Upstream information

CVE-2011-0010 at MITRE

Description

check.c in sudo 1.7.x before 1.7.4p5, when a Runas group is configured, does not require a password for command execution that involves a gid change but no uid change, which allows local users to bypass an intended authentication requirement via the -g option to a sudo command.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.4
Vector AV:L/AC:M/Au:N/C:P/I:P/A:P
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Note from the SUSE Security Team

This problem does not affect sudo versions before 1.7, so no SUSE Linux Enterprise product is affected.

SUSE Bugzilla entry: 663881 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Desktop 12
  • sudo >= 1.8.10p3-1.62
Patchnames:
SUSE Linux Enterprise Desktop 12 GA sudo
SUSE Linux Enterprise Desktop 12 SP1
  • sudo >= 1.8.10p3-1.62
Patchnames:
SUSE Linux Enterprise Desktop 12 SP1 GA sudo
SUSE Linux Enterprise Desktop 12 SP2
  • sudo >= 1.8.10p3-6.16
Patchnames:
SUSE Linux Enterprise Desktop 12 SP2 GA sudo
SUSE Linux Enterprise Desktop 12 SP3
  • sudo >= 1.8.20p2-1.3
Patchnames:
SUSE Linux Enterprise Desktop 12 SP3 GA sudo
SUSE Linux Enterprise Module for Basesystem 15
  • sudo >= 1.8.22-2.11
  • sudo-devel >= 1.8.22-2.11
Patchnames:
SUSE Linux Enterprise Module for Basesystem 15 GA sudo
SUSE Linux Enterprise Server 12
  • sudo >= 1.8.10p3-1.62
Patchnames:
SUSE Linux Enterprise Server 12 GA sudo
SUSE Linux Enterprise Server 12 SP1
  • sudo >= 1.8.10p3-1.62
Patchnames:
SUSE Linux Enterprise Server 12 SP1 GA sudo
SUSE Linux Enterprise Server 12 SP2
  • sudo >= 1.8.10p3-6.16
Patchnames:
SUSE Linux Enterprise Server 12 SP2 GA sudo
SUSE Linux Enterprise Server 12 SP3
  • sudo >= 1.8.20p2-1.3
Patchnames:
SUSE Linux Enterprise Server 12 SP3 GA sudo
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
  • sudo >= 1.8.10p3-6.16
Patchnames:
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 GA sudo
SUSE Linux Enterprise Software Development Kit 12
  • sudo-devel >= 1.8.10p3-1.62
Patchnames:
SUSE Linux Enterprise Software Development Kit 12 GA sudo-devel
SUSE Linux Enterprise Software Development Kit 12 SP1
  • sudo-devel >= 1.8.10p3-1.62
Patchnames:
SUSE Linux Enterprise Software Development Kit 12 SP1 GA sudo-devel
SUSE Linux Enterprise Software Development Kit 12 SP2
  • sudo-devel >= 1.8.10p3-6.16
Patchnames:
SUSE Linux Enterprise Software Development Kit 12 SP2 GA sudo-devel
SUSE Linux Enterprise Software Development Kit 12 SP3
  • sudo-devel >= 1.8.20p2-1.3
Patchnames:
SUSE Linux Enterprise Software Development Kit 12 SP3 GA sudo-devel
openSUSE 11.2
  • sudo-debuginfo >= 1.7.2-2.5.1
  • sudo-debugsource >= 1.7.2-2.5.1
openSUSE 11.2
  • sudo >= 1.7.2-2.5.1
openSUSE 11.3
  • sudo-debuginfo >= 1.7.2p7-2.3.1
  • sudo-debugsource >= 1.7.2p7-2.3.1
openSUSE 11.3
  • sudo >= 1.7.2p7-2.3.1
openSUSE Leap 15.0
  • sudo >= 1.8.22-lp150.2.6
Patchnames:
openSUSE Leap 15.0 GA sudo
openSUSE Leap 42.1
  • sudo >= 1.8.10p3-3.8
Patchnames:
openSUSE Leap 42.1 GA sudo
openSUSE Leap 42.2
  • sudo >= 1.8.10p3-5.22
Patchnames:
openSUSE Leap 42.2 GA sudo
openSUSE Leap 42.3
  • sudo >= 1.8.20p2-1.3
Patchnames:
openSUSE Leap 42.3 GA sudo
openSUSE Tumbleweed
  • sudo >= 1.8.18p1-1.1
  • sudo-devel >= 1.8.18p1-1.1
  • sudo-test >= 1.8.18p1-1.1
Patchnames:
openSUSE Tumbleweed GA sudo