Описание
Security update for sudo
This update for sudo fixes the following issues:
- CVE-2023-22809: Fixed an arbitrary file write issue that could be exploited by users with sudoedit permissions (bsc#1207082).
Список пакетов
Container suse/sle-micro-rancher/5.3:latest
sudo-1.9.9-150400.4.12.1
Container suse/sle-micro-rancher/5.4:latest
sudo-1.9.9-150400.4.12.1
Container suse/sle-micro/5.3/toolbox:latest
sudo-1.9.9-150400.4.12.1
Container suse/sle-micro/5.4/toolbox:latest
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Azure-Basic
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Azure-Standard
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-BYOS
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-BYOS-Azure
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-BYOS-EC2
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-BYOS-GCE
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-CHOST-BYOS
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-CHOST-BYOS-Aliyun
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-CHOST-BYOS-Azure
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-CHOST-BYOS-EC2
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-CHOST-BYOS-GCE
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-CHOST-BYOS-SAP-CCloud
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-EC2
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-EC2-ECS-HVM
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-GCE
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-HPC
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-HPC-Azure
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-HPC-BYOS
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-HPC-BYOS-Azure
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-HPC-BYOS-EC2
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-HPC-BYOS-GCE
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-HPC-EC2
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-HPC-GCE
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Hardened-BYOS
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Hardened-BYOS-Azure
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Hardened-BYOS-EC2
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Hardened-BYOS-GCE
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Manager-Server-4-3
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Manager-Server-4-3-Azure-llc
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Manager-Server-4-3-Azure-ltd
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Manager-Server-4-3-BYOS
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Manager-Server-4-3-EC2-llc
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Manager-Server-4-3-EC2-ltd
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Micro-5-3
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Micro-5-3-Azure
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Micro-5-3-BYOS
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Micro-5-3-BYOS-Azure
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Micro-5-3-BYOS-EC2
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Micro-5-3-BYOS-GCE
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Micro-5-3-EC2
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Micro-5-3-GCE
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Micro-5-4
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Micro-5-4-Azure
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Micro-5-4-BYOS
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Micro-5-4-BYOS-Azure
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Micro-5-4-BYOS-EC2
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Micro-5-4-BYOS-GCE
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Micro-5-4-EC2
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-Micro-5-4-GCE
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SAP
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SAP-Azure
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SAP-Azure-LI-BYOS
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SAP-Azure-LI-BYOS-Production
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SAP-Azure-VLI-BYOS
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SAP-BYOS
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SAP-BYOS-Azure
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SAP-BYOS-EC2
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SAP-BYOS-GCE
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SAP-EC2
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SAP-GCE
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SAP-Hardened
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SAP-Hardened-Azure
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SAP-Hardened-BYOS
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SAP-Hardened-BYOS-Azure
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SAP-Hardened-BYOS-EC2
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SAP-Hardened-BYOS-GCE
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SAP-Hardened-EC2
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SAP-Hardened-GCE
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SAPCAL
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SAPCAL-Azure
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SAPCAL-EC2
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SAPCAL-GCE
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SUSE-Rancher-Setup-BYOS
sudo-1.9.9-150400.4.12.1
Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2
sudo-1.9.9-150400.4.12.1
SUSE Linux Enterprise Micro 5.3
sudo-1.9.9-150400.4.12.1
SUSE Linux Enterprise Module for Basesystem 15 SP4
sudo-1.9.9-150400.4.12.1
sudo-devel-1.9.9-150400.4.12.1
sudo-plugin-python-1.9.9-150400.4.12.1
openSUSE Leap 15.4
sudo-1.9.9-150400.4.12.1
sudo-devel-1.9.9-150400.4.12.1
sudo-plugin-python-1.9.9-150400.4.12.1
sudo-test-1.9.9-150400.4.12.1
openSUSE Leap Micro 5.3
sudo-1.9.9-150400.4.12.1
Ссылки
- Link for SUSE-SU-2023:0114-1
- E-Mail link for SUSE-SU-2023:0114-1
- SUSE Security Ratings
- SUSE Bug 1207082
- SUSE CVE CVE-2023-22809 page
Описание
In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.
Затронутые продукты
Container suse/sle-micro-rancher/5.3:latest:sudo-1.9.9-150400.4.12.1
Container suse/sle-micro-rancher/5.4:latest:sudo-1.9.9-150400.4.12.1
Container suse/sle-micro/5.3/toolbox:latest:sudo-1.9.9-150400.4.12.1
Container suse/sle-micro/5.4/toolbox:latest:sudo-1.9.9-150400.4.12.1
Ссылки
- CVE-2023-22809
- SUSE Bug 1207082
- SUSE Bug 1208053
- SUSE Bug 1209326
- SUSE Bug 1214446
- SUSE Bug 1225623