Path: ...!news.mixmin.net!aioe.org!bofh.it!news.nic.it!robomod From: Salvatore Bonaccorso Newsgroups: linux.debian.announce.security Subject: [SECURITY] [DSA 5321-1] sudo security update Date: Wed, 18 Jan 2023 16:50:01 +0100 Message-ID: X-Original-To: debian-security-announce@lists.debian.org X-Mailbox-Line: From debian-security-announce-request@lists.debian.org Wed Jan 18 15:39:45 2023 Old-Return-Path: X-Amavis-Spam-Status: No, score=-113.391 tagged_above=-10000 required=5.3 tests=[BAYES_00=-2, DIGITS_LETTERS=1, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FOURLA=0.1, FVGT_m_MULTI_ODD=0.02, LDO_WHITELIST=-5, PGPSIGNATURE=-5, RCVD_IN_DNSWL_MED=-2.3, USER_IN_DKIM_WELCOMELIST=-0.01, USER_IN_DKIM_WHITELIST=-100] autolearn=ham autolearn_force=no Old-Dkim-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Date:Message-Id:Subject:To:From:Reply-To:Cc:MIME-Version: Content-Type:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=So2kbxeg4mgBRIuyCAWg6FnmDdWEzMfptuVmCEuPcTo=; b=LK AiENoId7hFL3NFaKhS7vE085bx5ZHY/q9asMGS8nfoZF4czsC1h+1l/0q3ltV9/NZfij2bRfGm5Ut PCI6PpLDcyS9RYPfdxeVsTREFLnuv3H3d0n7h7UOO3ux820rs435UFIKDVc5wps0M+TRDeP8AyHiA ByOJ3LCcqnJDM1xujUfkKkWJu+J6Hjyag5PflCKcIYEVI8BPdYnPAF8LDgVoO/HW34XWJKZNm9Yxq F8xnLptMJ2978pRqAYQwHr0V4LGQAGo7LvV3rCvF25QBbV06d6FxJGFqpB1AuIPvrC4CUAQwiSkre RoW6AtfY03RCQMJar2HE/ePR20FNAgDA==; X-Debian: PGP check passed for security officers Priority: urgent Reply-To: debian-security-announce-request@lists.debian.org X-Mailing-List: archive/latest/4221 List-ID: List-URL: List-Archive: https://lists.debian.org/msgid-search/E1pIAX3-008IaG-HR@seger.debian.org Approved: robomod@news.nic.it Lines: 54 Organization: linux.* mail to news gateway Sender: robomod@news.nic.it X-Original-Date: Wed, 18 Jan 2023 15:39:21 +0000 X-Original-Message-ID: Bytes: 4792 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5321-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso January 18, 2023 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : sudo CVE ID : CVE-2023-22809 Matthieu Barjole and Victor Cutillas discovered that sudoedit in sudo, a program designed to provide limited super user privileges to specific users, does not properly handle '--' to separate the editor and arguments from files to edit. A local user permitted to edit certain files can take advantage of this flaw to edit a file not permitted by the security policy, resulting in privilege escalation. Details can be found in the upstream advisory at https://www.sudo.ws/security/advisories/sudoedit_any/ . For the stable distribution (bullseye), this problem has been fixed in version 1.9.5p2-3+deb11u1. We recommend that you upgrade your sudo packages. For the detailed security status of sudo please refer to its security tracker page at: https://security-tracker.debian.org/tracker/sudo Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmPIEYBfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0RNgg/+PsJxpzc9hop4XU9Jsou45EcQ6bMf1rG/P1EDOTZjoebxe5xemlMAKtNk j5m+ZCAV/jNt+RPuNA9H9IFEE6LBRx17bzTjU0V+q/OXXlHUj9il0I6NnJEUrwya 9hFeg28qpRViKMdLN/ok2GJKjH73hr3Y/WZkw8kMbXK8gOiCGqCOLrNYCMq20a1D p4nlZN94VMO07crU0NLf3CRgLM0qqF4kSPpUSDw/RCefY4ojOwQnuEc7AbGyLrR8 GsXzyRTZuSJmFSfIUltXn+DnTy7E1mnQ11wT+80NjbrGvNBCMF36L2nCJzyU0Dz0 s6Tp2H25lQYwKtV/ALl2kLH4JMTV4MJQg3X9vnmWVf7LhZyCtVVQxMVg53pKoIHH SmiHiaYKmE/PKPjj+uPIINlKKpozjE6h+lr3VcyLhQbNmL93KZHNeZHGwTaYv6n3 dRJjnRFDlFMVhx/8wLgg1egqvxXFOKvpS4cEyIjlb4jW0L8ua4F8y/BHcXOSsAxW gOEDhmEXxOgPnWdaE7//tk+a01zh04mdHwZXSwBnFI1RkuajlTqsBHr5MOU55RIF G0t/0Amr59x/6ChiSVDYJDfy+mXi2AOhJlxeDVk46kdFsX3UHjommVF3YYMgFi3z koqUuS1eY7e1Z2Bi9Myz7LaDY5GZ9rHFhmGjqjkDjdHoyB1b33A= =fcWy -----END PGP SIGNATURE-----