CVE-2015-8239

The SHA-2 digest support in the sudoers plugin in sudo after 1.8.7 allows local users with write permissions to parts of the called command to replace them before it is executed.
References
Link Resource
http://www.openwall.com/lists/oss-security/2015/11/18/22 Mailing List Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1283635 Issue Tracking Patch Third Party Advisory
https://www.sudo.ws/repos/sudo/rev/0cd3cc8fa195 Issue Tracking Patch Third Party Advisory
https://www.sudo.ws/repos/sudo/rev/24a3d9215c64 Issue Tracking Patch Third Party Advisory
https://www.sudo.ws/repos/sudo/rev/397722cdd7ec Issue Tracking Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/11/18/22 Mailing List Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1283635 Issue Tracking Patch Third Party Advisory
https://www.sudo.ws/repos/sudo/rev/0cd3cc8fa195 Issue Tracking Patch Third Party Advisory
https://www.sudo.ws/repos/sudo/rev/24a3d9215c64 Issue Tracking Patch Third Party Advisory
https://www.sudo.ws/repos/sudo/rev/397722cdd7ec Issue Tracking Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sudo_project:sudo:1.8.8:*:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.8:b1:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.8:b2:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.8:b3:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.8:rc1:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.9:*:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.9:b1:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.9:b2:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.9:p1:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.9:p2:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.9:p3:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.9:p4:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.9:p5:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.9:rc1:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.9:rc2:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.10:*:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.10:b1:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.10:b2:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.10:b3:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.10:b4:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.10:p1:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.10:p2:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.10:p3:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.10:rc1:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.10:rc2:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.10:rc3:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.11:*:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.11:b1:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.11:b2:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.11:b3:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.11:b4:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.11:p1:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.11:p2:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.11:rc1:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.11:rc2:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.12:*:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.12:b1:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.12:b2:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.12:b3:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.12:rc1:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.12:rc2:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.13:*:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.13:b1:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.13:b2:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.13:b3:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.13:b4:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.13:rc1:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.13:rc2:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.14:*:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.14:b1:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.14:b2:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.14:b3:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.14:b4:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.14:p1:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.14:p2:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.14:p3:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.14:rc1:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.15:*:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.15:b1:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.15:b2:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.15:b3:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.15:b4:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.15:b5:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.15:rc1:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.15:rc2:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.8.15:rc3:*:*:*:*:*:*

History

21 Nov 2024, 02:38

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2015/11/18/22 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2015/11/18/22 - Mailing List, Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1283635 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1283635 - Issue Tracking, Patch, Third Party Advisory
References () https://www.sudo.ws/repos/sudo/rev/0cd3cc8fa195 - Issue Tracking, Patch, Third Party Advisory () https://www.sudo.ws/repos/sudo/rev/0cd3cc8fa195 - Issue Tracking, Patch, Third Party Advisory
References () https://www.sudo.ws/repos/sudo/rev/24a3d9215c64 - Issue Tracking, Patch, Third Party Advisory () https://www.sudo.ws/repos/sudo/rev/24a3d9215c64 - Issue Tracking, Patch, Third Party Advisory
References () https://www.sudo.ws/repos/sudo/rev/397722cdd7ec - Issue Tracking, Patch, Third Party Advisory () https://www.sudo.ws/repos/sudo/rev/397722cdd7ec - Issue Tracking, Patch, Third Party Advisory

Information

Published : 2017-10-10 16:29

Updated : 2024-11-21 02:38


NVD link : CVE-2015-8239

Mitre link : CVE-2015-8239

CVE.ORG link : CVE-2015-8239


JSON object : View

Products Affected

sudo_project

  • sudo
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')