Ubuntu 956-1: sudo vulnerability

    Date30 Jun 2010
    CategoryUbuntu
    65
    Posted ByLinuxSecurity Advisories
    Evan Broder and Anders Kaseorg discovered that sudo did not properly sanitize its environment when configured to use secure_path (the default in Ubuntu). A local attacker could exploit this to execute arbitrary code as root if sudo was configured to allow the attacker to use a program that interpreted the PATH environment variable. [More...]
    ===========================================================
    Ubuntu Security Notice USN-956-1              June 30, 2010
    sudo vulnerability
    CVE-2010-1646
    ===========================================================
    
    A security issue affects the following Ubuntu releases:
    
    Ubuntu 6.06 LTS
    Ubuntu 8.04 LTS
    Ubuntu 9.04
    Ubuntu 9.10
    Ubuntu 10.04 LTS
    
    This advisory also applies to the corresponding versions of
    Kubuntu, Edubuntu, and Xubuntu.
    
    The problem can be corrected by upgrading your system to the
    following package versions:
    
    Ubuntu 6.06 LTS:
      sudo                            1.6.8p12-1ubuntu6.3
      sudo-ldap                       1.6.8p12-1ubuntu6.3
    
    Ubuntu 8.04 LTS:
      sudo                            1.6.9p10-1ubuntu3.8
      sudo-ldap                       1.6.9p10-1ubuntu3.8
    
    Ubuntu 9.04:
      sudo                            1.6.9p17-1ubuntu3.3
      sudo-ldap                       1.6.9p17-1ubuntu3.3
    
    Ubuntu 9.10:
      sudo                            1.7.0-1ubuntu2.4
      sudo-ldap                       1.7.0-1ubuntu2.4
    
    Ubuntu 10.04 LTS:
      sudo                            1.7.2p1-1ubuntu5.1
      sudo-ldap                       1.7.2p1-1ubuntu5.1
    
    In general, a standard system update will make all the necessary changes.
    
    Details follow:
    
    Evan Broder and Anders Kaseorg discovered that sudo did not properly
    sanitize its environment when configured to use secure_path (the default in
    Ubuntu). A local attacker could exploit this to execute arbitrary code as
    root if sudo was configured to allow the attacker to use a program that
    interpreted the PATH environment variable.
    
    
    Updated packages for Ubuntu 6.06 LTS:
    
      Source archives:
    
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p12-1ubuntu6.3.diff.gz
          Size/MD5:    37216 36d4b120d354c87515638af637c67b0d
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p12-1ubuntu6.3.dsc
          Size/MD5:      618 fd85854200bf0fedfd8cfc2eea79f99f
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p12.orig.tar.gz
          Size/MD5:   585643 b29893c06192df6230dd5f340f3badf5
    
      amd64 architecture (Athlon64, Opteron, EM64T Xeon):
    
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p12-1ubuntu6.3_amd64.deb
          Size/MD5:   177586 2cd655781c221cae8b6cad28940f5c0b
        http://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.6.8p12-1ubuntu6.3_amd64.deb
          Size/MD5:   189546 e56b9addd85551a900c7c41043790cc7
    
      i386 architecture (x86 compatible Intel/AMD):
    
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p12-1ubuntu6.3_i386.deb
          Size/MD5:   163104 b2f38f1ef9367319175c324686dd412c
        http://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.6.8p12-1ubuntu6.3_i386.deb
          Size/MD5:   174564 e2b8a930e343743aeba947c596d1ede8
    
      powerpc architecture (Apple Macintosh G3/G4/G5):
    
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p12-1ubuntu6.3_powerpc.deb
          Size/MD5:   171814 ef22e4eb3671266eedfb8379f00976fa
        http://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.6.8p12-1ubuntu6.3_powerpc.deb
          Size/MD5:   183978 713c3bb97173d3a9749d7a41b2a4a050
    
      sparc architecture (Sun SPARC/UltraSPARC):
    
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p12-1ubuntu6.3_sparc.deb
          Size/MD5:   167838 4444228753a954e3467eced9ac5388cb
        http://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.6.8p12-1ubuntu6.3_sparc.deb
          Size/MD5:   180344 4387b62da168e7332b46e33fa322dd4d
    
    Updated packages for Ubuntu 8.04 LTS:
    
      Source archives:
    
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p10-1ubuntu3.8.diff.gz
          Size/MD5:    29555 823267afe725ef0ae810d4fc7700d6bd
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p10-1ubuntu3.8.dsc
          Size/MD5:      702 03f53a9efbb7700134b4148bfc19a561
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p10.orig.tar.gz
          Size/MD5:   579302 16db2a1213159a1fac8239eab58108f5
    
      amd64 architecture (Athlon64, Opteron, EM64T Xeon):
    
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p10-1ubuntu3.8_amd64.deb
          Size/MD5:   188554 4f9915f8178f0d76a869727e5b46f24c
        http://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.6.9p10-1ubuntu3.8_amd64.deb
          Size/MD5:   200236 3d0dcf5ef68f5e1f9386b124a2d5742c
    
      i386 architecture (x86 compatible Intel/AMD):
    
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p10-1ubuntu3.8_i386.deb
          Size/MD5:   176750 25768f74f7307dba01043312d5eb7762
        http://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.6.9p10-1ubuntu3.8_i386.deb
          Size/MD5:   187664 bb916ab875765dd99eba9854372bf07f
    
      lpia architecture (Low Power Intel Architecture):
    
        http://ports.ubuntu.com/pool/main/s/sudo/sudo_1.6.9p10-1ubuntu3.8_lpia.deb
          Size/MD5:   177924 7d937eb2ec4ca7383af5f45bf00f577a
        http://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.6.9p10-1ubuntu3.8_lpia.deb
          Size/MD5:   188644 808af9dcc20690a441ed35510748e749
    
      powerpc architecture (Apple Macintosh G3/G4/G5):
    
        http://ports.ubuntu.com/pool/main/s/sudo/sudo_1.6.9p10-1ubuntu3.8_powerpc.deb
          Size/MD5:   188840 f00f19aaae04cc80d5fe1984d822fd2c
        http://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.6.9p10-1ubuntu3.8_powerpc.deb
          Size/MD5:   202650 e55052d973d6c2fd2043defcc282c3f5
    
      sparc architecture (Sun SPARC/UltraSPARC):
    
        http://ports.ubuntu.com/pool/main/s/sudo/sudo_1.6.9p10-1ubuntu3.8_sparc.deb
          Size/MD5:   182768 6e0af3cc2bc1b5f892eaab248c7ad8ec
        http://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.6.9p10-1ubuntu3.8_sparc.deb
          Size/MD5:   193902 0c1e237c1b994c2c82bfcf3f0ef7eaa5
    
    Updated packages for Ubuntu 9.04:
    
      Source archives:
    
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p17-1ubuntu3.3.diff.gz
          Size/MD5:    26524 ec4d4eb3a0cad8e53158420c2b24e971
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p17-1ubuntu3.3.dsc
          Size/MD5:     1098 2c73a1f6b6a18d8c201cbe3562f8e9c4
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p17.orig.tar.gz
          Size/MD5:   593534 60daf18f28e2c1eb7641c4408e244110
    
      amd64 architecture (Athlon64, Opteron, EM64T Xeon):
    
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p17-1ubuntu3.3_amd64.deb
          Size/MD5:   191512 cf450b2ede8d4e51dce2e8c373c7388b
        http://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.6.9p17-1ubuntu3.3_amd64.deb
          Size/MD5:   202506 a5eb0005ccfa19658f35cf731c132562
    
      i386 architecture (x86 compatible Intel/AMD):
    
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p17-1ubuntu3.3_i386.deb
          Size/MD5:   179656 3a1893071ae30a1432b65c9324d44d91
        http://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.6.9p17-1ubuntu3.3_i386.deb
          Size/MD5:   189098 dc1d5298fee0ce78e8848aeeff851120
    
      lpia architecture (Low Power Intel Architecture):
    
        http://ports.ubuntu.com/pool/main/s/sudo/sudo_1.6.9p17-1ubuntu3.3_lpia.deb
          Size/MD5:   180712 0a9c3a5d3087bdb0e2338e42a9331038
        http://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.6.9p17-1ubuntu3.3_lpia.deb
          Size/MD5:   189918 ce218336ad2636084f85c5021001751b
    
      powerpc architecture (Apple Macintosh G3/G4/G5):
    
        http://ports.ubuntu.com/pool/main/s/sudo/sudo_1.6.9p17-1ubuntu3.3_powerpc.deb
          Size/MD5:   189010 422acec867c52e8e3f9bd56371078377
        http://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.6.9p17-1ubuntu3.3_powerpc.deb
          Size/MD5:   201504 282cc2ca98c0ae4321f272d78fd0a18d
    
      sparc architecture (Sun SPARC/UltraSPARC):
    
        http://ports.ubuntu.com/pool/main/s/sudo/sudo_1.6.9p17-1ubuntu3.3_sparc.deb
          Size/MD5:   184370 06d2468d2b1c299beb7e95da9cbc2772
        http://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.6.9p17-1ubuntu3.3_sparc.deb
          Size/MD5:   194100 69979206fc67d3b70d1639c7cf40712d
    
    Updated packages for Ubuntu 9.10:
    
      Source archives:
    
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.0-1ubuntu2.4.diff.gz
          Size/MD5:    24804 80718336a92f5c63f38ee7d84c8ff170
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.0-1ubuntu2.4.dsc
          Size/MD5:     1117 0a739ae85420fc8043bc66f03a743676
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.0.orig.tar.gz
          Size/MD5:   744311 5fd96bba35fe29b464f7aa6ad255f0a6
    
      amd64 architecture (Athlon64, Opteron, EM64T Xeon):
    
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.0-1ubuntu2.4_amd64.deb
          Size/MD5:   310494 5fb9286a8835453da39328a9ef46932a
        http://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.7.0-1ubuntu2.4_amd64.deb
          Size/MD5:   334170 235e0f65990362782228dece635dee16
    
      i386 architecture (x86 compatible Intel/AMD):
    
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.0-1ubuntu2.4_i386.deb
          Size/MD5:   297946 aa67fe2e4c89151c743a86404e473833
        http://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.7.0-1ubuntu2.4_i386.deb
          Size/MD5:   319482 e5518c7a600c3f3b316e52767ef8907d
    
      lpia architecture (Low Power Intel Architecture):
    
        http://ports.ubuntu.com/pool/main/s/sudo/sudo_1.7.0-1ubuntu2.4_lpia.deb
          Size/MD5:   298134 152bfbe937de0aa1a7bb3d181700d7bb
        http://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.7.0-1ubuntu2.4_lpia.deb
          Size/MD5:   319938 370ba3cd5d80883e7b8af93211756a20
    
      powerpc architecture (Apple Macintosh G3/G4/G5):
    
        http://ports.ubuntu.com/pool/main/s/sudo/sudo_1.7.0-1ubuntu2.4_powerpc.deb
          Size/MD5:   306170 e48e9bcc46b849c75675a84a85b07368
        http://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.7.0-1ubuntu2.4_powerpc.deb
          Size/MD5:   329136 348631f216fbf1bdd7ee0249911fb4ff
    
      sparc architecture (Sun SPARC/UltraSPARC):
    
        http://ports.ubuntu.com/pool/main/s/sudo/sudo_1.7.0-1ubuntu2.4_sparc.deb
          Size/MD5:   301730 0fe061194552253d3e992c75062ff350
        http://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.7.0-1ubuntu2.4_sparc.deb
          Size/MD5:   323868 304cae7b60bf4c7c77523cbb62fc9e6d
    
    Updated packages for Ubuntu 10.04:
    
      Source archives:
    
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.2p1-1ubuntu5.1.diff.gz
          Size/MD5:    25851 33f5906cd8e8582e00e8baa1e5d54856
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.2p1-1ubuntu5.1.dsc
          Size/MD5:     1131 665431dec087634bbcad17f22921f418
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.2p1.orig.tar.gz
          Size/MD5:   771059 4449d466a774f5ce401c9c0e3866c026
    
      amd64 architecture (Athlon64, Opteron, EM64T Xeon):
    
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.2p1-1ubuntu5.1_amd64.deb
          Size/MD5:   326542 f751940841d09c48d1e87c768f7e9356
        http://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.7.2p1-1ubuntu5.1_amd64.deb
          Size/MD5:   350420 88622f029bdf13205434aac8e647bd4f
    
      i386 architecture (x86 compatible Intel/AMD):
    
        http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.2p1-1ubuntu5.1_i386.deb
          Size/MD5:   312350 f833abff9e23e619bb97129e9b7b9257
        http://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.7.2p1-1ubuntu5.1_i386.deb
          Size/MD5:   334338 877a883d1c886abc15b1502f95e0532b
    
      powerpc architecture (Apple Macintosh G3/G4/G5):
    
        http://ports.ubuntu.com/pool/main/s/sudo/sudo_1.7.2p1-1ubuntu5.1_powerpc.deb
          Size/MD5:   321274 30e33ca134b61a4e6e7952032d7e639c
        http://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.7.2p1-1ubuntu5.1_powerpc.deb
          Size/MD5:   345158 ffff986a6af277e8035e840f922f3a16
    
      sparc architecture (Sun SPARC/UltraSPARC):
    
        http://ports.ubuntu.com/pool/main/s/sudo/sudo_1.7.2p1-1ubuntu5.1_sparc.deb
          Size/MD5:   318478 f77a189b478f46fd930754adee2e7b1d
        http://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.7.2p1-1ubuntu5.1_sparc.deb
          Size/MD5:   341708 4e38581147410e7ff4a61d6bbcd23bdd
    
    
    
    -- 
    Jamie Strandboge             | http://www.canonical.com
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"39","type":"x","order":"1","pct":50,"resources":[]},{"id":"88","title":"Should be more technical","votes":"11","type":"x","order":"2","pct":14.1,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"28","type":"x","order":"3","pct":35.9,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.