Date: Wednesday, April 18th, 2001 12.26 MEST
Affected SuSE versions: 6.1, 6.2, 6.3, 6.4, 7.0, 7.1
Vulnerability Type: possible local root compromise
Severity (1-10): 6
SuSE default package: no
Other affected systems: all systems using sudo
Content of this advisory:
1) security vulnerability resolved: sudo
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds
3) standard appendix (further information)
problem description, brief discussion, solution, upgrade information
The setuid application sudo(8) allows a user to execute commands under the privileges of another user (including root). sudo(8) previous to version 1.6.3p6 is vulnerable by a buffer overflow in it's logging code, which could lead to local root compromise.
There is no exploit known to be public. A useful workaround isn't possible, the only fix is to install the new sudo packages.
Download the update package from locations described below and install the package with the command `rpm -Uhv file.rpm'. The md5sum for each file is in the line below. You can verify the integrity of the rpm files using the command
`rpm --checksig --nogpg file.rpm', independently from the md5 signatures below.
The information in this advisory may be distributed or reproduced, provided that the advisory is not modified in any way. SuSE GmbH makes no warranties of any kind whatsoever with respect to the information contained in this security advisory.
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.