CVE-2010-1646

Source
https://nvd.nist.gov/vuln/detail/CVE-2010-1646
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2010-1646.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2010-1646
Related
Published
2010-06-07T17:12:48Z
Modified
2024-11-21T01:14:52Z
Downstream
Summary
[none]
Details

The secure path feature in env.c in sudo 1.3.1 through 1.6.9p22 and 1.7.0 through 1.7.2p6 does not properly handle an environment that contains multiple PATH variables, which might allow local users to gain privileges via a crafted value of the last PATH variable.

References

Affected packages

Debian:11 / sudo

Package

Name
sudo
Purl
pkg:deb/debian/sudo?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.2p7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / sudo

Package

Name
sudo
Purl
pkg:deb/debian/sudo?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.2p7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / sudo

Package

Name
sudo
Purl
pkg:deb/debian/sudo?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.2p7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}