|
Message-ID: <4B83B356.6060701@redhat.com> Date: Tue, 23 Feb 2010 11:52:06 +0100 From: Jan Lieskovsky <jlieskov@...hat.com> To: oss-security <oss-security@...ts.openwall.com> CC: "Steven M. Christey" <coley@...us.mitre.org>, "Todd C. Miller" <Todd.Miller@...rtesan.com> Subject: CVE assignment notification -- CVE-2010-0426 -- sudo improper pseudocommands file path check Hi vendors, a privilege escalation flaw was found in the way sudo used to check file paths for pseudocommands. If local, unprivileged user was authorized by sudoers file to edit one or more files, it could lead to execution of arbitrary code, with the privileges of privileged system user (root). BTS records: [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=570737 [2] https://bugzilla.redhat.com/show_bug.cgi?id=567337 Patches from Todd C. Miller: [3] https://bugzilla.redhat.com/attachment.cgi?id=395605&action=diff (against sudo v1.7.x) [4] https://bugzilla.redhat.com/attachment.cgi?id=395606&action=diff (against sudo v1.6.x) which should overcome the deficiency. Credit: neonsignal CVE: CVE identifier of CVE-2010-0426 has been already assigned to this issue. Thanks && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.