OpenBSD Journal

Security Fix for sudo

Contributed by grey on from the delegating power responsibly dept.

Thanks to Richard "Ringo" Langly for being the first to submit a story about the recent security fix to sudo, from http://www.openbsd.org/errata.html:

Due to a race condition in its command pathname handling, a user with sudo(8) privileges may be able to run arbitrary commands if the user's entry is followed by an entry that grants sudo ALL privileges to another user.

The problem has been fixed in OpenBSD-current as well as the 3.6 and 3.7 -stable branches. Patches for OpenBSD 3.6 and 3.7 are also available:
3.6 fix: ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.6/common/018_sudo.patch
3.7 fix: ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.7/common/003_sudo.patch

(Comments are closed)


Latest Articles

Credits

Copyright © - Daniel Hartmeier. All rights reserved. Articles and comments are copyright their respective authors, submission implies license to publish on this web site. Contents of the archive prior to as well as images and HTML templates were copied from the fabulous original deadly.org with Jose's and Jim's kind permission. This journal runs as CGI with httpd(8) on OpenBSD, the source code is BSD licensed. undeadly \Un*dead"ly\, a. Not subject to death; immortal. [Obs.]