sudo is vulnerable to arbitrary code execution. The vulnerability exists as a flaw was found in the way sudo handled the presence of duplicated environment variables. A local user authorized to run commands using sudo could use this flaw to set additional values for the environment variables set by sudo, which could result in those values being used by the executed command instead of the values set by sudo. This could possibly lead to certain intended restrictions being bypassed, such as the secure_path setting.
lists.fedoraproject.org/pipermail/package-announce/2010-June/042838.html
lists.fedoraproject.org/pipermail/package-announce/2010-June/043012.html
lists.fedoraproject.org/pipermail/package-announce/2010-June/043026.html
lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
secunia.com/advisories/40002
secunia.com/advisories/40188
secunia.com/advisories/40215
secunia.com/advisories/40508
secunia.com/advisories/43068
security.gentoo.org/glsa/glsa-201009-03.xml
wiki.rpath.com/Advisories:rPSA-2010-0075
www.debian.org/security/2010/dsa-2062
www.mandriva.com/security/advisories?name=MDVSA-2010:118
www.osvdb.org/65083
www.redhat.com/security/updates/classification/#moderate
www.redhat.com/support/errata/RHSA-2010-0475.html
www.securityfocus.com/archive/1/514489/100/0/threaded
www.securityfocus.com/bid/40538
www.securitytracker.com/id?1024101
www.sudo.ws/repos/sudo/rev/3057fde43cf0
www.sudo.ws/repos/sudo/rev/a09c6812eaec
www.sudo.ws/sudo/alerts/secure_path.html
www.vupen.com/english/advisories/2010/1452
www.vupen.com/english/advisories/2010/1478
www.vupen.com/english/advisories/2010/1518
www.vupen.com/english/advisories/2010/1519
www.vupen.com/english/advisories/2011/0212
access.redhat.com/errata/RHSA-2010:0475
bugzilla.redhat.com/show_bug.cgi?id=598154
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10580
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7338