From: Seemant Kulleen <seemant@gentoo.org>
To: gentoo-security@gentoo.org, gentoo-announce@gentoo.org,
lwn@lwn.net
Subject: Buffer overflow in sudo
Date: Thu, 25 Apr 2002 19:51:16 -0700
- -----------------------------------------------------------------------
GLSA: GENTOO LINUX SECURITY ANNOUNCEMENT
- -----------------------------------------------------------------------
PACKAGE : sudo
SUMMARY : security vulnerability in sudo
DATE : Apr 26 02:47:22 UTC 2002
- -----------------------------------------------------------------------
OVERVIEW
A security vulnerability has been found that might allow a local attacker
to gain elevated priveleges. This affects Gentoo's and sudo-1.6.5_p2
prior packages.
DETAIL
Fix for a security vulnerability that could allow local attackers to gain
elevated privileges though a buffer overflow exploit, related to the
expansion of %h and %u in the prompt. Full details available at
http://www.sudo.ws/pipermail/sudo-announce/2002-April/000020.html
SOLUTION
It is recommended that all Gentoo Linux users who are running sudo update
their systems as follows.
emerge --clean rsync
emerge sudo
emerge clean
- ------------------------------------------------------------------------
bangert@gentoo.org
seemant@gentoo.org
drobbins@gentoo.org
- ------------------------------------------------------------------------