Bug 567622 (CVE-2010-0427) - CVE-2010-0427 sudo: Fails to reset group permissions if runas_default set
Summary: CVE-2010-0427 sudo: Fails to reset group permissions if runas_default set
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2010-0427
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: i686
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://www.gratisoft.us/bugzilla/show...
Whiteboard:
Depends On: 497873 567689
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-02-23 13:30 UTC by Jan Lieskovsky
Modified: 2021-11-12 20:04 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of: 497873
Environment:
Last Closed: 2010-03-03 14:42:54 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2010:0122 0 normal SHIPPED_LIVE Important: sudo security update 2010-02-26 11:06:06 UTC

Description Jan Lieskovsky 2010-02-23 13:30:47 UTC
Sudo failed to properly reset group permissions, when
"runas_default" option was used. If a local, unprivileged
user was authorized by sudoers file to perform their
sudo commands under default user account, it could lead
to privilege escalation.

Upstream bug report:
  http://www.gratisoft.us/bugzilla/show_bug.cgi?id=349

Upstream patch:
  http://www.gratisoft.us/bugzilla/attachment.cgi?id=255

Comment 2 Jan Lieskovsky 2010-02-23 16:17:53 UTC
This is CVE-2010-0427.

Comment 7 errata-xmlrpc 2010-02-26 11:06:14 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2010:0122 https://rhn.redhat.com/errata/RHSA-2010-0122.html

Comment 8 Jan Lieskovsky 2010-02-26 16:36:45 UTC
This issue did NOT affect the versions of the sudo package,
as shipped with Red Hat Enterprise Linux 3 and 4.

This issue did NOT affect the current versions of the sudo package,
as shipped with Fedora releases of 11 and 12.


Note You need to log in before you can comment on or make changes to this bug.