| Summary: | sudo new security issues CVE-2013-1775 and CVE-2013-1776 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | critical | ||
| Priority: | Normal | CC: | davidwhodgins, sysadmin-bugs, tmb |
| Version: | 2 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/540474/ | ||
| Whiteboard: | MGA2-64-OK MGA2-32-OK | ||
| Source RPM: | sudo-1.8.3p2-2.mga2.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2013-02-28 19:41:40 CET
1.8.6p7 is now pushed in Cauldron. I couldn't recreate the problem, and if I understand it correctly, after resetting the time to the epoch, the sudo command would have to be entered within one second. so I'm just testing that the updated package works. Testing complete on Mageia 2 i586 and x86_64. Could someone from the sysadmin team push the srpm sudo-1.8.3p2-2.1.mga2.src.rpm from Mageia 2 Core Updates Testing to Core Updates. Advisory: Updated sudo packages fix security vulnerabilities: Marco Schoepl discovered that Sudo incorrectly handled time stamp files when the system clock is set to epoch. A local attacker could use this issue to run Sudo commands without a password prompt (CVE-2013-1775). Sudo before 1.8.6p7 allows a malicious user to run commands via sudo without authenticating, so long as there exists a terminal the user has access to where a sudo command was successfully run by that same user within the password timeout period (usually five minutes) (CVE-2013-1776). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1776 http://www.sudo.ws/sudo/alerts/epoch_ticket.html http://www.sudo.ws/sudo/alerts/tty_tickets.html http://www.ubuntu.com/usn/usn-1754-1/ https://bugs.mageia.org/show_bug.cgi?id=9207 Keywords:
(none) =>
validated_update Update pushed: https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0078 Status:
NEW =>
RESOLVED CVE-2013-1776 has now been split and there's a CVE-2013-2776 associated with it as well. The reasons for the split are unclear. Regardless, we've already fixed it. http://lwn.net/Vulnerabilities/569024/ |