{"id":"MGASA-2016-0261","summary":"Updated sudo packages fix security vulnerability","details":"A vulnerability in functionality for adding support of SHA-2 digests along\nwith the command was found. The sudoers plugin performs this digest\nverification while matching rules, and later independently calls execve()\nto execute the binary. This results in a race condition if the digest\nfunctionality is used as suggested (in fact, the rules are matched before\nthe user is prompted for a password, so there is not negligible time frame\nto replace the binary from underneath sudo) (CVE-2015-8239).\n","modified":"2026-04-16T06:23:45.616074665Z","published":"2016-07-26T21:16:28Z","upstream":["CVE-2015-8239"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0261.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=18989"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/BLFXPDF67QZECU6EMPWYU4FGK6PNZ3M4/"}],"affected":[{"package":{"name":"sudo","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/sudo?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.17p1-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0261.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}