Your message dated Wed, 6 Jul 2022 11:01:24 +0200
with message-id <YsVPZGmlzorKlt/[email protected]>
and subject line Re: Bug#428770: sudo ptrace vulnerability (BugTraq ID: 24287)
has caused the Debian Bug report #428770,
regarding sudo ptrace vulnerability (BugTraq ID: 24287)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
428770: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=428770
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: sudo
Version: 1.6.8p12-4
Severity: important
Tags: security

As described in http://www.securityfocus.com/bid/24287 sudo is vulnerable
to an exploit where the executed command can be altered/replaced using
ptrace(). (Permission in the /etc/sudoers file to run the altered command
is still needed, but this vulnerability IMO has high security impact still.)

Sorry if it's a duplicate and I missed the first report.

Best regards,

norbi


-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (700, 'stable'), (660, 'oldstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18
Locale: LANG=C, LC_CTYPE=hu_HU (charmap=ISO-8859-2)

Versions of packages sudo depends on:
ii  libc6                       2.3.6.ds1-13 GNU C Library: Shared libraries
ii  libpam-modules              0.79-4       Pluggable Authentication Modules f
ii  libpam0g                    0.79-4       Pluggable Authentication Modules l

sudo recommends no packages.

-- debconf-show failed


--- End Message ---
--- Begin Message ---
On Tue, Jul 05, 2022 at 03:54:40PM +0200, Marc Haber wrote:
> On Thu, Jun 14, 2007 at 02:18:25AM +0200, Norbert Buchmuller wrote:
> > As described in http://www.securityfocus.com/bid/24287 sudo is vulnerable
> > to an exploit where the executed command can be altered/replaced using
> > ptrace(). (Permission in the /etc/sudoers file to run the altered command
> > is still needed, but this vulnerability IMO has high security impact still.)
> 
> I have readched out to the security team if they're ok with this bug
> report being closed. If they don't reply, I plan to close this anyway by
> the end of 2022. Consider filing an upstream report and marking this bug
> a forwarded; this one is going to stay open then as long as upstream's
> report is open.

After talking to the security team, I am now closing this in Debian.
Feel free to re-open or file a new bug report once there is an upstream
bug open. I am also fine with this staying closed ;-)

Greetings
Marc

--- End Message ---

Reply via email to