Advisories
Mandriva Advisories
|
![]() |
Problem Description |
A buffer overflow exists in the sudo program which could be used by an
attacker to obtain higher privileges. sudo is a program used to
delegate superuser privileges to ordinary users and only for specific
commands.
Updated Packages |
Mandrakelinux 7.1
99e75efab098e51b516f8030eafb2993 7.1/RPMS/sudo-1.6.3p6-1.2mdk.i586.rpm 672e152db4d8d0e742ad404cf81ca3d1 7.1/SRPMS/sudo-1.6.3p6-1.2mdk.src.rpm
Mandrakelinux 7.2
fe583824271ac2a5af6dd533027e8794 7.2/RPMS/sudo-1.6.3p6-1.1mdk.i586.rpm 2327674548ed850b078d3ae1badf7d2e 7.2/SRPMS/sudo-1.6.3p6-1.1mdk.src.rpm
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.