Lucene search

K
gentooGentoo FoundationGLSA-202401-29
HistoryJan 24, 2024 - 12:00 a.m.

sudo: Memory Manipulation

2024-01-2400:00:00
Gentoo Foundation
security.gentoo.org
15
sudo
vulnerability
execution flow
security-sensitive code
upgrade

CVSS3

7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

Low

EPSS

0.001

Percentile

20.1%

Background

sudo allows a system administrator to give users the ability to run commands as other users.

Description

Multiple vulnerabilities have been discovered in sudo. Please review the CVE identifiers referenced below for details.

Impact

Stack/register variables can be flipped via fault injection, affecting execution flow in security-sensitive code.

Workaround

There is no known workaround at this time.

Resolution

All sudo users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.9.15_p2"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-admin/sudo< 1.9.15_p2UNKNOWN

CVSS3

7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

Low

EPSS

0.001

Percentile

20.1%