Software: sudo 1.8.23
OS: rosa-server79
package_evr_string: sudo-1.8.23-11
CVE-ID: CVE-2023-22809
BDU-ID: 2023-00210
CVE-Crit: HIGH
CVE-DESC: A vulnerability in the sudoedit function of the Sudo system administration program is related to errors in the handling of additional arguments in environment variables. Exploitation of the vulnerability could allow an attacker acting remotely to escalate their privileges
In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a “–” argument that defeats a protection mechanism, e.g., an EDITOR=‘vim – /path/to/extra/file’ value.
CVE-STATUS: Fixed
CVE-REC: Run yum update sudo command to close it