OpenPKG CVS Repository
http://cvs.openpkg.org/
____________________________________________________________________________
Server: cvs.openpkg.org Name: Ralf S. Engelschall
Root: /v/openpkg/cvs Email: [EMAIL PROTECTED]
Module: openpkg-web Date: 18-Feb-2006 10:35:52
Branch: HEAD Handle: 2006021809355200
Added files:
openpkg-web/security OpenPKG-SA-2006.002-sudo.txt
Log:
release OpenPKG Security Advisory 2006.002 (sudo)
Summary:
Revision Changes Path
1.1 +51 -0 openpkg-web/security/OpenPKG-SA-2006.002-sudo.txt
____________________________________________________________________________
patch -p0 <<'@@ .'
Index: openpkg-web/security/OpenPKG-SA-2006.002-sudo.txt
============================================================================
$ cvs diff -u -r0 -r1.1 OpenPKG-SA-2006.002-sudo.txt
--- /dev/null 2006-02-18 10:35:33 +0100
+++ OpenPKG-SA-2006.002-sudo.txt 2006-02-18 10:35:52 +0100
@@ -0,0 +1,51 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA1
+
+________________________________________________________________________
+
+OpenPKG Security Advisory The OpenPKG Project
+http://www.openpkg.org/security.html http://www.openpkg.org
[EMAIL PROTECTED] [EMAIL PROTECTED]
+OpenPKG-SA-2006.002 18-Feb-2006
+________________________________________________________________________
+
+Package: sudo
+Vulnerability: privilege escalation
+OpenPKG Specific: no
+
+Affected Releases: Affected Packages: Corrected Packages:
+OpenPKG CURRENT <= sudo-1.6.8p11-20051107 >= sudo-1.6.8p12-20051109
+OpenPKG 2.5 <= sudo-1.6.8p9-2.5.1 >= sudo-1.6.8p9-2.5.2
+OpenPKG 2.4 <= sudo-1.6.8p8-2.4.1 >= sudo-1.6.8p8-2.4.2
+OpenPKG 2.3 <= sudo-1.6.8p7-2.3.1 >= sudo-1.6.8p7-2.3.2
+
+Description:
+ According to a vendor bug report [0], an incomplete blacklist
+ vulnerability exists in the Sudo [1] utility which can lead to a
+ privilege escalation. The vulnerability exists in Sudo 1.6.8 and
+ earlier and allows local users to gain privileges via the "SHELLOPTS"
+ and "PS4" environment variables before executing a shell script on
+ behalf of another user. The Common Vulnerabilities and Exposures (CVE)
+ project assigned the id CAN-2005-2959 [2] to the problem.
+________________________________________________________________________
+
+References:
+ [0] http://www.sudo.ws/bugs/show_bug.cgi?id=182
+ [1] http://www.sudo.ws/
+ [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2959
+________________________________________________________________________
+
+For security reasons, this advisory was digitally signed with the
+OpenPGP public key "OpenPKG <[EMAIL PROTECTED]>" (ID 63C4CB9F) of the
+OpenPKG project which you can retrieve from http://pgp.openpkg.org and
+hkp://pgp.openpkg.org. Follow the instructions on http://pgp.openpkg.org/
+for details on how to verify the integrity of this advisory.
+________________________________________________________________________
+
+-----BEGIN PGP SIGNATURE-----
+Comment: OpenPKG <[EMAIL PROTECTED]>
+
+iD8DBQFD9upOgHWT4GPEy58RAnVqAJ9sSSX3S2IXSkg7iuUQAh2YfJaeKQCeMR2a
+Rvnep+GB3uU/2g+7Sx8/gAg=
+=+cvo
+-----END PGP SIGNATURE-----
@@ .
______________________________________________________________________
The OpenPKG Project www.openpkg.org
CVS Repository Commit List [email protected]