MGASA-2015-0079

Source
https://advisories.mageia.org/MGASA-2015-0079.html
Import Source
https://advisories.mageia.org/MGASA-2015-0079.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2015-0079
Related
Published
2015-02-19T14:43:07Z
Modified
2015-02-19T14:33:58Z
Summary
Updated sudo packages fix CVE-2014-9680
Details

Updated sudo packages fix security vulnerability:

Prior to sudo 1.8.12, the TZ environment variable was passed through unchecked. Most libc tzset() implementations support passing an absolute pathname in the time zone to point to an arbitrary, user-controlled file. This may be used to exploit bugs in the C library's TZ parser or open files the user would not otherwise have access to. Arbitrary file access via TZ could also be used in a denial of service attack by reading from a file or fifo that will block (CVE-2014-9680).

The sudo package has been updated to version 1.8.12, fixing this issue and several other bugs.

References
Credits

Affected packages

Mageia:4 / sudo

Package

Name
sudo
Purl
pkg:rpm/mageia/sudo?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.12-1.mga4

Ecosystem specific

{
    "section": "core"
}