Secunia Security Advisory - Ubuntu has issued an update for sudo. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.
bb9515caa9ab40e7a59d0267bc55d767c0ccdcb92dd23913539cc9ca38132323
TITLE:
Ubuntu update for sudo
SECUNIA ADVISORY ID:
SA18363
VERIFY ADVISORY:
http://secunia.com/advisories/18363/
CRITICAL:
Less critical
IMPACT:
Privilege escalation
WHERE:
Local system
OPERATING SYSTEM:
Ubuntu Linux 5.10
http://secunia.com/product/6606/
Ubuntu Linux 5.04
http://secunia.com/product/5036/
Ubuntu Linux 4.10
http://secunia.com/product/4491/
DESCRIPTION:
Ubuntu has issued an update for sudo. This fixes a vulnerability,
which can be exploited by malicious, local users to gain escalated
privileges.
For more information:
SA18358
SOLUTION:
Apply updated packages.
-- Ubuntu 4.10 --
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.7p5-1ubuntu4.5.diff.gz
Size/MD5: 28087 c4c49fb56eaf07d8d8312e1563de869a
http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.7p5-1ubuntu4.5.dsc
Size/MD5: 585 0dfe580569af7a6f75aeb51462d26ca6
http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.7p5.orig.tar.gz
Size/MD5: 349785 55d503e5c35bf1ea83d38244e0242aaf
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.7p5-1ubuntu4.5_amd64.deb
Size/MD5: 156652 4753cf309a44e54bf6138e9079f2ab30
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.7p5-1ubuntu4.5_i386.deb
Size/MD5: 146076 2bc7039c20afd55c7c582edf41fda32c
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.7p5-1ubuntu4.5_powerpc.deb
Size/MD5: 153628 9d11cfcfa5032bfb13e5c3e191617cdf
-- Ubuntu 5.04 --
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p5-1ubuntu2.4.diff.gz
Size/MD5: 31718 cc1670e4bf8f650c084e18d55e190c3c
http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p5-1ubuntu2.4.dsc
Size/MD5: 585 141818c0d2b26303249d6d52c26ce30e
http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p5.orig.tar.gz
Size/MD5: 584832 03538d938b8593d6f1d66ec6c067b5b5
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p5-1ubuntu2.4_amd64.deb
Size/MD5: 170814 caeb3203cb545fbe24c1a7aa96bc6458
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p5-1ubuntu2.4_i386.deb
Size/MD5: 159028 f4eabdef51f7cfc9a113ced11357fcfa
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p5-1ubuntu2.4_powerpc.deb
Size/MD5: 165906 6fc233ccadceec79b1549d5edc387f3e
-- Ubuntu 5.10 --
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p9-2ubuntu2.3.diff.gz
Size/MD5: 28883 2dc82337e89f8b2ec2298e31013d041c
http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p9-2ubuntu2.3.dsc
Size/MD5: 585 03cdee65604b21bb9c0a1a1d8a530d36
http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p9.orig.tar.gz
Size/MD5: 585509 6d0346abd16914956bc7ea4f17fc85fb
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p9-2ubuntu2.3_amd64.deb
Size/MD5: 172726 350f0454c379778fec471c47107428ab
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p9-2ubuntu2.3_i386.deb
Size/MD5: 159132 127092a5fc0522ed272df38216d31acc
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p9-2ubuntu2.3_powerpc.deb
Size/MD5: 167288 e049b18ebc0b282e513a3e20427ef4be
ORIGINAL ADVISORY:
http://www.ubuntulinux.org/usn/usn-235-2
OTHER REFERENCES:
SA18358:
http://secunia.com/advisories/SA18358/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------