Joined: 12 May 2004
|Posted: Sat Jan 25, 2014 4:19 am Post subject: [ GLSA 201401-23 ] sudo: Privilege escalation
|Gentoo Linux Security Advisory
Title: sudo: Privilege escalation (GLSA 201401-23)
Date: January 21, 2014
Multiple vulnerabilities have been found in sudo which could result
in privilege escalation.
sudo allows a system administrator to give users the ability to run
commands as other users. Access to commands may also be granted on a
range to hosts.
Vulnerable: < 1.8.6_p7
Unaffected: >= 1.8.6_p7
Architectures: All supported architectures
Multiple vulnerabilities have been found in sudo:
- sudo does not correctly validate the controlling terminal on a system
without /proc or when the tty_tickets option is enabled.
- sudo does not properly handle the clock when it is set to the epoch.
A local attacker with sudo privileges could connect to the stdin,
stdout, and stderr of the terminal of a user who has authenticated with
sudo, allowing the attacker to hijack the authorization of the other
user. Additionally, a local or physically proximate attacker could set
the system clock to the epoch, bypassing time restrictions on sudo
There is no known workaround at this time.
All sudo users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=app-admin/sudo-1.8.6_p7"