Two vulnerabilities in sudo might allow local users to escalate privileges and execute arbitrary code with root privileges.
Package | app-admin/sudo on all architectures |
---|---|
Affected versions | < 1.7.2_p4 |
Unaffected versions | >= 1.7.2_p4 |
sudo allows a system administrator to give users the ability to run commands as other users.
Multiple vulnerabilities have been discovered in sudo:
A local attacker with privileges to use "sudoedit" or the privilege to execute commands with the "runas_default" setting enabled could leverage these vulnerabilities to execute arbitrary code with elevated privileges.
CVE-2010-0426: Revoke all "sudoedit" privileges, or use the full path to sudoedit. CVE-2010-0427: Remove all occurrences of the "runas_default" setting.
All sudo users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.7.2_p4"
Release date
March 03, 2010
Latest revision
March 03, 2010: 01
Severity
high
Exploitable
local
Bugzilla entries