Package: sudo Version: 1.6.9p17-2 Severity: grave Tags: security Justification: user security hole
My understanding is that permission to sudoedit is granted by a line in the sudoer file like this: user1 ALL = sudoedit /etc/network/interfaces This works as expected (because the string sudoedit is a special case), eg us...@host1:~$ sudoedit /etc/network/interfaces However, it also appears to grant access to sudo any executable called 'sudoedit' (if the appropriate parameters are passed in). For example, a user executable in the home directory called sudoedit: #!/bin/sh whoami can be invoked (and reports 'root') using us...@host1:~$ sudo ./sudoedit /etc/network/interfaces I had expected (because sudoedit is a special case string) that it should not match anything apart from invoking /usr/bin/sudoedit. This problem was encountered with build 1.6.9p17 of sudo on a Debian Lenny system. The issue was pointed out by 'slouching' on linuxquestions.org. He also reported that this problem did not occur on an earlier version sudo-1.6.8p12-12.el5. -- System Information: Debian Release: 5.0.4 APT prefers stable APT policy: (990, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.30-bpo.1-686 (SMP w/1 CPU core) Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=ANSI_X3.4-1968) (ignored: LC_ALL set to C) Shell: /bin/sh linked to /bin/bash Versions of packages sudo depends on: ii libc6 2.7-18lenny2 GNU C Library: Shared libraries ii libpam-modules 1.0.1-5+lenny1 Pluggable Authentication Modules f ii libpam0g 1.0.1-5+lenny1 Pluggable Authentication Modules l sudo recommends no packages. sudo suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org