Bug 139478 (CVE-2004-1051, CVE-2005-4158, CVE-2006-0151)
| Summary: | CVE-2004-1051 bash scripts run via Sudo can be subverted (CVE-2005-4158, CVE-2006-0151) | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Jindrich Novy <jnovy> |
| Component: | sudo | Assignee: | Thomas Woerner <twoerner> |
| Status: | CLOSED WONTFIX | QA Contact: | Ben Levenson <benl> |
| Severity: | low | Docs Contact: | |
| Priority: | medium | ||
| Version: | rawhide | CC: | bressers, carenas, mattdm, mjc, pknirsch, redhat, tao |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://www.sudo.ws/sudo/alerts/bash_functions.html | ||
| Whiteboard: | impact=low,public=20041111 | ||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2005-04-20 00:38:08 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Jindrich Novy
2004-11-16 08:11:09 UTC
This issue is not a proper fix, nor should it pose a security issue for users of sudo. The fundamental purpose behind sudo is to give trusted users the ability to perform certain actions as root, without actually having the root password. There are countless other ways to trick sudo into doing things it shouldn't be (hence the word "trusted"). This fix represents a false sense of security and should be considered incomplete at best. If an administrator is worried about untrusted users altering the environment, they should be setting the env_reset variable in the sudoers file. This will clean the whole environment, not just worry about some aliases being set. There are a number of other environment variables that a user can alter to cause a script to have undesired consequences. The real solution to this issue is to set the env_reset variable by default in the installed /etc/sudoers file, and let an administrator unset it if they so desire. We should also leverage the features of selinux to further limit the reach of sudo in order to keep a target system protected. *** Bug 182390 has been marked as a duplicate of this bug. *** *** Bug 175403 has been marked as a duplicate of this bug. *** *** Bug 175295 has been marked as a duplicate of this bug. *** *** Bug 175297 has been marked as a duplicate of this bug. *** Statement for NVD: If an administrator is concerned that users who have been granted sudo privileges can alter the environment, the existing "env_reset" option should be used which cleans the whole environment. |