USN-1754-1: Sudo vulnerability

28 February 2013

sudo vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.10
  • Ubuntu 12.04 LTS
  • Ubuntu 11.10
  • Ubuntu 10.04 LTS
  • Ubuntu 8.04 LTS


Sudo could be made to run programs as the administrator without a password prompt.

Software Description

  • sudo - Provide limited super user privileges to specific users


Marco Schoepl discovered that Sudo incorrectly handled time stamp files when the system clock is set to epoch. A local attacker could use this issue to run Sudo commands without a password prompt.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.10
sudo - 1.8.5p2-1ubuntu1.1
sudo-ldap - 1.8.5p2-1ubuntu1.1
Ubuntu 12.04 LTS
sudo - 1.8.3p1-1ubuntu3.4
sudo-ldap - 1.8.3p1-1ubuntu3.4
Ubuntu 11.10
sudo - 1.7.4p6-1ubuntu2.2
sudo-ldap - 1.7.4p6-1ubuntu2.2
Ubuntu 10.04 LTS
sudo - 1.7.2p1-1ubuntu5.6
sudo-ldap - 1.7.2p1-1ubuntu5.6
Ubuntu 8.04 LTS
sudo - 1.6.9p10-1ubuntu3.10
sudo-ldap - 1.6.9p10-1ubuntu3.10

To update your system, please follow these instructions:

In general, a standard system update will make all the necessary changes.