Summary: | <app-admin/sudo-1.7.2p6: Additional privilege escalation bug with sudoedit (CVE-2010-1163) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Tobias Heinlein (RETIRED) <keytoaster> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | base-system |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://sudo.ws/sudo/alerts/sudoedit_escalate2.html | ||
Whiteboard: | B1 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Tobias Heinlein (RETIRED)
![]() Arches, please test and mark stable ASAP: =app-admin/sudo-1.7.2_p6 Target keywords : "alpha amd64 arm hppa ia64 m68k ppc ppc64 s390 sh sparc x86" amd64 stable. Marked ppc/ppc64 stable. alpha/arm/ia64/m68k/s390/sh/sparc/x86 stable Stable for HPPA. GLSA request filed. CVE-2010-1163 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1163): The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426. GLSA 201006-09 |