OpenPKG CVS Repository http://cvs.openpkg.org/ ____________________________________________________________________________
Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web Date: 18-Feb-2006 10:35:52 Branch: HEAD Handle: 2006021809355200 Added files: openpkg-web/security OpenPKG-SA-2006.002-sudo.txt Log: release OpenPKG Security Advisory 2006.002 (sudo) Summary: Revision Changes Path 1.1 +51 -0 openpkg-web/security/OpenPKG-SA-2006.002-sudo.txt ____________________________________________________________________________ patch -p0 <<'@@ .' Index: openpkg-web/security/OpenPKG-SA-2006.002-sudo.txt ============================================================================ $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2006.002-sudo.txt --- /dev/null 2006-02-18 10:35:33 +0100 +++ OpenPKG-SA-2006.002-sudo.txt 2006-02-18 10:35:52 +0100 @@ -0,0 +1,51 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA1 + +________________________________________________________________________ + +OpenPKG Security Advisory The OpenPKG Project +http://www.openpkg.org/security.html http://www.openpkg.org [EMAIL PROTECTED] [EMAIL PROTECTED] +OpenPKG-SA-2006.002 18-Feb-2006 +________________________________________________________________________ + +Package: sudo +Vulnerability: privilege escalation +OpenPKG Specific: no + +Affected Releases: Affected Packages: Corrected Packages: +OpenPKG CURRENT <= sudo-1.6.8p11-20051107 >= sudo-1.6.8p12-20051109 +OpenPKG 2.5 <= sudo-1.6.8p9-2.5.1 >= sudo-1.6.8p9-2.5.2 +OpenPKG 2.4 <= sudo-1.6.8p8-2.4.1 >= sudo-1.6.8p8-2.4.2 +OpenPKG 2.3 <= sudo-1.6.8p7-2.3.1 >= sudo-1.6.8p7-2.3.2 + +Description: + According to a vendor bug report [0], an incomplete blacklist + vulnerability exists in the Sudo [1] utility which can lead to a + privilege escalation. The vulnerability exists in Sudo 1.6.8 and + earlier and allows local users to gain privileges via the "SHELLOPTS" + and "PS4" environment variables before executing a shell script on + behalf of another user. The Common Vulnerabilities and Exposures (CVE) + project assigned the id CAN-2005-2959 [2] to the problem. +________________________________________________________________________ + +References: + [0] http://www.sudo.ws/bugs/show_bug.cgi?id=182 + [1] http://www.sudo.ws/ + [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2959 +________________________________________________________________________ + +For security reasons, this advisory was digitally signed with the +OpenPGP public key "OpenPKG <[EMAIL PROTECTED]>" (ID 63C4CB9F) of the +OpenPKG project which you can retrieve from http://pgp.openpkg.org and +hkp://pgp.openpkg.org. Follow the instructions on http://pgp.openpkg.org/ +for details on how to verify the integrity of this advisory. +________________________________________________________________________ + +-----BEGIN PGP SIGNATURE----- +Comment: OpenPKG <[EMAIL PROTECTED]> + +iD8DBQFD9upOgHWT4GPEy58RAnVqAJ9sSSX3S2IXSkg7iuUQAh2YfJaeKQCeMR2a +Rvnep+GB3uU/2g+7Sx8/gAg= +=+cvo +-----END PGP SIGNATURE----- @@ . ______________________________________________________________________ The OpenPKG Project www.openpkg.org CVS Repository Commit List openpkg-cvs@openpkg.org