USN-928-1: Sudo vulnerability

Ubuntu Security Notice USN-928-1

15th April, 2010

sudo vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 9.10
  • Ubuntu 9.04
  • Ubuntu 8.10
  • Ubuntu 8.04 LTS
  • Ubuntu 6.06 LTS

Software description

  • sudo

Details

Valerio Costamagna discovered that sudo did not properly validate the path
for the 'sudoedit' pseudo-command when the PATH contained only a dot ('.').
If secure_path and ignore_dot were disabled, a local attacker could exploit
this to execute arbitrary code as root if sudo was configured to allow the
attacker to use sudoedit. By default, secure_path is used and the sudoedit
pseudo-command is not used in Ubuntu. This is a different but related issue
to CVE-2010-0426.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 9.10:
sudo-ldap 1.7.0-1ubuntu2.2
sudo 1.7.0-1ubuntu2.2
Ubuntu 9.04:
sudo-ldap 1.6.9p17-1ubuntu3.2
sudo 1.6.9p17-1ubuntu3.2
Ubuntu 8.10:
sudo-ldap 1.6.9p17-1ubuntu2.3
sudo 1.6.9p17-1ubuntu2.3
Ubuntu 8.04 LTS:
sudo-ldap 1.6.9p10-1ubuntu3.7
sudo 1.6.9p10-1ubuntu3.7
Ubuntu 6.06 LTS:
sudo-ldap 1.6.8p12-1ubuntu6.2
sudo 1.6.8p12-1ubuntu6.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system upgrade is sufficient to effect the
necessary changes.

References

LP: 563963