Security bugfix for package sudo
Knowledgebase
(Last modified: 08JAN2002)
solutions Security bugfix for package sudo SuSE Linux Maintenance Web (072f3a97d6c71db4fe2018315f9e42e0)
SuSE Linux Enterprise Server for S/390
Package: ap1/sudo
Architecture: S/390
Release: 20020108
Obsoletes: none
sudo
sends an email to the sysadmin about an unsuccessful effort to gain elevated privileges, users were able to pass environment variables along with the execve()
system call when sendmail
is called. The call for sendmail
happens as root
, which allows a local attacker to gain root
privileges if sudo
is installed with setuid-root
permissions. The update package corrects this error by running sendmail
not as root
any more.
rpm -Uvh sudo.rpm
Download Source Packages
Download the source code of the patches for maintained products.
Disclaimer
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.