Lucene search

K
centosCentOS ProjectCESA-2005:535
HistoryJun 29, 2005 - 4:58 p.m.

sudo security update

2005-06-2916:58:32
CentOS Project
lists.centos.org
39

3.7 Low

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

26.3%

CentOS Errata and Security Advisory CESA-2005:535

The sudo (superuser do) utility allows system administrators to give
certain users the ability to run commands as root with logging.

A race condition bug was found in the way sudo handles pathnames. It is
possible that a local user with limited sudo access could create
a race condition that would allow the execution of arbitrary commands as
the root user. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-1993 to this issue.

Users of sudo should update to this updated package, which contains a
backported patch and is not vulnerable to this issue.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-June/074067.html
https://lists.centos.org/pipermail/centos-announce/2005-June/074068.html
https://lists.centos.org/pipermail/centos-announce/2005-June/074069.html
https://lists.centos.org/pipermail/centos-announce/2005-June/074070.html
https://lists.centos.org/pipermail/centos-announce/2005-June/074071.html
https://lists.centos.org/pipermail/centos-announce/2005-June/074072.html
https://lists.centos.org/pipermail/centos-announce/2005-June/074073.html

Affected packages:
sudo

Upstream details at:
https://access.redhat.com/errata/RHSA-2005:535

3.7 Low

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

26.3%