summaryrefslogtreecommitdiffstats
path: root/package/php-memcached/php-memcached.mk
diff options
context:
space:
mode:
authorPeter Korsgaard <peter@korsgaard.com>2017-05-31 08:47:18 +0200
committerPeter Korsgaard <peter@korsgaard.com>2017-05-31 12:30:49 +0200
commitfddb760946a4f4ca366528a673989793be65a678 (patch)
tree637ef0a85643d060dc5d21258d15ab4c912adff4 /package/php-memcached/php-memcached.mk
parent8e0cb0c12dcbb0625b42481d7057b17d7bf4ad3d (diff)
downloadbuildroot-fddb760946a4f4ca366528a673989793be65a678.tar.gz
buildroot-fddb760946a4f4ca366528a673989793be65a678.zip
sudo: add upstream security patch for CVE-2017-1000367
CVE-2017-1000367 - Potential overwrite of arbitrary files on Linux On Linux systems, sudo parses the /proc/[pid]/stat file to determine the device number of the process's tty (field 7). The fields in the file are space-delimited, but it is possible for the command name (field 2) to include spaces, which sudo does not account for. A user with sudo privileges can cause sudo to use a device number of the user's choosing by creating a symbolic link from the sudo binary to a name that contains a space, followed by a number. If SELinux is enabled on the system and sudo was built with SELinux support, a user with sudo privileges may be able to to overwrite an arbitrary file. This can be escalated to full root access by rewriting a trusted file such as /etc/shadow or even /etc/sudoers. For more details, see: https://www.sudo.ws/alerts/linux_tty.html Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Diffstat (limited to 'package/php-memcached/php-memcached.mk')
0 files changed, 0 insertions, 0 deletions
OpenPOWER on IntegriCloud