Mageia 2023-0025: sudo security update | LinuxSecurity.com
MGASA-2023-0025 - Updated sudo packages fix security vulnerability

Publication date: 24 Jan 2023
URL: https://advisories.mageia.org/MGASA-2023-0025.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2023-22809

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra
arguments passed in the user-provided environment variables (SUDO_EDITOR,
VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries
to the list of files to process. This can lead to privilege escalation.
Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because
a user-specified editor may contain a "--" argument that defeats a
protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file'
value. (CVE-2023-22809)

References:
- https://bugs.mageia.org/show_bug.cgi?id=31437
- https://www.sudo.ws/security/advisories/sudoedit_any/
- https://www.debian.org/security/2023/dsa-5321
- https://ubuntu.com/security/notices/USN-5811-1
- https://lists.fedoraproject.org/archives/list/[email protected]/thread/2QDGFCGAV5QRJCE6IXRXIS4XJHS57DDH/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22809

SRPMS:
- 8/core/sudo-1.9.5p2-2.2.mga8

Mageia 2023-0025: sudo security update

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a lo...

Summary

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value. (CVE-2023-22809)

References

- https://bugs.mageia.org/show_bug.cgi?id=31437

- https://www.sudo.ws/security/advisories/sudoedit_any/

- https://www.debian.org/security/2023/dsa-5321

- https://ubuntu.com/security/notices/USN-5811-1

- https://lists.fedoraproject.org/archives/list/[email protected]/thread/2QDGFCGAV5QRJCE6IXRXIS4XJHS57DDH/

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22809

Resolution

MGASA-2023-0025 - Updated sudo packages fix security vulnerability

SRPMS

- 8/core/sudo-1.9.5p2-2.2.mga8

Severity
Publication date: 24 Jan 2023
URL: https://advisories.mageia.org/MGASA-2023-0025.html
Type: security
CVE: CVE-2023-22809

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.