Skip to navigation

Security Advisory Important: sudo security update

Advisory: RHSA-2010:0675-1
Type: Security Advisory
Severity: Important
Issued on: 2010-09-07
Last updated on: 2010-09-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2010-2956

Details

An updated sudo package that fixes one security issue is now available for
Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

The sudo (superuser do) utility allows system administrators to give
certain users the ability to run commands as root.

A flaw was found in the way sudo handled Runas specifications containing
both a user and a group list. If a local user were authorized by the
sudoers file to perform their sudo commands with the privileges of a
specified user and group, they could use this flaw to run those commands
with the privileges of either an arbitrary user or group on the system.
(CVE-2010-2956)

Red Hat would like to thank Markus Wuethrich of Swiss Post - PostFinance
for reporting this issue.

Users of sudo should upgrade to this updated package, which contains a
backported patch to correct this issue.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
sudo-1.7.2p1-8.el5_5.src.rpm
File outdated by:  RHSA-2014:0266
    MD5: 2f4f2e7c8f10db4097f8fa3ab77d3920
SHA-256: 1f535f04b5f54350d8ba05d4ddb1920c38c80287c026e12e716be79789d03586
 
IA-32:
sudo-1.7.2p1-8.el5_5.i386.rpm
File outdated by:  RHSA-2014:0266
    MD5: 44942bedd8c3465d887659723018e10c
SHA-256: 707c9070c311e3c3d3ece156e8e472b698da7a73f5a3ac256d63c4da0182a728
 
IA-64:
sudo-1.7.2p1-8.el5_5.ia64.rpm
File outdated by:  RHSA-2014:0266
    MD5: e8b3434735d4002146aa62972a239027
SHA-256: 55acf31601016184c02a6de41bc2931228c8907e760081cc05b5dcf5b66526e1
 
PPC:
sudo-1.7.2p1-8.el5_5.ppc.rpm
File outdated by:  RHSA-2014:0266
    MD5: 86862936f6a0f6d75c15ea78fca89b73
SHA-256: 615611bc859383f67ba9dba0f9033b408f59d459c0dc04b030edee78306a003b
 
s390x:
sudo-1.7.2p1-8.el5_5.s390x.rpm
File outdated by:  RHSA-2014:0266
    MD5: b9a2a34c496ba28afb40013c7cef281c
SHA-256: 010092b8706f3da3fb95195bf04eda942543fcd54c1a07d44837452c4ee1fd75
 
x86_64:
sudo-1.7.2p1-8.el5_5.x86_64.rpm
File outdated by:  RHSA-2014:0266
    MD5: 295f76fe3e05591e1a333dba9cf15e92
SHA-256: 42d6a41f7e01a63906c49dd203237f84295ea0801812a5c1d909285dd7c55c5b
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
sudo-1.7.2p1-8.el5_5.src.rpm
File outdated by:  RHSA-2014:0266
    MD5: 2f4f2e7c8f10db4097f8fa3ab77d3920
SHA-256: 1f535f04b5f54350d8ba05d4ddb1920c38c80287c026e12e716be79789d03586
 
IA-32:
sudo-1.7.2p1-8.el5_5.i386.rpm
File outdated by:  RHSA-2014:0266
    MD5: 44942bedd8c3465d887659723018e10c
SHA-256: 707c9070c311e3c3d3ece156e8e472b698da7a73f5a3ac256d63c4da0182a728
 
x86_64:
sudo-1.7.2p1-8.el5_5.x86_64.rpm
File outdated by:  RHSA-2014:0266
    MD5: 295f76fe3e05591e1a333dba9cf15e92
SHA-256: 42d6a41f7e01a63906c49dd203237f84295ea0801812a5c1d909285dd7c55c5b
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

628628 - CVE-2010-2956 sudo: incorrect handling of RunAs specification with both user and group lists


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/