Gentoo Archives: gentoo-announce

From: Aaron Bauman <bman@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 201710-04 ] sudo: Privilege escalation
Date: Sun, 08 Oct 2017 13:35:46
Message-Id: 20378381.i5IVcMgqR7@localhost.localdomain
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201710-04
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: sudo: Privilege escalation
9 Date: October 08, 2017
10 Bugs: #620482
11 ID: 201710-04
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A vulnerability in sudo allows local users to gain root privileges.
19
20 Background
21 ==========
22
23 sudo (su “do”) allows a system administrator to delegate authority to
24 give certain users (or groups of users) the ability to run some (or
25 all) commands as root or another user while providing an audit trail of
26 the commands and their arguments.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 app-admin/sudo < 1.8.20_p2 >= 1.8.20_p2
35
36 Description
37 ===========
38
39 The fix present in app-admin/sudo-1.8.20_p1 (GLSA 201705-15) was
40 incomplete as it did not address the problem of a command with a
41 newline in the name.
42
43 Impact
44 ======
45
46 A local attacker could execute arbitrary code with root privileges.
47
48 Workaround
49 ==========
50
51 There is no known workaround at this time.
52
53 Resolution
54 ==========
55
56 All sudo users should upgrade to the latest version:
57
58 # emerge --sync
59 # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.8.20_p2"
60
61 References
62 ==========
63
64 [ 1 ] CVE-2017-1000368
65 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-1000368
66 [ 2 ] GLSA 201705-15
67 https://security.gentoo.org/glsa/201705-15
68
69 Availability
70 ============
71
72 This GLSA and any updates to it are available for viewing at
73 the Gentoo Security Website:
74
75 https://security.gentoo.org/glsa/201710-04
76
77 Concerns?
78 =========
79
80 Security is a primary focus of Gentoo Linux and ensuring the
81 confidentiality and security of our users' machines is of utmost
82 importance to us. Any security concerns should be addressed to
83 security@g.o or alternatively, you may file a bug at
84 https://bugs.gentoo.org.
85
86 License
87 =======
88
89 Copyright 2017 Gentoo Foundation, Inc; referenced text
90 belongs to its owner(s).
91
92 The contents of this document are licensed under the
93 Creative Commons - Attribution / Share Alike license.
94
95 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature