Gentoo Logo

sudo: Privilege escalation


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 201003-01 / sudo
Release Date March 03, 2010
Latest Revision March 03, 2010: 01
Impact high
Exploitable local
Package Vulnerable versions Unaffected versions Architecture(s)
app-admin/sudo < 1.7.2_p4 >= 1.7.2_p4 All supported architectures

Related bugreports: #306865


Two vulnerabilities in sudo might allow local users to escalate privileges and execute arbitrary code with root privileges.

2.  Impact Information


sudo allows a system administrator to give users the ability to run commands as other users.


Multiple vulnerabilities have been discovered in sudo:

  • Glenn Waller and neonsignal reported that sudo does not properly handle access control of the "sudoedit" pseudo-command (CVE-2010-0426).
  • Harald Koenig reported that sudo does not properly set supplementary groups when using the "runas_default" option (CVE-2010-0427).


A local attacker with privileges to use "sudoedit" or the privilege to execute commands with the "runas_default" setting enabled could leverage these vulnerabilities to execute arbitrary code with elevated privileges.

3.  Resolution Information


CVE-2010-0426: Revoke all "sudoedit" privileges, or use the full path to sudoedit. CVE-2010-0427: Remove all occurrences of the "runas_default" setting.


All sudo users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-admin/sudo-1.7.2_p4"

4.  References


Page updated March 03, 2010

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.