MGASA-2016-0261

Source
https://advisories.mageia.org/MGASA-2016-0261.html
Import Source
https://advisories.mageia.org/MGASA-2016-0261.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2016-0261
Upstream
Published
2016-07-26T21:16:28Z
Modified
2026-04-16T06:23:45.616074665Z
Summary
Updated sudo packages fix security vulnerability
Details

A vulnerability in functionality for adding support of SHA-2 digests along with the command was found. The sudoers plugin performs this digest verification while matching rules, and later independently calls execve() to execute the binary. This results in a race condition if the digest functionality is used as suggested (in fact, the rules are matched before the user is prompted for a password, so there is not negligible time frame to replace the binary from underneath sudo) (CVE-2015-8239).

References
Credits

Affected packages

Mageia:5 / sudo

Package

Name
sudo
Purl
pkg:rpm/mageia/sudo?arch=source&distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.17p1-1.mga5

Ecosystem specific

{
    "section": "core"
}

Database specific

source
"https://advisories.mageia.org/MGASA-2016-0261.json"