Severity
4.4MEDIUMNVD
EPSS
0.1%
top 70.32%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 18
Latest updateFeb 26

Description

check.c in sudo 1.7.x before 1.7.4p5, when a Runas group is configured, does not require a password for command execution that involves a gid change but no uid change, which allows local users to bypass an intended authentication requirement via the -g option to a sudo command.

CVSS vector

AV:L/AC:M/C:P/I:P/A:PExploitability: 3.4 | Impact: 6.4

Affected Packages2 packages

Debiansudo_project/sudo< 1.7.4p4-6+3
NVDtodd_miller/sudo16 versions+15

Patches

🔴Vulnerability Details

3
GHSA
GHSA-mxvj-5g45-2vv5: check2022-05-03
CVEList
CVE-2011-0010: check2011-01-18
OSV
CVE-2011-0010: check2011-01-18

📋Vendor Advisories

13
Red Hat
kernel: bpf: Fix a btf decl_tag bug when tagging a function2025-02-26
Red Hat
kernel: ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path2024-07-16
Red Hat
kernel: fs/proc: task_mmu.c: don&#39;t read mapcount for migration entry2024-07-16
Red Hat
kernel: sch_cake: do not call cake_destroy() from cake_init()2024-06-19
Red Hat
kernel: bpf: Add oversize check before call kvcalloc()2024-05-21

💬Community

3
Bugzilla
CVE-2021-46915 kernel: netfilter: divide error in nft_limit_init2024-02-27
Bugzilla
CVE-2011-0010 sudo: does not ask for password on GID changes [fedora-all]2011-01-13
Bugzilla
CVE-2011-0010 sudo: does not ask for password on GID changes2011-01-11
CVE-2011-0010 — Improper Update of Reference Count | cvebase