| Summary: | sudo new security issue CVE-2023-22809 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | critical | ||
| Priority: | Normal | CC: | davidwhodgins, fri, nicolas.salguero, sysadmin-bugs |
| Version: | 8 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA8-64-OK | ||
| Source RPM: | sudo-1.9.5p2-2.1.mga8.src.rpm | CVE: | CVE-2023-22809 |
| Status comment: | |||
|
Description
David Walser
2023-01-20 17:14:51 CET
David Walser
2023-01-20 17:15:02 CET
Status comment:
(none) =>
Fixed upstream in 1.9.12p2 Debian and Ubuntu have issued advisories for this on January 18: https://www.debian.org/security/2023/dsa-5321 https://ubuntu.com/security/notices/USN-5811-1 For the M8 bit, assigning this globally as 'sudo' has no obvious maintainer. Assignee:
bugsquad =>
pkg-bugs Suggested advisory: ======================== The updated packages fix a security vulnerability: In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value. (CVE-2023-22809) References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22809 https://www.sudo.ws/security/advisories/sudoedit_any/ https://www.debian.org/security/2023/dsa-5321 https://ubuntu.com/security/notices/USN-5811-1 ======================== Updated packages in core/updates_testing: ======================== sudo-1.9.5p2-2.2.mga8 sudo-devel-1.9.5p2-2.2.mga8 from SRPM: sudo-1.9.5p2-2.2.mga8.src.rpm Status comment:
Fixed upstream in 1.9.12p2 =>
(none) mga8-64 OK simple test. Just to execute some commands as root using my user crentials CC:
(none) =>
fri Fedora has issued an advisory for this on January 22: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/2QDGFCGAV5QRJCE6IXRXIS4XJHS57DDH/ Severity:
normal =>
critical No regressions noticed in my testing. Advisory committed to svn. Validating. Keywords:
(none) =>
advisory, validated_update An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2023-0025.html Resolution:
(none) =>
FIXED |