[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 473/05 - Mandriva - Updated sudo packages fix race condition vulnerability [MDKSA-2005:103]



 
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 473/05 dated 23.06.05  Time: 15:40  
  UNIRAS is part of NISCC (National Infrastructure Security Co-ordination Centre)
- ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ----------------------------------------------------------------------------------

Title
=====
Mandriva - Updated sudo packages fix race condition vulnerability [MDKSA-2005:103]

Detail
====== 

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

                Mandriva Linux Security Update Advisory
 _______________________________________________________________________

 Package name:           sudo
 Advisory ID:            MDKSA-2005:103
 Date:                   June 21st, 2005

 Affected versions:	 10.0, 10.1, 10.2, Corporate 3.0,
			 Corporate Server 2.1
 ______________________________________________________________________

 Problem Description:

 A race condition was discovered in sudo by Charles Morris.  This could
 lead to the escalation of privileges if /etc/sudoers allowed a user to
 execute selected programs that were then followed by another line
 containing the pseudo-command "ALL".  By creating symbolic links at a
 certain time, that user could execute arbitrary commands.
 
 The updated packages have been patched to correct this problem.
 _______________________________________________________________________

 References:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1993
  http://www.sudo.ws/sudo/alerts/path_race.html
 ______________________________________________________________________

 Updated Packages:
  
 Mandrakelinux 10.0:
 0fdbddfa1ca2298a05261c77c2eb0b43  10.0/RPMS/sudo-1.6.7-0.p5.2.2.100mdk.i586.rpm
 523d0cfc297e81c3381d5df89078b3bc  10.0/SRPMS/sudo-1.6.7-0.p5.2.2.100mdk.src.rpm

 Mandrakelinux 10.0/AMD64:
 69b25ae195069271c0a037aaa1912722  amd64/10.0/RPMS/sudo-1.6.7-0.p5.2.2.100mdk.amd64.rpm
 523d0cfc297e81c3381d5df89078b3bc  amd64/10.0/SRPMS/sudo-1.6.7-0.p5.2.2.100mdk.src.rpm

 Mandrakelinux 10.1:
 07e35abe22a51cbb66d8969cb6cd7738  10.1/RPMS/sudo-1.6.8p1-1.2.101mdk.i586.rpm
 5d636e00903aa9f1e954b658754379f0  10.1/SRPMS/sudo-1.6.8p1-1.2.101mdk.src.rpm

 Mandrakelinux 10.1/X86_64:
 3fe900becdac7248053415e5c37029ca  x86_64/10.1/RPMS/sudo-1.6.8p1-1.2.101mdk.x86_64.rpm
 5d636e00903aa9f1e954b658754379f0  x86_64/10.1/SRPMS/sudo-1.6.8p1-1.2.101mdk.src.rpm

 Mandrakelinux 10.2:
 fa3d69895a19bd321666c565e9919cdb  10.2/RPMS/sudo-1.6.8p1-2.1.102mdk.i586.rpm
 c9abd9d5ad76e4c5d8da20af10ba4601  10.2/SRPMS/sudo-1.6.8p1-2.1.102mdk.src.rpm

 Mandrakelinux 10.2/X86_64:
 56cba44d316f3d1623f20a3e5c102721  x86_64/10.2/RPMS/sudo-1.6.8p1-2.1.102mdk.x86_64.rpm
 c9abd9d5ad76e4c5d8da20af10ba4601  x86_64/10.2/SRPMS/sudo-1.6.8p1-2.1.102mdk.src.rpm

 Corporate Server 2.1:
 0574ea8f264d1ac850bc7401da9dfd46  corporate/2.1/RPMS/sudo-1.6.6-2.2.C21mdk.i586.rpm
 7520cfd6be4d4d2ce87787ebf1dccca2  corporate/2.1/SRPMS/sudo-1.6.6-2.2.C21mdk.src.rpm

 Corporate Server 2.1/X86_64:
 e971d73a7bd06d23d40d102bf113af75  x86_64/corporate/2.1/RPMS/sudo-1.6.6-2.2.C21mdk.x86_64.rpm
 7520cfd6be4d4d2ce87787ebf1dccca2  x86_64/corporate/2.1/SRPMS/sudo-1.6.6-2.2.C21mdk.src.rpm

 Corporate 3.0:
 551c661042bae4c9da2fab38fcfbf08a  corporate/3.0/RPMS/sudo-1.6.7-0.p5.2.2.C30mdk.i586.rpm
 ded9307a4c361548d164765a421e0f9e  corporate/3.0/SRPMS/sudo-1.6.7-0.p5.2.2.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 f392eecc2886cf8c73a4c27c3d86112d  x86_64/corporate/3.0/RPMS/sudo-1.6.7-0.p5.2.2.C30mdk.x86_64.rpm
 ded9307a4c361548d164765a421e0f9e  x86_64/corporate/3.0/SRPMS/sudo-1.6.7-0.p5.2.2.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFCuYFjmqjQ0CJFipgRAsEEAJ998YMjnujTKm3Eb33S2kXsYn8IYwCfRiSt
1BnR8aOEdr6qHyfN2LlMtlk=
=NTyJ
- -----END PGP SIGNATURE-----


- ----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via 
EMail to: uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 870 487 0748 Ext 4511
Fax: +44 (0) 870 487 0749

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 870 487 0748 and follow the prompts

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Mandriva for the information 
contained in this Briefing. 
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQCVAwUBQrrJXopao72zK539AQG6OQP+Pq8Yj/T3NA79IRwZqzbFMeA4sUQBNFIN
vZ7WXsGzuBVb2F0li6PsPBTJD0YARynGzSFIyuo3DSsaLo/ZyIbC6Vcsg64s2O50
IEoTN8biYqvF+YW/woWIuiElK5lQ9JKmFHMJEyBrX2o3XAxVKPb0bgRx02mXkQ0z
aM9b7rCejzA=
=LXSl
-----END PGP SIGNATURE-----


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________