TITLE: Ubuntu update for sudo SECUNIA ADVISORY ID: SA18308 VERIFY ADVISORY: http://secunia.com/advisories/18308/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Ubuntu Linux 5.10 http://secunia.com/product/6606/ Ubuntu Linux 5.04 http://secunia.com/product/5036/ Ubuntu Linux 4.10 http://secunia.com/product/4491/ DESCRIPTION: Ubuntu has issued an update for sudo. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. For more information: SA17534 SOLUTION: Apply updated packages. -- Ubuntu 4.10 -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.7p5-1ubuntu4.4.diff.gz Size/MD5: 28048 5218c513df9c959dd313c4be22aaa25b http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.7p5-1ubuntu4.4.dsc Size/MD5: 585 3f914d6d796048d161dda14c8de1e09f http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.7p5.orig.tar.gz Size/MD5: 349785 55d503e5c35bf1ea83d38244e0242aaf amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.7p5-1ubuntu4.4_amd64.deb Size/MD5: 156626 e425b3d24d561805a976fbd860addf90 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.7p5-1ubuntu4.4_i386.deb Size/MD5: 146046 740822460f6711c889f331e6f63b3c3b powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.7p5-1ubuntu4.4_powerpc.deb Size/MD5: 153604 995c81080a1eb4b5266bae6fa3bad812 -- Ubuntu 5.04 -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p5-1ubuntu2.3.diff.gz Size/MD5: 24291 cfa4cda75436030ce5c8b2a5778f3736 http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p5-1ubuntu2.3.dsc Size/MD5: 585 8a8e0849da19d006b46655bbfa57b593 http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p5.orig.tar.gz Size/MD5: 584832 03538d938b8593d6f1d66ec6c067b5b5 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p5-1ubuntu2.3_amd64.deb Size/MD5: 170784 1da10690d4d5a3c3623e0b20282de467 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p5-1ubuntu2.3_i386.deb Size/MD5: 159012 be5ccb2125b6046ddc7b7b850d32812e powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p5-1ubuntu2.3_powerpc.deb Size/MD5: 165848 9a2e4fbd41fc1cc8280c3a013ef3d3fb -- Ubuntu 5.10 -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p9-2ubuntu2.2.diff.gz Size/MD5: 22481 3b49d421cf10302c44e601946c029f06 http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p9-2ubuntu2.2.dsc Size/MD5: 585 10738797809673ab80a30ce1a2401ffd http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p9.orig.tar.gz Size/MD5: 585509 6d0346abd16914956bc7ea4f17fc85fb amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p9-2ubuntu2.2_amd64.deb Size/MD5: 172686 466d5461ec58d669f5978ffe47e2ff1d i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p9-2ubuntu2.2_i386.deb Size/MD5: 159106 5a4898a7ea752ae91b9113d5d8d5751c powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p9-2ubuntu2.2_powerpc.deb Size/MD5: 167236 43125eeceec512ca67b03d30fc4d2484 ORIGINAL ADVISORY: http://www.ubuntulinux.org/usn/usn-235-1 http://lists.ubuntu.com/archives/ubuntu-security-announce/2006-January/000266.html OTHER REFERENCES: SA17534: http://secunia.com/advisories/17534/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------