USN-28-1: sudo vulnerability
Posted on: 11/17/2004 03:05 PM

A sudo security update is available for Ubuntu Linux 4.10

Ubuntu Security Notice USN-28-1 November 17, 2004
sudo vulnerability

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)

The following packages are affected:


The problem can be corrected by upgrading the affected package to version 1.6.7p5-1ubuntu4.1. In general, a standard system upgrade is sufficient to effect the necessary changes.

Details follow:

Liam Helmer discovered an input validation flaw in sudo. When the standard shell "bash" starts up, it searches the environment for variables with a value beginning with " ;()". For each of these variables a function with the same name is created, with the function body filled in from the environment variable's value.

A malicious user with sudo access to a shell script that uses bash can use this feature to substitute arbitrary commands for any non-fully-qualified programs called from the script. Therefore this flaw can lead to privilege escalation.

Source archives:
Size/MD5: 19512 8732535adda58d8421cc40dfa0d4d277
Size/MD5: 585 cad376439bd2828752b2ea6aca5ae8ca
Size/MD5: 349785 55d503e5c35bf1ea83d38244e0242aaf

amd64 architecture (Athlon64, Opteron, EM64T Xeon)
Size/MD5: 155924 22253ea7307fdbab6c01e357a4dba9af

i386 architecture (x86 compatible Intel/AMD)
Size/MD5: 145358 4492baa2b88e8707efac77943058cc07

powerpc architecture (Apple Macintosh G3/G4/G5)
Size/MD5: 152864 18fa79642ba2ad55923a0a5f8cb771ba

Printed from Linux Compatible (