Summary: | <app-admin/sudo-1.7.2_p7: Privilege escalation (CVE-2010-1646) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Diego Elio Pettenò (RETIRED) <flameeyes> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | critical | CC: | base-system |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | A1 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Diego Elio Pettenò (RETIRED)
2010-06-02 22:11:05 UTC
Arches, please test and mark stable: =app-admin/sudo-1.7.2_p7 Target keywords : "alpha amd64 arm hppa ia64 m68k ppc ppc64 s390 sh sparc x86" x86 stable Stable for HPPA. alpha/arm/ia64/m68k/s390/sh/sparc stable amd64 stable Marked ppc/ppc64 stable. GLSA request filed CVE-2010-1646 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1646): The secure path feature in env.c in sudo 1.3.1 through 1.6.9p22 and 1.7.0 through 1.7.2p6 does not properly handle an environment that contains multiple PATH variables, which might allow local users to gain privileges via a crafted value of the last PATH variable. GLSA 201009-03 |