LWN.net Logo

Mageia alert MGASA-2013-0078 (sudo)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2013-0078: sudo-1.8.3p2-2.1.mga2 (2/core)
Date:  Fri, 1 Mar 2013 22:28:31 +0100
Message-ID:  <20130301212831.GA28685@valstar.mageia.org>
Archive-link:  Article, Thread

MGASA-2013-0078 Date: March 1st, 2013 Affected releases: 2 Media: Core Description: Updated sudo packages fix security vulnerabilities: Marco Schoepl discovered that Sudo incorrectly handled time stamp files when the system clock is set to epoch. A local attacker could use this issue to run Sudo commands without a password prompt (CVE-2013-1775). Sudo before 1.8.6p7 allows a malicious user to run commands via sudo without authenticating, so long as there exists a terminal the user has access to where a sudo command was successfully run by that same user within the password timeout period (usually five minutes) (CVE-2013-1776). Updated Packages: i586: sudo-1.8.3p2-2.1.mga2.i586.rpm sudo-devel-1.8.3p2-2.1.mga2.i586.rpm sudo-debug-1.8.3p2-2.1.mga2.i586.rpm x86_64: sudo-1.8.3p2-2.1.mga2.x86_64.rpm sudo-devel-1.8.3p2-2.1.mga2.x86_64.rpm sudo-debug-1.8.3p2-2.1.mga2.x86_64.rpm SRPMS: sudo-1.8.3p2-2.1.mga2.src.rpm References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1776 http://www.sudo.ws/sudo/alerts/epoch_ticket.html http://www.sudo.ws/sudo/alerts/tty_tickets.html http://www.ubuntu.com/usn/usn-1754-1/ https://bugs.mageia.org/show_bug.cgi?id=9207 https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-...


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds