Bug 20996 - sudo new security issue CVE-2017-1000367 and CVE-2017-1000368
Summary: sudo new security issue CVE-2017-1000367 and CVE-2017-1000368
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 5
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA5-64-OK advisory MGA5-32-OK
Keywords: validated_update
: 21002 (view as bug list)
Depends on:
Blocks:
 
Reported: 2017-05-31 03:41 CEST by David Walser
Modified: 2017-07-13 11:28 CEST (History)
4 users (show)

See Also:
Source RPM: sudo-1.8.18p1-1.mga5.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2017-05-31 03:41:42 CEST
Upstream has issued an advisory today (May 30):
http://openwall.com/lists/oss-security/2017/05/30/16
https://www.sudo.ws/stable.html#1.8.20p1
https://www.sudo.ws/alerts/linux_tty.html

Freeze push requested for Cauldron.
Comment 2 Marja Van Waes 2017-05-31 22:08:34 CEST
Assigning to all packagers collectively, since there is no registered maintainer for this package.

CC: (none) => marja11
Assignee: bugsquad => pkg-bugs

Comment 3 Rémi Verschelde 2017-06-01 09:24:43 CEST
*** Bug 21002 has been marked as a duplicate of this bug. ***

CC: (none) => zombie_ryushu

Comment 4 David Walser 2017-06-03 19:37:24 CEST
sudo 1.8.20p2 has been released, fixing a related issue:
https://www.sudo.ws/stable.html#1.8.20p2
http://openwall.com/lists/oss-security/2017/06/02/7

The second reference notes that this does actually fix a different security issue.  We may see a CVE for this soon.
Comment 5 David Walser 2017-06-07 03:47:54 CEST
CVE-2017-1000368 assigned for the issue fixed in 1.8.20p2:
http://openwall.com/lists/oss-security/2017/06/06/6

Summary: sudo new security issue CVE-2017-1000367 => sudo new security issue CVE-2017-1000367 and CVE-2017-1000368

Comment 6 David Walser 2017-06-08 11:26:26 CEST
(In reply to David Walser from comment #5)
> CVE-2017-1000368 assigned for the issue fixed in 1.8.20p2:
> http://openwall.com/lists/oss-security/2017/06/06/6

Fedora has issued an advisory for this today (June 8):
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/VJLV6RSLKYRCGP4NKXMY4RECDUABZI4X/
David Walser 2017-06-18 23:53:50 CEST

See Also: (none) => https://bugs.mageia.org/show_bug.cgi?id=21077

Comment 7 David Walser 2017-06-24 00:46:02 CEST
RedHat advisory for the second CVE from June 22:
https://rhn.redhat.com/errata/RHSA-2017-1574.html
Comment 8 David Walser 2017-07-09 00:56:01 CEST
Updated package uploaded for Mageia 5.

Advisory:
========================

Updated sudo packages fix security vulnerability:

A flaw was found in the way sudo parsed tty information from the process
status file in the proc filesystem. A local user with privileges to execute
commands via sudo could use this flaw to escalate their privileges to root.
(CVE-2017-1000367)

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000367
https://rhn.redhat.com/errata/RHSA-2017-1382.html
========================

Updated packages in core/updates_testing:
========================
sudo-1.8.20p2-1.mga5
sudo-devel-1.8.20p2-1.mga5

from sudo-1.8.20p2-1.mga5.src.rpm

Assignee: pkg-bugs => qa-bugs

Comment 9 Dave Hodgins 2017-07-13 05:31:26 CEST
No poc that I could find. Just testing that sudo is working properly. On m5 x86_64
I use it in a script that runs "sudo /usr/sbin/fetchnews -n".

On i586, added myself to the wheel group (logged out/in), modified /etc/sudoers
to allow members of the wheel group to run all commands with a passord ...
$ sudo /sbin/arping 192.168.10.11
For sudo, enter password for dave >
ARPING 192.168.10.11 from 192.168.10.117 enp0s3
Unicast reply from 192.168.10.11 [1C:AF:F7:D2:22:15]  0.860ms

Whiteboard: (none) => MGA5-64-OK advisory MGA5-32-OK
Keywords: (none) => validated_update
CC: (none) => davidwhodgins, sysadmin-bugs

Comment 10 Mageia Robot 2017-07-13 11:28:33 CEST
An update for this issue has been pushed to the Mageia Updates repository.

http://advisories.mageia.org/MGASA-2017-0207.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.