Red Hat Linux update for sudo



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-1000367
CWE-ID CWE-77
Exploitation vector Local
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Red Hat Enterprise Linux for x86_64
Operating systems & Components / Operating system

Vendor Red Hat Inc.

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Command injection

EUVDB-ID: #VU6846

Risk: Low

CVSSv4.0: 2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2017-1000367

CWE-ID: CWE-77 - Command injection

Exploit availability: Yes

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to command validation flaw in the get_process_ttyname() function. A local attacker can issue a specially crafted sudo command, cause the system to recognize the user's tty as an arbitrary file and overwrite arbitrary files. Exploitation of the bug is possible in case a malicious user has sudo privileges, the system contains SELinux and sudo has been built on SELinux support.

Successful exploitation of the vulnerability results in root access to the system.

Mitigation

Update the affected package.

Red Hat Enterprise Linux Server 7

SRPM
sudo-1.8.6p7-22.el7_3.src.rpm SHA-256: 95dba3e1aea9bf257d668d08a9c0a12f74612071a053051971429500c6bd931a
x86_64
sudo-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: 17866015121348158b091621c0f9e30186a8db3fa3bd6be805b19ae5c70f64ed
sudo-debuginfo-1.8.6p7-22.el7_3.i686.rpm SHA-256: ea01ffd8fd970a8945f7e02005a2e369a1a5685c93bbd6f8bbb2a28b145ead0d
sudo-debuginfo-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: c0dccbdac2d485f813d493f4ef7bbc626e586fc7654d082f8dceb7ccfdd773dd
sudo-debuginfo-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: c0dccbdac2d485f813d493f4ef7bbc626e586fc7654d082f8dceb7ccfdd773dd
sudo-devel-1.8.6p7-22.el7_3.i686.rpm SHA-256: 2827b2c896ace80004c554b9da7adb8c6025edaeba4f9fe4d8586eab5af8c5a2
sudo-devel-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: 49e6665aa085a3427061e308e20fb61529759a44d28dcfaeddd773e7c246eedc

Red Hat Enterprise Linux Server 6

SRPM
sudo-1.8.6p3-28.el6_9.src.rpm SHA-256: ab5d7bce9f79f3773f0fcf5d42d4a9ec10d929ea6e9b6917ee89d542682151b5
x86_64
sudo-1.8.6p3-28.el6_9.x86_64.rpm SHA-256: 3e4c305e20bc8cb08e80040d1f9222ac699ca1f9d87ab2ed8378fdc937353c0b
sudo-debuginfo-1.8.6p3-28.el6_9.i686.rpm SHA-256: 913a1fe1f848e16ff86f51fc6f0c0c9ff55fb1b5d3c55f7dff8acb1830f41f07
sudo-debuginfo-1.8.6p3-28.el6_9.x86_64.rpm SHA-256: 2048c311467abe4ce3d5346651ddffda3c15a7b75a49c20ca21ca533ae5f02cc
sudo-debuginfo-1.8.6p3-28.el6_9.x86_64.rpm SHA-256: 2048c311467abe4ce3d5346651ddffda3c15a7b75a49c20ca21ca533ae5f02cc
sudo-devel-1.8.6p3-28.el6_9.i686.rpm SHA-256: 5accdb2146f3c832440ec47908999acd603e83d567e4e87aa21451a09acaa1c0
sudo-devel-1.8.6p3-28.el6_9.x86_64.rpm SHA-256: 1df068a8b1ca28ccc62b3ad4dc51990a9bc620a843171684f09e51e89789d6a8
i386
sudo-1.8.6p3-28.el6_9.i686.rpm SHA-256: 914121b647c1c6d5bd6d14291173fa14400f9a2cfd2d6f13f55b7c2c220f2da1
sudo-debuginfo-1.8.6p3-28.el6_9.i686.rpm SHA-256: 913a1fe1f848e16ff86f51fc6f0c0c9ff55fb1b5d3c55f7dff8acb1830f41f07
sudo-debuginfo-1.8.6p3-28.el6_9.i686.rpm SHA-256: 913a1fe1f848e16ff86f51fc6f0c0c9ff55fb1b5d3c55f7dff8acb1830f41f07
sudo-devel-1.8.6p3-28.el6_9.i686.rpm SHA-256: 5accdb2146f3c832440ec47908999acd603e83d567e4e87aa21451a09acaa1c0

Red Hat Enterprise Linux Server - Extended Update Support 7.3

SRPM
sudo-1.8.6p7-22.el7_3.src.rpm SHA-256: 95dba3e1aea9bf257d668d08a9c0a12f74612071a053051971429500c6bd931a
x86_64
sudo-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: 17866015121348158b091621c0f9e30186a8db3fa3bd6be805b19ae5c70f64ed
sudo-debuginfo-1.8.6p7-22.el7_3.i686.rpm SHA-256: ea01ffd8fd970a8945f7e02005a2e369a1a5685c93bbd6f8bbb2a28b145ead0d
sudo-debuginfo-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: c0dccbdac2d485f813d493f4ef7bbc626e586fc7654d082f8dceb7ccfdd773dd
sudo-debuginfo-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: c0dccbdac2d485f813d493f4ef7bbc626e586fc7654d082f8dceb7ccfdd773dd
sudo-devel-1.8.6p7-22.el7_3.i686.rpm SHA-256: 2827b2c896ace80004c554b9da7adb8c6025edaeba4f9fe4d8586eab5af8c5a2
sudo-devel-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: 49e6665aa085a3427061e308e20fb61529759a44d28dcfaeddd773e7c246eedc

Red Hat Enterprise Linux Server - AUS 7.3

SRPM
sudo-1.8.6p7-22.el7_3.src.rpm SHA-256: 95dba3e1aea9bf257d668d08a9c0a12f74612071a053051971429500c6bd931a
x86_64
sudo-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: 17866015121348158b091621c0f9e30186a8db3fa3bd6be805b19ae5c70f64ed
sudo-debuginfo-1.8.6p7-22.el7_3.i686.rpm SHA-256: ea01ffd8fd970a8945f7e02005a2e369a1a5685c93bbd6f8bbb2a28b145ead0d
sudo-debuginfo-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: c0dccbdac2d485f813d493f4ef7bbc626e586fc7654d082f8dceb7ccfdd773dd
sudo-debuginfo-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: c0dccbdac2d485f813d493f4ef7bbc626e586fc7654d082f8dceb7ccfdd773dd
sudo-devel-1.8.6p7-22.el7_3.i686.rpm SHA-256: 2827b2c896ace80004c554b9da7adb8c6025edaeba4f9fe4d8586eab5af8c5a2
sudo-devel-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: 49e6665aa085a3427061e308e20fb61529759a44d28dcfaeddd773e7c246eedc

Red Hat Enterprise Linux Workstation 7

SRPM
sudo-1.8.6p7-22.el7_3.src.rpm SHA-256: 95dba3e1aea9bf257d668d08a9c0a12f74612071a053051971429500c6bd931a
x86_64
sudo-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: 17866015121348158b091621c0f9e30186a8db3fa3bd6be805b19ae5c70f64ed
sudo-debuginfo-1.8.6p7-22.el7_3.i686.rpm SHA-256: ea01ffd8fd970a8945f7e02005a2e369a1a5685c93bbd6f8bbb2a28b145ead0d
sudo-debuginfo-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: c0dccbdac2d485f813d493f4ef7bbc626e586fc7654d082f8dceb7ccfdd773dd
sudo-debuginfo-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: c0dccbdac2d485f813d493f4ef7bbc626e586fc7654d082f8dceb7ccfdd773dd
sudo-devel-1.8.6p7-22.el7_3.i686.rpm SHA-256: 2827b2c896ace80004c554b9da7adb8c6025edaeba4f9fe4d8586eab5af8c5a2
sudo-devel-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: 49e6665aa085a3427061e308e20fb61529759a44d28dcfaeddd773e7c246eedc

Red Hat Enterprise Linux Workstation 6

SRPM
sudo-1.8.6p3-28.el6_9.src.rpm SHA-256: ab5d7bce9f79f3773f0fcf5d42d4a9ec10d929ea6e9b6917ee89d542682151b5
x86_64
sudo-1.8.6p3-28.el6_9.x86_64.rpm SHA-256: 3e4c305e20bc8cb08e80040d1f9222ac699ca1f9d87ab2ed8378fdc937353c0b
sudo-debuginfo-1.8.6p3-28.el6_9.i686.rpm SHA-256: 913a1fe1f848e16ff86f51fc6f0c0c9ff55fb1b5d3c55f7dff8acb1830f41f07
sudo-debuginfo-1.8.6p3-28.el6_9.x86_64.rpm SHA-256: 2048c311467abe4ce3d5346651ddffda3c15a7b75a49c20ca21ca533ae5f02cc
sudo-debuginfo-1.8.6p3-28.el6_9.x86_64.rpm SHA-256: 2048c311467abe4ce3d5346651ddffda3c15a7b75a49c20ca21ca533ae5f02cc
sudo-devel-1.8.6p3-28.el6_9.i686.rpm SHA-256: 5accdb2146f3c832440ec47908999acd603e83d567e4e87aa21451a09acaa1c0
sudo-devel-1.8.6p3-28.el6_9.x86_64.rpm SHA-256: 1df068a8b1ca28ccc62b3ad4dc51990a9bc620a843171684f09e51e89789d6a8
i386
sudo-1.8.6p3-28.el6_9.i686.rpm SHA-256: 914121b647c1c6d5bd6d14291173fa14400f9a2cfd2d6f13f55b7c2c220f2da1
sudo-debuginfo-1.8.6p3-28.el6_9.i686.rpm SHA-256: 913a1fe1f848e16ff86f51fc6f0c0c9ff55fb1b5d3c55f7dff8acb1830f41f07
sudo-debuginfo-1.8.6p3-28.el6_9.i686.rpm SHA-256: 913a1fe1f848e16ff86f51fc6f0c0c9ff55fb1b5d3c55f7dff8acb1830f41f07
sudo-devel-1.8.6p3-28.el6_9.i686.rpm SHA-256: 5accdb2146f3c832440ec47908999acd603e83d567e4e87aa21451a09acaa1c0

Red Hat Enterprise Linux Desktop 7

SRPM
sudo-1.8.6p7-22.el7_3.src.rpm SHA-256: 95dba3e1aea9bf257d668d08a9c0a12f74612071a053051971429500c6bd931a
x86_64
sudo-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: 17866015121348158b091621c0f9e30186a8db3fa3bd6be805b19ae5c70f64ed
sudo-debuginfo-1.8.6p7-22.el7_3.i686.rpm SHA-256: ea01ffd8fd970a8945f7e02005a2e369a1a5685c93bbd6f8bbb2a28b145ead0d
sudo-debuginfo-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: c0dccbdac2d485f813d493f4ef7bbc626e586fc7654d082f8dceb7ccfdd773dd
sudo-debuginfo-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: c0dccbdac2d485f813d493f4ef7bbc626e586fc7654d082f8dceb7ccfdd773dd
sudo-devel-1.8.6p7-22.el7_3.i686.rpm SHA-256: 2827b2c896ace80004c554b9da7adb8c6025edaeba4f9fe4d8586eab5af8c5a2
sudo-devel-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: 49e6665aa085a3427061e308e20fb61529759a44d28dcfaeddd773e7c246eedc

Red Hat Enterprise Linux Desktop 6

SRPM
sudo-1.8.6p3-28.el6_9.src.rpm SHA-256: ab5d7bce9f79f3773f0fcf5d42d4a9ec10d929ea6e9b6917ee89d542682151b5
x86_64
sudo-1.8.6p3-28.el6_9.x86_64.rpm SHA-256: 3e4c305e20bc8cb08e80040d1f9222ac699ca1f9d87ab2ed8378fdc937353c0b
sudo-debuginfo-1.8.6p3-28.el6_9.i686.rpm SHA-256: 913a1fe1f848e16ff86f51fc6f0c0c9ff55fb1b5d3c55f7dff8acb1830f41f07
sudo-debuginfo-1.8.6p3-28.el6_9.x86_64.rpm SHA-256: 2048c311467abe4ce3d5346651ddffda3c15a7b75a49c20ca21ca533ae5f02cc
sudo-debuginfo-1.8.6p3-28.el6_9.x86_64.rpm SHA-256: 2048c311467abe4ce3d5346651ddffda3c15a7b75a49c20ca21ca533ae5f02cc
sudo-devel-1.8.6p3-28.el6_9.i686.rpm SHA-256: 5accdb2146f3c832440ec47908999acd603e83d567e4e87aa21451a09acaa1c0
sudo-devel-1.8.6p3-28.el6_9.x86_64.rpm SHA-256: 1df068a8b1ca28ccc62b3ad4dc51990a9bc620a843171684f09e51e89789d6a8
i386
sudo-1.8.6p3-28.el6_9.i686.rpm SHA-256: 914121b647c1c6d5bd6d14291173fa14400f9a2cfd2d6f13f55b7c2c220f2da1
sudo-debuginfo-1.8.6p3-28.el6_9.i686.rpm SHA-256: 913a1fe1f848e16ff86f51fc6f0c0c9ff55fb1b5d3c55f7dff8acb1830f41f07
sudo-debuginfo-1.8.6p3-28.el6_9.i686.rpm SHA-256: 913a1fe1f848e16ff86f51fc6f0c0c9ff55fb1b5d3c55f7dff8acb1830f41f07
sudo-devel-1.8.6p3-28.el6_9.i686.rpm SHA-256: 5accdb2146f3c832440ec47908999acd603e83d567e4e87aa21451a09acaa1c0

Red Hat Enterprise Linux for IBM z Systems 7

SRPM
sudo-1.8.6p7-22.el7_3.src.rpm SHA-256: 95dba3e1aea9bf257d668d08a9c0a12f74612071a053051971429500c6bd931a
s390x
sudo-1.8.6p7-22.el7_3.s390x.rpm SHA-256: 765e94ce962a2b0e28ba863161c3bf5fc3fae26dc745b0c8e751126154573d06
sudo-debuginfo-1.8.6p7-22.el7_3.s390.rpm SHA-256: 707bfda546d5a6470631638cef284713f04892fa0b738073be1c63f0f1a2a4bd
sudo-debuginfo-1.8.6p7-22.el7_3.s390x.rpm SHA-256: bbc4c2092dcb806c6f78797eb53f35602393dcca6a7dfab32d81ac20a5e53bbc
sudo-debuginfo-1.8.6p7-22.el7_3.s390x.rpm SHA-256: bbc4c2092dcb806c6f78797eb53f35602393dcca6a7dfab32d81ac20a5e53bbc
sudo-devel-1.8.6p7-22.el7_3.s390.rpm SHA-256: 723662f922604384c35be7e60ae24e379a2e6bce70677a1a4a07c7cc72cd2bb7
sudo-devel-1.8.6p7-22.el7_3.s390x.rpm SHA-256: 847dcfc4125f69cd2954a2398dec2d74c204a3a41abcac59d54977b7b786424d

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
sudo-1.8.6p3-28.el6_9.src.rpm SHA-256: ab5d7bce9f79f3773f0fcf5d42d4a9ec10d929ea6e9b6917ee89d542682151b5
s390x
sudo-1.8.6p3-28.el6_9.s390x.rpm SHA-256: 8ddf79720dcdad5ca9eb38ce12879e6a626254e28d1c785a0b1fa5ce1f291109
sudo-debuginfo-1.8.6p3-28.el6_9.s390.rpm SHA-256: 057f5e038c39f95526a7e4bed3e246f45b9abf62f7ff5519bfd4f8d36f053cc5
sudo-debuginfo-1.8.6p3-28.el6_9.s390x.rpm SHA-256: 26dc4ad0e095200796f04589c31f626ce2d3769651d4ea9be101971f5d4b059c
sudo-debuginfo-1.8.6p3-28.el6_9.s390x.rpm SHA-256: 26dc4ad0e095200796f04589c31f626ce2d3769651d4ea9be101971f5d4b059c
sudo-devel-1.8.6p3-28.el6_9.s390.rpm SHA-256: 9f58a1b7a2f1af2e3f19fcfaba6f3d11506a47befadfa0d49104eb75f18e3b13
sudo-devel-1.8.6p3-28.el6_9.s390x.rpm SHA-256: 1a3c9b57f16fdbe773aa62851e459870efe0b1a9f7f94a18c2f912d9023114e1

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.3

SRPM
sudo-1.8.6p7-22.el7_3.src.rpm SHA-256: 95dba3e1aea9bf257d668d08a9c0a12f74612071a053051971429500c6bd931a
s390x
sudo-1.8.6p7-22.el7_3.s390x.rpm SHA-256: 765e94ce962a2b0e28ba863161c3bf5fc3fae26dc745b0c8e751126154573d06
sudo-debuginfo-1.8.6p7-22.el7_3.s390.rpm SHA-256: 707bfda546d5a6470631638cef284713f04892fa0b738073be1c63f0f1a2a4bd
sudo-debuginfo-1.8.6p7-22.el7_3.s390x.rpm SHA-256: bbc4c2092dcb806c6f78797eb53f35602393dcca6a7dfab32d81ac20a5e53bbc
sudo-debuginfo-1.8.6p7-22.el7_3.s390x.rpm SHA-256: bbc4c2092dcb806c6f78797eb53f35602393dcca6a7dfab32d81ac20a5e53bbc
sudo-devel-1.8.6p7-22.el7_3.s390.rpm SHA-256: 723662f922604384c35be7e60ae24e379a2e6bce70677a1a4a07c7cc72cd2bb7
sudo-devel-1.8.6p7-22.el7_3.s390x.rpm SHA-256: 847dcfc4125f69cd2954a2398dec2d74c204a3a41abcac59d54977b7b786424d

Red Hat Enterprise Linux for Power, big endian 7

SRPM
sudo-1.8.6p7-22.el7_3.src.rpm SHA-256: 95dba3e1aea9bf257d668d08a9c0a12f74612071a053051971429500c6bd931a
ppc64
sudo-1.8.6p7-22.el7_3.ppc64.rpm SHA-256: c897944b65b2ee0bb9827b2d2fa6019f87aab61360b02e0b12c1545302ad4338
sudo-debuginfo-1.8.6p7-22.el7_3.ppc.rpm SHA-256: 058ff02189da050da0a71541e687f5ff47a623d18eb2ddf27d6cbfd5cb499444
sudo-debuginfo-1.8.6p7-22.el7_3.ppc64.rpm SHA-256: 13ded9111abf4026011d7b9ba0493a59c12d1af079bcd85d797dad7b046ca102
sudo-debuginfo-1.8.6p7-22.el7_3.ppc64.rpm SHA-256: 13ded9111abf4026011d7b9ba0493a59c12d1af079bcd85d797dad7b046ca102
sudo-devel-1.8.6p7-22.el7_3.ppc.rpm SHA-256: cde394f2b569c76e03fda4b78a0e16dd9cb1ab08da0fda75ff90432374ff5ea4
sudo-devel-1.8.6p7-22.el7_3.ppc64.rpm SHA-256: f20ae1114b7c27e412cdcecc9ca3a85e2ea7d83051bf07141f76808bd574fdbf

Red Hat Enterprise Linux for Power, big endian 6

SRPM
sudo-1.8.6p3-28.el6_9.src.rpm SHA-256: ab5d7bce9f79f3773f0fcf5d42d4a9ec10d929ea6e9b6917ee89d542682151b5
ppc64
sudo-1.8.6p3-28.el6_9.ppc64.rpm SHA-256: 34f182532e8521f4cc53be6f2e9fc701f8fb72c535198165d7de88d8fc48bd0d
sudo-debuginfo-1.8.6p3-28.el6_9.ppc.rpm SHA-256: 30b1e2dfd347f11ddadd3127a6be3d8f8ac33df5c391dc00c45bb2434f6b7074
sudo-debuginfo-1.8.6p3-28.el6_9.ppc64.rpm SHA-256: 9e7799dbd11b9adc7ead2b07ad41efc92d922ee7582fb8a642e7148f4ebfb8c3
sudo-debuginfo-1.8.6p3-28.el6_9.ppc64.rpm SHA-256: 9e7799dbd11b9adc7ead2b07ad41efc92d922ee7582fb8a642e7148f4ebfb8c3
sudo-devel-1.8.6p3-28.el6_9.ppc.rpm SHA-256: d3b46e8de928237e319f0127de50811c43fc180a9a3f8b7cabed3720030fd91c
sudo-devel-1.8.6p3-28.el6_9.ppc64.rpm SHA-256: d919caaf7379ec06af446674d8e51e5f7a2e2008f43b95d7612bb1a9ffb979b1

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.3

SRPM
sudo-1.8.6p7-22.el7_3.src.rpm SHA-256: 95dba3e1aea9bf257d668d08a9c0a12f74612071a053051971429500c6bd931a
ppc64
sudo-1.8.6p7-22.el7_3.ppc64.rpm SHA-256: c897944b65b2ee0bb9827b2d2fa6019f87aab61360b02e0b12c1545302ad4338
sudo-debuginfo-1.8.6p7-22.el7_3.ppc.rpm SHA-256: 058ff02189da050da0a71541e687f5ff47a623d18eb2ddf27d6cbfd5cb499444
sudo-debuginfo-1.8.6p7-22.el7_3.ppc64.rpm SHA-256: 13ded9111abf4026011d7b9ba0493a59c12d1af079bcd85d797dad7b046ca102
sudo-debuginfo-1.8.6p7-22.el7_3.ppc64.rpm SHA-256: 13ded9111abf4026011d7b9ba0493a59c12d1af079bcd85d797dad7b046ca102
sudo-devel-1.8.6p7-22.el7_3.ppc.rpm SHA-256: cde394f2b569c76e03fda4b78a0e16dd9cb1ab08da0fda75ff90432374ff5ea4
sudo-devel-1.8.6p7-22.el7_3.ppc64.rpm SHA-256: f20ae1114b7c27e412cdcecc9ca3a85e2ea7d83051bf07141f76808bd574fdbf

Red Hat Enterprise Linux for Scientific Computing 7

SRPM
sudo-1.8.6p7-22.el7_3.src.rpm SHA-256: 95dba3e1aea9bf257d668d08a9c0a12f74612071a053051971429500c6bd931a
x86_64
sudo-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: 17866015121348158b091621c0f9e30186a8db3fa3bd6be805b19ae5c70f64ed
sudo-debuginfo-1.8.6p7-22.el7_3.i686.rpm SHA-256: ea01ffd8fd970a8945f7e02005a2e369a1a5685c93bbd6f8bbb2a28b145ead0d
sudo-debuginfo-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: c0dccbdac2d485f813d493f4ef7bbc626e586fc7654d082f8dceb7ccfdd773dd
sudo-debuginfo-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: c0dccbdac2d485f813d493f4ef7bbc626e586fc7654d082f8dceb7ccfdd773dd
sudo-devel-1.8.6p7-22.el7_3.i686.rpm SHA-256: 2827b2c896ace80004c554b9da7adb8c6025edaeba4f9fe4d8586eab5af8c5a2
sudo-devel-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: 49e6665aa085a3427061e308e20fb61529759a44d28dcfaeddd773e7c246eedc

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
sudo-1.8.6p3-28.el6_9.src.rpm SHA-256: ab5d7bce9f79f3773f0fcf5d42d4a9ec10d929ea6e9b6917ee89d542682151b5
x86_64
sudo-1.8.6p3-28.el6_9.x86_64.rpm SHA-256: 3e4c305e20bc8cb08e80040d1f9222ac699ca1f9d87ab2ed8378fdc937353c0b
sudo-debuginfo-1.8.6p3-28.el6_9.i686.rpm SHA-256: 913a1fe1f848e16ff86f51fc6f0c0c9ff55fb1b5d3c55f7dff8acb1830f41f07
sudo-debuginfo-1.8.6p3-28.el6_9.x86_64.rpm SHA-256: 2048c311467abe4ce3d5346651ddffda3c15a7b75a49c20ca21ca533ae5f02cc
sudo-debuginfo-1.8.6p3-28.el6_9.x86_64.rpm SHA-256: 2048c311467abe4ce3d5346651ddffda3c15a7b75a49c20ca21ca533ae5f02cc
sudo-devel-1.8.6p3-28.el6_9.i686.rpm SHA-256: 5accdb2146f3c832440ec47908999acd603e83d567e4e87aa21451a09acaa1c0
sudo-devel-1.8.6p3-28.el6_9.x86_64.rpm SHA-256: 1df068a8b1ca28ccc62b3ad4dc51990a9bc620a843171684f09e51e89789d6a8

Red Hat Enterprise Linux EUS Compute Node 7.3

SRPM
sudo-1.8.6p7-22.el7_3.src.rpm SHA-256: 95dba3e1aea9bf257d668d08a9c0a12f74612071a053051971429500c6bd931a
x86_64
sudo-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: 17866015121348158b091621c0f9e30186a8db3fa3bd6be805b19ae5c70f64ed
sudo-debuginfo-1.8.6p7-22.el7_3.i686.rpm SHA-256: ea01ffd8fd970a8945f7e02005a2e369a1a5685c93bbd6f8bbb2a28b145ead0d
sudo-debuginfo-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: c0dccbdac2d485f813d493f4ef7bbc626e586fc7654d082f8dceb7ccfdd773dd
sudo-debuginfo-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: c0dccbdac2d485f813d493f4ef7bbc626e586fc7654d082f8dceb7ccfdd773dd
sudo-devel-1.8.6p7-22.el7_3.i686.rpm SHA-256: 2827b2c896ace80004c554b9da7adb8c6025edaeba4f9fe4d8586eab5af8c5a2
sudo-devel-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: 49e6665aa085a3427061e308e20fb61529759a44d28dcfaeddd773e7c246eedc

Red Hat Enterprise Linux for Power, little endian 7

SRPM
sudo-1.8.6p7-22.el7_3.src.rpm SHA-256: 95dba3e1aea9bf257d668d08a9c0a12f74612071a053051971429500c6bd931a
ppc64le
sudo-1.8.6p7-22.el7_3.ppc64le.rpm SHA-256: 495a433cd470af7a113025d71879f179d14c0fd4018906b416ae58660ff3c064
sudo-debuginfo-1.8.6p7-22.el7_3.ppc64le.rpm SHA-256: 621a6ac773b4681dfb667dbefb65287b9e7ca368977ea0ffe624e36a1cb3ab0b
sudo-debuginfo-1.8.6p7-22.el7_3.ppc64le.rpm SHA-256: 621a6ac773b4681dfb667dbefb65287b9e7ca368977ea0ffe624e36a1cb3ab0b
sudo-devel-1.8.6p7-22.el7_3.ppc64le.rpm SHA-256: eb9440d5985699422dba56c82fb829932a6979419d815c2b423b5cce66fe5f12

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.3

SRPM
sudo-1.8.6p7-22.el7_3.src.rpm SHA-256: 95dba3e1aea9bf257d668d08a9c0a12f74612071a053051971429500c6bd931a
ppc64le
sudo-1.8.6p7-22.el7_3.ppc64le.rpm SHA-256: 495a433cd470af7a113025d71879f179d14c0fd4018906b416ae58660ff3c064
sudo-debuginfo-1.8.6p7-22.el7_3.ppc64le.rpm SHA-256: 621a6ac773b4681dfb667dbefb65287b9e7ca368977ea0ffe624e36a1cb3ab0b
sudo-debuginfo-1.8.6p7-22.el7_3.ppc64le.rpm SHA-256: 621a6ac773b4681dfb667dbefb65287b9e7ca368977ea0ffe624e36a1cb3ab0b
sudo-devel-1.8.6p7-22.el7_3.ppc64le.rpm SHA-256: eb9440d5985699422dba56c82fb829932a6979419d815c2b423b5cce66fe5f12

Red Hat Enterprise Linux Server for ARM 7

SRPM
sudo-1.8.6p7-22.el7_3.src.rpm SHA-256: 95dba3e1aea9bf257d668d08a9c0a12f74612071a053051971429500c6bd931a
aarch64
sudo-1.8.6p7-22.el7_3.aarch64.rpm SHA-256: 2812fd8d6c59a3c792fc86dfba164db7bbd0e40c69a588497ab4c68a725150cb
sudo-debuginfo-1.8.6p7-22.el7_3.aarch64.rpm SHA-256: 2cac5906009d145a065dd76b67f01e7488f88cc9f5a5f34b9371cf07a215ac07
sudo-debuginfo-1.8.6p7-22.el7_3.aarch64.rpm SHA-256: 2cac5906009d145a065dd76b67f01e7488f88cc9f5a5f34b9371cf07a215ac07
sudo-devel-1.8.6p7-22.el7_3.aarch64.rpm SHA-256: 7cf2d03dc0c29358fc69823675676c48bd0b9b6743fe5a57c093880594fc5714

Red Hat Enterprise Linux Server - TUS 7.3

SRPM
sudo-1.8.6p7-22.el7_3.src.rpm SHA-256: 95dba3e1aea9bf257d668d08a9c0a12f74612071a053051971429500c6bd931a
x86_64
sudo-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: 17866015121348158b091621c0f9e30186a8db3fa3bd6be805b19ae5c70f64ed
sudo-debuginfo-1.8.6p7-22.el7_3.i686.rpm SHA-256: ea01ffd8fd970a8945f7e02005a2e369a1a5685c93bbd6f8bbb2a28b145ead0d
sudo-debuginfo-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: c0dccbdac2d485f813d493f4ef7bbc626e586fc7654d082f8dceb7ccfdd773dd
sudo-debuginfo-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: c0dccbdac2d485f813d493f4ef7bbc626e586fc7654d082f8dceb7ccfdd773dd
sudo-devel-1.8.6p7-22.el7_3.i686.rpm SHA-256: 2827b2c896ace80004c554b9da7adb8c6025edaeba4f9fe4d8586eab5af8c5a2
sudo-devel-1.8.6p7-22.el7_3.x86_64.rpm SHA-256: 49e6665aa085a3427061e308e20fb61529759a44d28dcfaeddd773e7c246eedc

Red Hat Enterprise Linux Server - Extended Life Cycle Support 5

SRPM
sudo-1.7.2p1-30.el5_11.src.rpm SHA-256: 484fb11564224dfcc834d308345038d85ed7b16c2a0c4e1a65c4b8ee63fb4b54
x86_64
sudo-1.7.2p1-30.el5_11.x86_64.rpm SHA-256: 8084b4a0eb99d5969a8c264962e9a0850f57c634ce137f2e4de047a66b62e371
sudo-debuginfo-1.7.2p1-30.el5_11.x86_64.rpm SHA-256: 9ee733a0a12140583b1cdda969183bb2625533000698748d6f6d3d035ed3f2bc
i386
sudo-1.7.2p1-30.el5_11.i386.rpm SHA-256: da88f769db7409ad7ad594c17252ba72ef6804fc12185b007a43c3c30b7ba650
sudo-debuginfo-1.7.2p1-30.el5_11.i386.rpm SHA-256: 4deb4034c68903e4ba9dbf6e5e5334d2db41e41bb1ba48736c1c0fbc8263ef24

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 5

SRPM
sudo-1.7.2p1-30.el5_11.src.rpm SHA-256: 484fb11564224dfcc834d308345038d85ed7b16c2a0c4e1a65c4b8ee63fb4b54
s390x
sudo-1.7.2p1-30.el5_11.s390x.rpm SHA-256: 951c828824bfd2f67a8be622da1590481da04a13e1381ec51679d0e473aae6e6
sudo-debuginfo-1.7.2p1-30.el5_11.s390x.rpm SHA-256: 449501edb38f6048d0c5bd3d81f344605e8853bf129286bcdeae724fb107e4eb

Vulnerable software versions

Red Hat Enterprise Linux for x86_64: 6 - 7.0

Red Hat Enterprise Linux for x86_64: 5

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2017:1382


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###