sudo-1.7.2p1-13.AXS3

エラータID: AXSA:2012-350:01

Release date: 
Thursday, March 15, 2012 - 20:52
Subject: 
sudo-1.7.2p1-13.AXS3
Affected Channels: 
Asianux Server 3 for x86_64
Asianux Server 3 for x86
Severity: 
High
Description: 

Sudo (superuser do) allows a system administrator to give certain users (or groups of users) the ability to run some (or all) commands as root while logging all commands and arguments. Sudo operates on a per-command basis. It is not a replacement for the shell. Features include: the ability to restrict what commands a user may run on a per-host basis, copious logging of each command (providing a clear audit trail of who did what), a configurable timeout of the sudo command, and the ability to use the same configuration file (sudoers) on many different machines.
Security issues fixed with this release:
• CVE-2011-0010
check.c in sudo 1.7.x before 1.7.4p5, when a Runas group is configured, does not require a password for command execution that involves a gid change but no uid change, which allows local users to bypass an intended authentication requirement via the -g option to a sudo command.
Fixed bugs:
• Running the sudo utility with the -g option when configured not to ask for user's password caused a segmentation fault. This has been fixed.
• Added a sudoers entry to the nsswitch.conf file on install (it is deleted on uninstall) so that the sudo tool loads sudoers from an LDAP server afer a sudo upgrade.
• Fixed the parsing of the comment characters (#) in the ldap.conf file.
• sudo does not format its output to the width of the terminal window when the output is redirected through a pipeline.
• Fixed bug in Runas_Spec group matching: the Runas group aliases are honored as expected.
• Previously, after switching to an unprivileged user, sudo performed some SELinux related initialization: this could prevent the correct setup of the SELinux environment and potentially cause an access denial. Backporting the SELinux related code fixed the problem.
• Before reported an execv(3) function failure, sudo performed an auditing call which reset the error state, thus making the tool report a command success. This has been fixed.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. sudo-1.7.2p1-13.AXS3.src.rpm
    MD5: f3ff7b5720389d508cb966c788ab4af8
    SHA-256: 67bd88175b240d6fe2478000f0ac743105a2a8fb3c1920ee4008b0f8226e3215
    Size: 853.07 kB

Asianux Server 3 for x86
  1. sudo-1.7.2p1-13.AXS3.i386.rpm
    MD5: 664b8167472367bba611fb5571e6e877
    SHA-256: 612c0b89993cbdb1f87690c31140ecf2ac393efa6369eaf7d6517b94561bab4a
    Size: 352.01 kB

Asianux Server 3 for x86_64
  1. sudo-1.7.2p1-13.AXS3.x86_64.rpm
    MD5: bb61c8f2d21bbed9d26156d85645b13f
    SHA-256: d700175b3a40b7ecd90aff41ea3a214ff0f6b787e0133e4cc5315e410d3fc947
    Size: 358.80 kB