Security Advisory Moderate: sudo security update

Advisory: RHSA-2014:0266-1
Type: Security Advisory
Severity: Moderate
Issued on: 2014-03-10
Last updated on: 2014-03-10
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2014-0106

Details

An updated sudo package that fixes one security issue is now available for
Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having Moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

The sudo (superuser do) utility allows system administrators to give
certain users the ability to run commands as root.

A flaw was found in the way sudo handled its blacklist of environment
variables. When the "env_reset" option was disabled, a user permitted to
run certain commands via sudo could use this flaw to run such a command
with one of the blacklisted environment variables set, allowing them to run
an arbitrary command with the target user's privileges. (CVE-2014-0106)

Note: This issue does not affect the default configuration of the sudo
package as shipped with Red Hat Enterprise Linux 5.

Red Hat would like to thank Todd C. Miller for reporting this issue.
Upstream acknowledges Sebastien Macke as the original reporter.

All sudo users are advised to upgrade to this updated package, which
contains a backported patch to correct this issue.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
sudo-1.7.2p1-29.el5_10.src.rpm     MD5: 2f05b235695d1553a9d607d9980424df
SHA-256: 9343c1529f7683306ae826090a70017bf2a4a8e8cbc2a59450f33f19425f615c
 
IA-32:
sudo-1.7.2p1-29.el5_10.i386.rpm     MD5: 490435f2981ca258b82fa8378a61bdff
SHA-256: 8ec4b4f0943a5fd903bb826906aadcf186e62b8c3eceb1f67f7b3232b6740b28
sudo-debuginfo-1.7.2p1-29.el5_10.i386.rpm     MD5: 275882759d17c314764e08aad256cabd
SHA-256: 44ac078fb95d648f302a2346ced73802ac9594787877381d2e885380514b19bf
 
IA-64:
sudo-1.7.2p1-29.el5_10.ia64.rpm     MD5: cf1813d6da0b442cdc6ae1b68ebe756a
SHA-256: cbc3e6b6d9c4e929293b7ec429015941cd4a20811bd049b34df85de503ebbf46
sudo-debuginfo-1.7.2p1-29.el5_10.ia64.rpm     MD5: 6721e4e52a35ccbaf5202a6c30d9f635
SHA-256: 433d6cc9721d307adb5ee73cdaa6212e66c27b46ae52c62fac053509e2071297
 
PPC:
sudo-1.7.2p1-29.el5_10.ppc.rpm     MD5: 8af51de440089cbf0f897e25a63879e3
SHA-256: c3ee7b2c11c8c9792a094e9c35ea3bf237d965d4503813e41c9f59ef96bbb524
sudo-debuginfo-1.7.2p1-29.el5_10.ppc.rpm     MD5: eb6f3b7626bca2ab3059dc656e4ff89b
SHA-256: 5dc0969427efcc2fbe97de5f901e8b8fc5cbea97555b83d4c8f3cfc4fd589eeb
 
s390x:
sudo-1.7.2p1-29.el5_10.s390x.rpm     MD5: 7c8680187a132d535590d637d30b0ad2
SHA-256: eb9846851c5cd66e3a7f203c48d8872db3d6db9a81ff26871aead2a02f5e8fa9
sudo-debuginfo-1.7.2p1-29.el5_10.s390x.rpm     MD5: 0d7c990b2e9b887d1100870886b9b4a4
SHA-256: b6be36ebccfe776d395edeb99b27d5f1f22a88670b063bf05ffbaea7cec91d7e
 
x86_64:
sudo-1.7.2p1-29.el5_10.x86_64.rpm     MD5: c9bd348897bfb9abaa69dd30e09b1890
SHA-256: 53c57bc842afdd84f299b318ecf8082cfabb9467a736ba793374139b9af47125
sudo-debuginfo-1.7.2p1-29.el5_10.x86_64.rpm     MD5: 0ce31c44db99f36ea57ef9b99c257c9c
SHA-256: 3f2d0ed0e170a7d34f3d7f5f7420589beb8cd524b53e5c297ed931b8f67736b0
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
sudo-1.7.2p1-29.el5_10.src.rpm     MD5: 2f05b235695d1553a9d607d9980424df
SHA-256: 9343c1529f7683306ae826090a70017bf2a4a8e8cbc2a59450f33f19425f615c
 
IA-32:
sudo-1.7.2p1-29.el5_10.i386.rpm     MD5: 490435f2981ca258b82fa8378a61bdff
SHA-256: 8ec4b4f0943a5fd903bb826906aadcf186e62b8c3eceb1f67f7b3232b6740b28
sudo-debuginfo-1.7.2p1-29.el5_10.i386.rpm     MD5: 275882759d17c314764e08aad256cabd
SHA-256: 44ac078fb95d648f302a2346ced73802ac9594787877381d2e885380514b19bf
 
x86_64:
sudo-1.7.2p1-29.el5_10.x86_64.rpm     MD5: c9bd348897bfb9abaa69dd30e09b1890
SHA-256: 53c57bc842afdd84f299b318ecf8082cfabb9467a736ba793374139b9af47125
sudo-debuginfo-1.7.2p1-29.el5_10.x86_64.rpm     MD5: 0ce31c44db99f36ea57ef9b99c257c9c
SHA-256: 3f2d0ed0e170a7d34f3d7f5f7420589beb8cd524b53e5c297ed931b8f67736b0
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1071780 - CVE-2014-0106 sudo: certain environment variables not sanitized when env_reset is disabled


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/