Univention Bugzilla – Full Text Bug Listing |
Summary: | sudo: Insufficient environment sanitising (ES 3.1) | ||
---|---|---|---|
Product: | UCS | Reporter: | Moritz Muehlenhoff <jmm> |
Component: | Security updates | Assignee: | Arvid Requate <requate> |
Status: | CLOSED FIXED | QA Contact: | Janek Walkenhorst <walkenhorst> |
Severity: | normal | ||
Priority: | P4 | CC: | requate |
Version: | UCS 3.1 | ||
Target Milestone: | UCS 3.1-ES | ||
Hardware: | Other | ||
OS: | Linux | ||
What kind of report is it?: | --- | What type of bug is this?: | --- |
Who will be affected by this bug?: | --- | How will those affected feel about the bug?: | --- |
User Pain: | Enterprise Customer affected?: | ||
School Customer affected?: | ISV affected?: | ||
Waiting Support: | Flags outvoted (downgraded) after PO Review: | ||
Ticket number: | Bug group (optional): | ||
Max CVSS v3 score: | |||
Attachments: | Advisory |
Description
Moritz Muehlenhoff
2014-03-06 10:21:40 CET
The maintenance with bug and security fixes for UCS 3.1-x has ended on 31st of May 2014. The maintenance of the UCS 3.x major series is continued by UCS 3.2-x that is supplied with bug and security fixes. Customers still on UCS 3.1-x are encouraged to update to UCS 3.2. Please contact your partner or Univention for any questions. There is a similar issue which is exploitable by local users only: CVE-2014-9680: Arbitrary file access via user defined TZ environment variable According to the policy for 3.1 Extended Security a fix is not mandatory. Created attachment 6811 [details]
Advisory
Upstream package version 1.7.4p4-2.squeeze.5 imported and built in extsec3.1.
Tests (amd64): OK Advisory: OK Changelog: OK Released |