Ubuntu Security Notice 928-1 – Valerio Costamagna discovered that sudo did not properly validate the path for the ‘sudoedit’ pseudo-command when the PATH contained only a dot (‘.’). If secure_path and ignore_dot were disabled, a local attacker could exploit this to execute arbitrary code as root if sudo was configured to allow the attacker to use sudoedit. By default, secure_path is used and the sudoedit pseudo-command is not used in Ubuntu. This is a different but related issue to CVE-2010-0426.
You can download this advisory from the following link: https://packetstormsecurity.com/files/download/88482/USN-928-1.txt
Source: https://packetstormsecurity.com/files/88482/Ubuntu-Security-Notice-928-1.html

