
| 174 | + summary: 'An update for sudo is now available for Red Hat Enterprise Linux 8.0 Update |
| 175 | + Services for SAP Solutions. |
| 176 | +
|
| 177 | +
|
| 178 | + Red Hat Product Security has rated this update as having a security impact of |
| 179 | + Important. A Common Vulnerability Scoring System (CVSS) base score, which gives |
| 180 | + a detailed severity rating, is available for each vulnerability from the CVE link(s) |
| 181 | + in the References section.' |
| 182 | + title: 'Important: sudo security update' |
| 183 | + type: security |
| 184 | + updated: 2020-02-13 19:00:11 UTC |
| 185 | + version: '3' |
0 commit comments