Lucene search

K
gentooGentoo FoundationGLSA-202305-12
HistoryMay 03, 2023 - 12:00 a.m.

sudo: Root Privilege Escalation

2023-05-0300:00:00
Gentoo Foundation
security.gentoo.org
21
sudoedit
local attacker
arbitrary files
root privilege escalation
upgrade

0.001 Low

EPSS

Percentile

19.3%

Background

sudo allows a system administrator to give users the ability to run commands as other users.

Description

The sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process.

Impact

The improper processing of user’s environment variables could lead to the editing of arbitrary files as root, potentially leading to root privilege escalation.

Workaround

There is no known workaround at this time.

Resolution

All sudo users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.9.12_p2"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-admin/sudo< 1.9.12_p2UNKNOWN