[Touch-packages] [Bug 1512781] Re: CVE-2015-5602 - Unauthorized Privilege Escalation

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: sudo (Ubuntu Precise) Status: Confirmed => Won't Fix -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to sudo in

[Touch-packages] [Bug 1512781] Re: CVE-2015-5602 - Unauthorized Privilege Escalation

2016-04-20 Thread Marc Deslauriers
Xenial now has 1.8.16, marking released. ** Changed in: sudo (Ubuntu Xenial) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to sudo in Ubuntu. https://bugs.launchpad.net/bugs/1512781

[Touch-packages] [Bug 1512781] Re: CVE-2015-5602 - Unauthorized Privilege Escalation

2016-01-19 Thread Bug Watch Updater
** Changed in: sudo (Debian) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to sudo in Ubuntu. https://bugs.launchpad.net/bugs/1512781 Title: CVE-2015-5602 - Unauthorized Privilege

[Touch-packages] [Bug 1512781] Re: CVE-2015-5602 - Unauthorized Privilege Escalation

2015-11-06 Thread Raphaƫl Hertzog
> The #else portion of the code may be fine, I haven't studied it extensively I doubt this, it relies on comparing inode numbers and devices numbers returned by lstat() and fstat(). lstat() just like O_FOLLOW only considers the final component of the path. If it's a symlink, it returns data about

[Touch-packages] [Bug 1512781] Re: CVE-2015-5602 - Unauthorized Privilege Escalation

2015-11-05 Thread Laurent Bigonville
** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-5602 -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to sudo in Ubuntu. https://bugs.launchpad.net/bugs/1512781 Title: CVE-2015-5602 - Unauthorized

[Touch-packages] [Bug 1512781] Re: CVE-2015-5602 - Unauthorized Privilege Escalation

2015-11-05 Thread Marc Deslauriers
** Bug watch added: bugzilla.sudo.ws/ #707 http://bugzilla.sudo.ws/show_bug.cgi?id=707 ** Also affects: sudo via http://bugzilla.sudo.ws/show_bug.cgi?id=707 Importance: Unknown Status: Unknown -- You received this bug notification because you are a member of Ubuntu Touch seeded

[Touch-packages] [Bug 1512781] Re: CVE-2015-5602 - Unauthorized Privilege Escalation

2015-11-05 Thread Bug Watch Updater
** Changed in: sudo (Debian) Status: Unknown => Confirmed -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to sudo in Ubuntu. https://bugs.launchpad.net/bugs/1512781 Title: CVE-2015-5602 - Unauthorized Privilege

[Touch-packages] [Bug 1512781] Re: CVE-2015-5602 - Unauthorized Privilege Escalation

2015-11-05 Thread Laurent Bigonville
** Bug watch added: Debian Bug tracker #804149 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=804149 ** Also affects: sudo (Debian) via http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=804149 Importance: Unknown Status: Unknown -- You received this bug notification because you

[Touch-packages] [Bug 1512781] Re: CVE-2015-5602 - Unauthorized Privilege Escalation

2015-11-03 Thread Seth Arnold
I'm a little surprised this got a CVE number to be honest; allowing users to edit files via some privileged mechanism when they may control some portion of the filesystem under consideration is always going to be dangerous. sudo cannot actually prevent this -- for example, the patch for this

[Touch-packages] [Bug 1512781] Re: CVE-2015-5602 - Unauthorized Privilege Escalation

2015-11-03 Thread Seth Arnold
Ah, the demo program is still illegible only now with pipes. Sigh. I've attached the program here. ** Attachment added: "o_nofollow.c" https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/1512781/+attachment/4512250/+files/o_nofollow.c -- You received this bug notification because you are a

[Touch-packages] [Bug 1512781] Re: CVE-2015-5602 - Unauthorized Privilege Escalation

2015-11-03 Thread Marc Deslauriers
** Information type changed from Private Security to Public Security ** Also affects: sudo (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: sudo (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: sudo (Ubuntu Trusty) Importance: Undecided