From 3cf27339901a7ca15df33f6ea134daa93888d5d0 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Wed, 3 May 2023 17:26:08 +0100 Subject: gentoo auto-resync : 03:05:2023 - 17:26:08 --- metadata/glsa/glsa-202305-12.xml | 42 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+) create mode 100644 metadata/glsa/glsa-202305-12.xml (limited to 'metadata/glsa/glsa-202305-12.xml') diff --git a/metadata/glsa/glsa-202305-12.xml b/metadata/glsa/glsa-202305-12.xml new file mode 100644 index 000000000000..4522165ae54f --- /dev/null +++ b/metadata/glsa/glsa-202305-12.xml @@ -0,0 +1,42 @@ + + + + sudo: Root Privilege Escalation + A vulnerability has been discovered in sudo which could result in root privilege escalation. + sudo + 2023-05-03 + 2023-05-03 + 891335 + remote + + + 1.9.12_p2 + 1.9.12_p2 + + + +

sudo allows a system administrator to give users the ability to run commands as other users.

+
+ +

The sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process.

+
+ +

The improper processing of user's environment variables could lead to the editing of arbitrary files as root, potentially leading to root privilege escalation.

+
+ +

There is no known workaround at this time.

+
+ +

All sudo users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.9.12_p2" + +
+ + CVE-2023-22809 + + ajak + sam +
\ No newline at end of file -- cgit v1.2.3