Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=efcdb5eaf09ed3e6db7f8c90b18eaa1ea067dff1

commit efcdb5eaf09ed3e6db7f8c90b18eaa1ea067dff1
Author: Miklos Vajna <vmik...@frugalware.org>
Date:   Fri Apr 16 02:04:48 2010 +0200

FSA660-sudo

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index e89d545..05f1b4d 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -26,6 +26,19 @@

<fsas>
<fsa>
+               <id>660</id>
+               <date>2010-04-16</date>
+               <author>Miklos Vajna</author>
+               <package>sudo</package>
+               <vulnerable>1.7.2-3</vulnerable>
+               <unaffected>1.7.2-4locris1</unaffected>
+               <bts>http://bugs.frugalware.org/task/4188</bts>
+               <cve>No CVE, see 
http://sudo.ws/sudo/alerts/sudoedit_escalate2.html.</cve>
+               <desc>A security issue has been reported in sudo, which can be 
exploited by malicious, local users to gain escalated privileges.
+                       The security issue is caused due to an error within the 
command matching functionality, which can be exploited to run a "sudoedit" 
executable within the current working directory.
+                       Successful exploitation may allow the execution of 
arbitrary code with escalated privileges, but requires that the attacker is 
allowed to use sudo's "sudoedit" pseudo-command, that the PATH environment 
variable contains "." while the directories do not contain any other "sudoedit" 
executable, and that the "ignore_dot" or "secure_path" options are 
disabled.</desc>
+       </fsa>
+       <fsa>
<id>659</id>
<date>2010-04-14</date>
<author>Miklos Vajna</author>
_______________________________________________
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to