Lucene search

K
centosCentOS ProjectCESA-2010:0122
HistoryMar 01, 2010 - 6:44 p.m.

sudo security update

2010-03-0118:44:36
CentOS Project
lists.centos.org
52

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

9.5%

CentOS Errata and Security Advisory CESA-2010:0122

The sudo (superuser do) utility allows system administrators to give
certain users the ability to run commands as root.

A privilege escalation flaw was found in the way sudo handled the sudoedit
pseudo-command. If a local user were authorized by the sudoers file to use
this pseudo-command, they could possibly leverage this flaw to execute
arbitrary code with the privileges of the root user. (CVE-2010-0426)

The sudo utility did not properly initialize supplementary groups when the
β€œrunas_default” option (in the sudoers file) was used. If a local user
were authorized by the sudoers file to perform their sudo commands under
the account specified with β€œrunas_default”, they would receive the root
user’s supplementary groups instead of those of the intended target user,
giving them unintended privileges. (CVE-2010-0427)

Users of sudo should upgrade to this updated package, which contains
backported patches to correct these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2010-March/078693.html
https://lists.centos.org/pipermail/centos-announce/2010-March/078694.html

Affected packages:
sudo

Upstream details at:
https://access.redhat.com/errata/RHSA-2010:0122

OSVersionArchitecturePackageVersionFilename
CentOS5i386sudo<Β 1.6.9p17-6.el5_4sudo-1.6.9p17-6.el5_4.i386.rpm
CentOS5i386sudo<Β 1.6.9p17-6.el5_4sudo-1.6.9p17-6.el5_4.i386.rpm
CentOS5x86_64sudo<Β 1.6.9p17-6.el5_4sudo-1.6.9p17-6.el5_4.x86_64.rpm
CentOS5x86_64sudo<Β 1.6.9p17-6.el5_4sudo-1.6.9p17-6.el5_4.x86_64.rpm

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

9.5%