[Debian] CVE: CVE-2023-22809: sudo: allowing a local attacker to append arbitrary entries
Bug #2020726 reported by
Yue Tao
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
StarlingX |
Fix Released
|
High
|
Unassigned |
Bug Description
CVE-2023-22809: https:/
Base Score: High
In Sudo before 1.9.12p2, the sudoedit feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim – /path/to/
References:
['sudo-
CVE References
Changed in starlingx: | |
importance: | Undecided → High |
status: | New → Triaged |
tags: | added: stx.9.0 stx.security |
To post a comment you must log in.
Fix proposed to branch: master /review. opendev. org/c/starlingx /tools/ +/884800
Review: https:/