USN-928-1: Sudo vulnerability
15 April 2010
sudo vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 9.10
- Ubuntu 9.04
- Ubuntu 8.10
- Ubuntu 8.04 LTS
- Ubuntu 6.06 LTS
Software Description
- sudo
Details
Valerio Costamagna discovered that sudo did not properly validate the path for the ‘sudoedit’ pseudo-command when the PATH contained only a dot (‘.’). If secure_path and ignore_dot were disabled, a local attacker could exploit this to execute arbitrary code as root if sudo was configured to allow the attacker to use sudoedit. By default, secure_path is used and the sudoedit pseudo-command is not used in Ubuntu. This is a different but related issue to CVE-2010-0426.
Update instructions
The problem can be corrected by updating your system to the following package versions:
- Ubuntu 9.10
- sudo - 1.7.0-1ubuntu2.2
- sudo-ldap - 1.7.0-1ubuntu2.2
- Ubuntu 9.04
- sudo - 1.6.9p17-1ubuntu3.2
- sudo-ldap - 1.6.9p17-1ubuntu3.2
- Ubuntu 8.10
- sudo - 1.6.9p17-1ubuntu2.3
- sudo-ldap - 1.6.9p17-1ubuntu2.3
- Ubuntu 8.04 LTS
- sudo - 1.6.9p10-1ubuntu3.7
- sudo-ldap - 1.6.9p10-1ubuntu3.7
- Ubuntu 6.06 LTS
- sudo - 1.6.8p12-1ubuntu6.2
- sudo-ldap - 1.6.8p12-1ubuntu6.2
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system upgrade is sufficient to effect the necessary changes.