|
|
Message-ID: <4B83B356.6060701@redhat.com>
Date: Tue, 23 Feb 2010 11:52:06 +0100
From: Jan Lieskovsky <jlieskov@...hat.com>
To: oss-security <oss-security@...ts.openwall.com>
CC: "Steven M. Christey" <coley@...us.mitre.org>,
"Todd C. Miller" <Todd.Miller@...rtesan.com>
Subject: CVE assignment notification -- CVE-2010-0426 -- sudo improper pseudocommands
file path check
Hi vendors,
a privilege escalation flaw was found in the way
sudo used to check file paths for pseudocommands.
If local, unprivileged user was authorized by sudoers
file to edit one or more files, it could lead to
execution of arbitrary code, with the privileges
of privileged system user (root).
BTS records:
[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=570737
[2] https://bugzilla.redhat.com/show_bug.cgi?id=567337
Patches from Todd C. Miller:
[3] https://bugzilla.redhat.com/attachment.cgi?id=395605&action=diff
(against sudo v1.7.x)
[4] https://bugzilla.redhat.com/attachment.cgi?id=395606&action=diff
(against sudo v1.6.x)
which should overcome the deficiency.
Credit: neonsignal
CVE: CVE identifier of CVE-2010-0426 has been already assigned to this issue.
Thanks && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.