Summary: A flaw in exists in sudo's -u option (aka sudoedit) in sudo version 1.6.8 that can give an attacker read permission to a file that would otherwise be unreadable. Sudo versions affected: 1.6.8 only Details: While sudoedit runs the actual editor as the invoking user, the temporary file is then re-opened with root privileges. An attacker can run sudoedit, remove the editor temporary file, make a link to an unreadable file with the same name as the old temporary file and quit the editor. The file being edited via sudoedit will now contain a copy of the previously unreadable file. Impact: Exploitation of the bug requires that the sudoers file be configured to allow the attacker to run sudoedit. If no users have been granted access to sudoedit there is no impact. Fix: The bug is fixed in sudo 1.6.8p1.
CC'ing aliz@gentoo.org. Unsure who the maintainer is on this one.
No maintining or using, but I've added 1.6.8_p1 (with KEYWORDS="-*") to the tree.
Thanks, aliz. Archs, please mark stable.
On re-reading, this doesn't affect the version of sudo in portage. Sorry about that, guys. I owe you all a beer.