Package: sudo
Version: 1.6.9p17-2
Severity: grave
Tags: security, patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for sudo.

CVE-2010-1163[0]:
| The command matching functionality in sudo 1.6.9p22 through 1.7.2p5 does not 
| properly handle when a file in the current working directory has the same 
name 
| as a pseudo-command in the sudoers file and the PATH contains an entry 
| for ".", which allows local users to execute arbitrary commands via a Trojan 
| horse executable, as demonstrated using sudoedit, a different vulnerability 
| than CVE-2010-0426.     

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1163
    http://security-tracker.debian.org/tracker/CVE-2010-1163

The vulnerability only affects when ignore_dot value is on. Lenny is not 
affected since the default value is off and can be changed.

The patch: https://bugzilla.redhat.com/attachment.cgi?id=405247&action=diff

thanks, luciano

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to