Summary: | <app-admin/sudo-1.8.5_p1 : Incorrect IP matching privilege escalation vulnerability (CVE-2012-2337) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Tim Sammut (RETIRED) <underling> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | critical | CC: | base-system |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.sudo.ws/sudo/alerts/netmask.html | ||
Whiteboard: | A1 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 416371 | ||
Bug Blocks: |
Description
Tim Sammut (RETIRED)
2012-05-16 16:10:44 UTC
Thanks for the heads-up via email, Diego. Hopefully I'm not misunderstanding your note by calling arches now. Arches, please test and mark stable: =app-admin/sudo-1.8.5 Target keywords : "alpha amd64 arm hppa ia64 m68k ppc ppc64 s390 sh sparc x86" Stable for HPPA. amd64: pass x86 stable Stable on alpha. amd64 ok amd64 stable ppc/ppc64 done CVE-2012-2337 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2337): sudo 1.6.x and 1.7.x before 1.7.9p1, and 1.8.x before 1.8.4p5, does not properly support configurations that use a netmask syntax, which allows local users to bypass intended command restrictions in opportunistic circumstances by executing a command on a host that has an IPv4 address. arm stable ia64/m68k/s390/sh/sparc stable Thanks, everyone. Filing a new GLSA request. This issue was resolved and addressed in GLSA 201207-01 at http://security.gentoo.org/glsa/glsa-201207-01.xml by GLSA coordinator Sean Amoss (ackle). |