RedHat: 'sudo' buffer overflow
Summary
Summary
The code splitting a log entry into smaller chunks contained anoverrunnable buffer. Carefully constructed long commands could lead toexecution of code as root. There is no known exploit at this time.
Solution
To update all RPMs for your particular architecture, run:
rpm -Fvh
where
Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed ( for more info):
29097 - buffer overflow in sudo
6. RPMs required:
Red Hat Powertools 6.2:
SRPMS:
alpha:
i386:
sparc:
7. Verification:
MD5 sum Package Name
cd41a1e0104241c156c4b8ca0740f349 6.2/SRPMS/sudo-1.6.3p6-0.6x.src.rpm
215abef794d0f730cc1ae2103afaf7eb 6.2/alpha/sudo-1.6.3p6-0.6x.alpha.rpm
137b9ce6cde57dd5e84be8b5c58f24dc 6.2/i386/sudo-1.6.3p6-0.6x.i386.rpm
bf527a7a807d0d9fa286fc3d42cefd26 6.2/sparc/sudo-1.6.3p6-0.6x.sparc.rpm
These packages are GPG signed by Red Hat, Inc. for security. Our key
is available at:
You can verify each package with the following command:
rpm --checksig
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg
References
Copyright(c) 2000, 2001 Red Hat, Inc. `
Package List
Topic
Topic
An overrunnable buffer exists in sudo versions prior to 1.6.3p6
Relevant Releases Architectures
Red Hat Powertools 6.2 - alpha, i386, sparc
Bugs Fixed