Yellow Dog Linux Security Announcement -------------------------------------- Package: sudo Issue Date: May 02, 2002 Priority: high Advisory ID: YDU-20020502-4 1. Topic: Updated sudo packages are available. 2. Problem: "The sudo (superuser do) utility allows system administratorsi to give certain users the ability to run commands as root with logging. Global InterSec LLC found an issue with Sudo 1.6.5p2 and earlier which can be exploited to allow a local attacker to gain root privileges. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2002-0184 to this issue. Users of Sudo are advised to upgrade to these errata packages which are not vulnerable to this issue." (from Red Hat Advisory) 3. Solution: a) Updating via yup... We suggest that you use the Yellow Dog Update Program (yup) to keep your system up-to-date. The following command(s) will automatically retrieve and install the fixed version of this update onto your system: yup update sudo b) Updating manually... The update can also be retrieved manually from our ftp site below along with the rpm command that should be used to install the update. (Please use a mirror site) ftp://ftp.yellowdoglinux.com/pub/yellowdog/updates/yellowdog-2.2/ppc/ rpm -Fvh sudo-1.6.5p2-1.7x.1.ppc.rpm 4. Verification MD5 checksum Package -------------------------------- ---------------------------- e4f757b23af97494dbfb48cfa3bf5056 ppc/sudo-1.6.5p2-1.7x.1.ppc.rpm 13811973079f3dcf5e2994e486e38a9f SRPMS/sudo-1.6.5p2-1.7x.1.src.rpm If you wish to verify that each package has not been corrupted or tampered with, examine the md5sum with the following command: rpm --checksig --nogpg filename 5. Misc. Terra Soft has setup a moderated mailing list where these security, bugfix, and package enhancement announcements will be posted. See http://lists.yellowdoglinux.com/ for more information. For information regarding the usage of yup, the Yellow Dog Update Program, see http://http://www.yellowdoglinux.com/support/solutions/ydl_general/yup.shtml