Lucene search

K
rosalinuxROSA LABROSA-SA-2023-2075
HistoryJan 31, 2023 - 12:50 p.m.

Advisory ROSA-SA-2023-2075

2023-01-3112:50:07
ROSA LAB
abf.rosalinux.ru
13

0.001 Low

EPSS

Percentile

19.0%

Software: sudo 1.8.23
OS: rosa-server79

package_evr_string: sudo-1.8.23-11

CVE-ID: CVE-2023-22809
BDU-ID: 2023-00210
CVE-Crit: HIGH
CVE-DESC: A vulnerability in the sudoedit function of the Sudo system administration program is related to errors in the handling of additional arguments in environment variables. Exploitation of the vulnerability could allow an attacker acting remotely to escalate their privileges
In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a “–” argument that defeats a protection mechanism, e.g., an EDITOR=‘vim – /path/to/extra/file’ value.
CVE-STATUS: Fixed
CVE-REC: Run yum update sudo command to close it

OSVersionArchitecturePackageVersionFilename
rosaanynoarchsudo< 1.8.23UNKNOWN