Sudo - Red Hat ENTERPRISE LINUX 5.5 - TECHNICAL NOTES Manual

Table of Contents

Advertisement

1.194.2. RHBA-2010:0174: bug fix update
Note
This update has already been released (prior to the GA of this release) as errata
RHBA-2010:0174
An updated strace package that fixes two bugs is now available.
The strace program intercepts and records the system calls called and received by a running process.
Strace can print a record of each system call, its arguments and its return value.
This updated strace package fixes the following bugs:
* when an strace process was terminated by a signal while the tracee was executing a fork or clone
system call the tracee was forcefully terminated instead of being cleanly detached. This update
corrects this: tracees are now cleanly detached as expected when an strace process is terminated in
the circumstance noted above.
* RHBA-2010:0047, the strace update released to address
on Itanium-based systems. (See References below for a link to this previous release.) The race
condition presented when strace attached to a process while said process was executing the execve
system call. With this update, strace now reliably detects this post-execve trap and, consequently,
avoids the race condition.

1.195. sudo

1.195.1. RHSA-2010:0122: Important security update
Important
This update has already been released (prior to the GA of this release) as the security
RHSA-2010:0122
errata
An updated sudo package that fixes two security issues is now available for Red Hat Enterprise Linux
5.
This update has been rated as having important security impact by the Red Hat Security Response
Team.
The sudo (superuser do) utility allows system administrators to give certain users the ability to run
commands as root.
A privilege escalation flaw was found in the way sudo handled the sudoedit pseudo-command. If
a local user were authorized by the sudoers file to use this pseudo-command, they could possibly
leverage this flaw to execute arbitrary code with the privileges of the root user.
2012
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=558471
2013
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=548363
2014
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=564364
2016
https://www.redhat.com/security/data/cve/CVE-2010-0426.html
2011
2012
(BZ#558471
)
2014
(BZ#564364
)
2015
RHBA-2010:0174: bug fix update
2013
BZ#548363
, uncovered a race condition
(CVE-2010-0426
2016
)
251

Advertisement

Table of Contents
loading

This manual is also suitable for:

Enterprise linux 5.5

Table of Contents