The sudo (superuser do) utility allows system administrators to give
certain users the ability to run commands as root with logging.
A flaw was discovered in a way sudo handled group specifications in βrun
asβ lists in the sudoers configuration file. If sudo configuration allowed
a user to run commands as any user of some group and the user was also a
member of that group, sudo incorrectly allowed them to run defined commands
with the privileges of any system user. This gave the user unintended
privileges. (CVE-2009-0034)
Users of sudo should update to this updated package, which contains a
backported patch to resolve this issue.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 5 | ppc | sudo | <Β 1.6.9p17-3.el5_3.1 | sudo-1.6.9p17-3.el5_3.1.ppc.rpm |
RedHat | 5 | s390x | sudo | <Β 1.6.9p17-3.el5_3.1 | sudo-1.6.9p17-3.el5_3.1.s390x.rpm |
RedHat | 5 | i386 | sudo | <Β 1.6.9p17-3.el5_3.1 | sudo-1.6.9p17-3.el5_3.1.i386.rpm |
RedHat | 5 | src | sudo | <Β 1.6.9p17-3.el5_3.1 | sudo-1.6.9p17-3.el5_3.1.src.rpm |
RedHat | 5 | ia64 | sudo | <Β 1.6.9p17-3.el5_3.1 | sudo-1.6.9p17-3.el5_3.1.ia64.rpm |
RedHat | 5 | x86_64 | sudo | <Β 1.6.9p17-3.el5_3.1 | sudo-1.6.9p17-3.el5_3.1.x86_64.rpm |