USN-3968-2: Sudo vulnerability
29 May 2019
Sudo could be made to overwrite files if it received a specially crafted input.
Releases
Packages
- sudo - Provide limited super user privileges to specific users
Details
USN-3968-1 fixed a vulnerability in Sudo. This update provides
the corresponding update for Ubuntu 14.04 ESM.
Original advisory details:
It was discovered that Sudo did not properly parse the contents of
/proc/[pid]/stat when attempting to determine its controlling tty. A local
attacker in some configurations could possibly use this to overwrite any
file on the filesystem, bypassing intended permissions. (CVE-2017-1000368)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04
In general, a standard system update will make all the necessary changes.