The sudo (superuser do) is vulnerable to Privilege Escalation. The sudo utility did not properly initialize supplementary groups when the ârunas_defaultâ option (in the sudoers file) was used. If a local user were authorized by the sudoers file to perform their sudo commands under the account specified with ârunas_defaultâ, they would receive the root userâs supplementary groups instead of those of the intended target user, giving them unintended privileges.
ftp://ftp.sudo.ws/pub/sudo/sudo-1.6.9p21.patch.gz
ftp://ftp.sudo.ws/pub/sudo/sudo-1.6.9p21.patch.gz
lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html
secunia.com/advisories/38762
secunia.com/advisories/38795
secunia.com/advisories/38803
secunia.com/advisories/38915
securitytracker.com/id?1023658
sudo.ws/repos/sudo/rev/aa0b6c01c462
wiki.rpath.com/Advisories:rPSA-2010-0075
www.debian.org/security/2010/dsa-2006
www.gentoo.org/security/en/glsa/glsa-201003-01.xml
www.gratisoft.us/bugzilla/attachment.cgi?id=255
www.gratisoft.us/bugzilla/show_bug.cgi?id=349
www.openwall.com/lists/oss-security/2010/02/23/4
www.openwall.com/lists/oss-security/2010/02/24/5
www.redhat.com/security/updates/classification/#important
www.securityfocus.com/archive/1/514489/100/0/threaded
www.sudo.ws/cgi-bin/cvsweb/sudo/set_perms.c.diff?r1=1.30.2.7&r2=1.30.2.8
www.ubuntu.com/usn/USN-905-1
access.redhat.com/errata/RHSA-2010:0122
bugzilla.redhat.com/show_bug.cgi?id=567622
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10946
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7216