Red Hat Security Advisory 2015-1409-01 - The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. It was discovered that sudo did not perform any checks of the TZ environment variable value. If sudo was configured to preserve the TZ environment variable, a local user with privileges to execute commands via sudo could possibly use this flaw to achieve system state changes not permitted by the configured commands.
c30604c080db80cb7c35b8a71f3c6f827f7483f2b5145f5539ec5ddb7ccad75a
Gentoo Linux Security Advisory 201504-2 - A vulnerability in sudo could allow a local attacker to read arbitrary files or bypass security restrictions. Versions less than 1.8.12 are affected.
3c953c3c2c696c6d8d88e9c6b1ce9d63a9520cc894b31f48e30a40317abf5a6c
Mandriva Linux Security Advisory 2015-126 - Prior to sudo 1.8.12, the TZ environment variable was passed through unchecked. Most libc tzset() implementations support passing an absolute pathname in the time zone to point to an arbitrary, user-controlled file. This may be used to exploit bugs in the C library's TZ parser or open files the user would not otherwise have access to. Arbitrary file access via TZ could also be used in a denial of service attack by reading from a file or fifo that will block. The sudo package has been updated to version 1.8.12, fixing this issue and several other bugs.
8a0130eeeff7921e595c61a9a46685d549a4e0891e7f1dcf5025327e5898c01b
Ubuntu Security Notice 2533-1 - Jakub Wilk and Stephane Chazelas discovered that Sudo incorrectly handled the TZ environment variable. An attacker with Sudo access could possibly use this issue to open arbitrary files, bypassing intended permissions.
573e2aa3b05b68bd981113b01018240eb543aee0746c894f53e648ca346e152e
Debian Linux Security Advisory 3167-1 - Jakub Wilk reported that sudo, a program designed to provide limited super user privileges to specific users, preserves the TZ variable from a user's environment without any sanitization. A user with sudo access may take advantage of this to exploit bugs in the C library functions which parse the TZ environment variable or to open files that the user would not otherwise be able to open. The later could potentially cause changes in system behavior when reading certain device special files or cause the program run via sudo to block.
c8ab68f024d041a656114d083d7d34267de02fc254ac8f6877df2a8e726b7843
Slackware Security Advisory - New sudo packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix a security issue.
ae47a52f4d6f4b4c43f0e8521a7bc0b89d6ca1a05fdf1ba703c22ad362feb502