Gentoo Archives: gentoo-commits

From: "Chris Reffett (creffett)" <creffett@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-201401-23.xml
Date: Tue, 21 Jan 2014 20:26:32
Message-Id: 20140121202627.ED4842004C@flycatcher.gentoo.org
1 creffett 14/01/21 20:26:27
2
3 Added: glsa-201401-23.xml
4 Log:
5 GLSA 201401-23
6
7 Revision Changes Path
8 1.1 xml/htdocs/security/en/glsa/glsa-201401-23.xml
9
10 file : http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201401-23.xml?rev=1.1&view=markup
11 plain: http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201401-23.xml?rev=1.1&content-type=text/plain
12
13 Index: glsa-201401-23.xml
14 ===================================================================
15 <?xml version="1.0" encoding="UTF-8"?>
16 <?xml-stylesheet href="/xsl/glsa.xsl" type="text/xsl"?>
17 <?xml-stylesheet href="/xsl/guide.xsl" type="text/xsl"?>
18 <!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
19 <glsa id="201401-23">
20 <title>sudo: Privilege escalation</title>
21 <synopsis>Multiple vulnerabilities have been found in sudo which could result
22 in privilege escalation.
23 </synopsis>
24 <product type="ebuild">sudo</product>
25 <announced>January 21, 2014</announced>
26 <revised>January 21, 2014: 1</revised>
27 <bug>459722</bug>
28 <access>local</access>
29 <affected>
30 <package name="app-admin/sudo" auto="yes" arch="*">
31 <unaffected range="ge">1.8.6_p7</unaffected>
32 <vulnerable range="lt">1.8.6_p7</vulnerable>
33 </package>
34 </affected>
35 <background>
36 <p>sudo allows a system administrator to give users the ability to run
37 commands as other users. Access to commands may also be granted on a
38 range to hosts.
39 </p>
40 </background>
41 <description>
42 <p>Multiple vulnerabilities have been found in sudo:</p>
43
44 <ul>
45 <li>sudo does not correctly validate the controlling terminal on a system
46 without /proc or when the tty_tickets option is enabled.
47 </li>
48 <li>sudo does not properly handle the clock when it is set to the epoch.</li>
49 </ul>
50 </description>
51 <impact type="high">
52 <p>A local attacker with sudo privileges could connect to the stdin,
53 stdout, and stderr of the terminal of a user who has authenticated with
54 sudo, allowing the attacker to hijack the authorization of the other
55 user. Additionally, a local or physically proximate attacker could set
56 the system clock to the epoch, bypassing time restrictions on sudo
57 authentication.
58 </p>
59 </impact>
60 <workaround>
61 <p>There is no known workaround at this time.</p>
62 </workaround>
63 <resolution>
64 <p>All sudo users should upgrade to the latest version:</p>
65
66 <code>
67 # emerge --sync
68 # emerge --ask --oneshot --verbose "&gt;=app-admin/sudo-1.8.6_p7"
69 </code>
70
71 </resolution>
72 <references>
73 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1775">CVE-2013-1775</uri>
74 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1776">CVE-2013-1776</uri>
75 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2776">CVE-2013-2776</uri>
76 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2777">CVE-2013-2777</uri>
77 </references>
78 <metadata tag="requester" timestamp="Fri, 03 Jan 2014 14:24:36 +0000">ackle</metadata>
79 <metadata tag="submitter" timestamp="Tue, 21 Jan 2014 20:25:34 +0000">
80 creffett
81 </metadata>
82 </glsa>