CESA-2010:0122 -- centos 5 i386 sudoID: oval:org.secpod.oval:def:201735 | Date: (C)2012-01-31 (M)2021-09-11 |
Class: PATCH | Family: unix |
The sudo utility allows system administrators to give certain users the ability to run commands as root. A privilege escalation flaw was found in the way sudo handled the sudoedit pseudo-command. If a local user were authorized by the sudoers file to use this pseudo-command, they could possibly leverage this flaw to execute arbitrary code with the privileges of the root user. The sudo utility did not properly initialize supplementary groups when the "runas_default" option was used. If a local user were authorized by the sudoers file to perform their sudo commands under the account specified with "runas_default", they would receive the root user"s supplementary groups instead of those of the intended target user, giving them unintended privileges. Users of sudo should upgrade to this updated package, which contains backported patches to correct these issues.