![]() ![]() Image SLES15-SP1-Manager-4-0-GCE-BYOS-Server Image SLES15-SP1-Manager-4-0-GCE-BYOS-Proxy Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Server Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Proxy Image SLES15-SP1-Manager-4-0-Azure-BYOS-Server Image SLES15-SP1-Manager-4-0-Azure-BYOS-Proxy Image SLES15-SP2-SAP-Azure-VLI-BYOS-ProductionĬontainer suse/sle-micro/5.0/toolbox:10.1-4.1 Image SLES15-SP2-SAP-Azure-LI-BYOS-Production Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM ![]() Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure Image SLES15-SP2-Manager-4-1-Proxy-BYOS-GCE Image SLES15-SP2-Manager-4-1-Proxy-BYOS-EC2-HVM ![]() Image SLES15-SP2-Manager-4-1-Proxy-BYOS-Azure Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production Image SLES15-SP1-SAP-Azure-LI-BYOS-Production Image SLES15-SAP-Azure-VLI-BYOS-Production Image SLES15-SAP-Azure-LI-BYOS-Production This issue is currently rated as having important severity. Overall state of this security issue: Resolved Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |