Summary: | <app-admin/sudo-1.8.15-r1: Unauthorized privilege escalation in sudoedit (CVE-2015-5602) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | base-system |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1277426 | ||
Whiteboard: | B1 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2015-11-03 10:20:07 UTC
Arches please test and mark stable =app-admin/sudo-1.8.15 with target KEYWORDS: alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~sparc-solaris amd64 stable x86 stable ppc stable sparc stable Stable for HPPA PPC64. ia64 stable arm stable alpha stable. (last arch) Arches, Thank you for your work. New GLSA Request filed. Maintainer(s), please drop the vulnerable version(s). CVE released. @maintainers, please clean up the vulnerable versions Thanks for the report. re: http://gitweb.gentoo.org/repo/gentoo.git/commit/?id=21f8d167c044a4a6846b97ce78c7e52ce7497936 This issue was resolved and addressed in GLSA 201606-13 at https://security.gentoo.org/glsa/201606-13 by GLSA coordinator Aaron Bauman (b-man). |