sudo: Privilege escalation
Gentoo Linux Security Advisory
||GLSA 201401-23 / sudo
||January 21, 2014
||January 21, 2014: 1
All supported architectures
Multiple vulnerabilities have been found in sudo which could result
in privilege escalation.
sudo allows a system administrator to give users the ability to run
commands as other users. Access to commands may also be granted on a
range to hosts.
Multiple vulnerabilities have been found in sudo:
- sudo does not correctly validate the controlling terminal on a system
without /proc or when the tty_tickets option is enabled.
- sudo does not properly handle the clock when it is set to the epoch.
A local attacker with sudo privileges could connect to the stdin,
stdout, and stderr of the terminal of a user who has authenticated with
sudo, allowing the attacker to hijack the authorization of the other
user. Additionally, a local or physically proximate attacker could set
the system clock to the epoch, bypassing time restrictions on sudo
There is no known workaround at this time.
All sudo users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-admin/sudo-1.8.6_p7"