USN-2146-1: Sudo vulnerabilities

Ubuntu Security Notice USN-2146-1

13th March, 2014

sudo vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 13.10
  • Ubuntu 12.10
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

Several security issues were fixed in Sudo.

Software description

  • sudo - Provide limited super user privileges to specific users

Details

Sebastien Macke discovered that Sudo incorrectly handled blacklisted
environment variables when the env_reset option was disabled. A local
attacker could use this issue to possibly run unintended commands by using
blacklisted environment variables. In a default Ubuntu installation, the
env_reset option is enabled by default. This issue only affected Ubuntu
10.04 LTS and Ubuntu 12.04 LTS. (CVE-2014-0106)

It was discovered that the Sudo init script set a date in the past on
existing timestamp files instead of using epoch to invalidate them
completely. A local attacker could possibly modify the system time to
attempt to reuse timestamp files. This issue only applied to Ubuntu
12.04 LTS, Ubuntu 12.10 and Ubuntu 13.10. (LP: #1223297)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 13.10:
sudo-ldap 1.8.6p3-0ubuntu3.1
sudo 1.8.6p3-0ubuntu3.1
Ubuntu 12.10:
sudo-ldap 1.8.5p2-1ubuntu1.2
sudo 1.8.5p2-1ubuntu1.2
Ubuntu 12.04 LTS:
sudo-ldap 1.8.3p1-1ubuntu3.6
sudo 1.8.3p1-1ubuntu3.6
Ubuntu 10.04 LTS:
sudo-ldap 1.7.2p1-1ubuntu5.7
sudo 1.7.2p1-1ubuntu5.7

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-0106, LP: 1223297