An update for sudo is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2021-1002 Final 1.0 1.0 2021-01-28 Initial 2021-01-28 2021-01-28 openEuler SA Tool V1.0 2021-01-28 sudo security update An update for sudo is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1. A flaw was found in sudo. A heap-based buffer overflow was found in the way sudo parses command line arguments. This flaw is exploitable by any local user (normal users and system users, sudoers and non-sudoers), without authentication (i.e., the attacker does not need to know the user's password). Successful exploitation of this flaw could lead to privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2021-3156)\r\n\r\n The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.(CVE-2021-23239)\r\n\r\n selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.(CVE-2021-23240)\r\n\r\n An update for sudo is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1.\r\n\r\n openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. High sudo https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1002 https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-3156 https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-23239 https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-23240 https://nvd.nist.gov/vuln/detail/CVE-2021-3156 https://nvd.nist.gov/vuln/detail/CVE-2021-23239 https://nvd.nist.gov/vuln/detail/CVE-2021-23240 openEuler-20.03-LTS openEuler-20.03-LTS-SP1 sudo-1.9.2-2.oe1.aarch64.rpm sudo-debuginfo-1.9.2-2.oe1.aarch64.rpm sudo-debugsource-1.9.2-2.oe1.aarch64.rpm sudo-devel-1.9.2-2.oe1.aarch64.rpm sudo-help-1.9.2-2.oe1.noarch.rpm sudo-1.9.2-3.oe1.aarch64.rpm sudo-debuginfo-1.9.2-3.oe1.aarch64.rpm sudo-debugsource-1.9.2-3.oe1.aarch64.rpm sudo-devel-1.9.2-3.oe1.aarch64.rpm sudo-help-1.9.2-3.oe1.noarch.rpm sudo-1.9.2-2.oe1.src.rpm sudo-1.9.2-3.oe1.src.rpm sudo-1.9.2-2.oe1.x86_64.rpm sudo-debuginfo-1.9.2-2.oe1.x86_64.rpm sudo-debugsource-1.9.2-2.oe1.x86_64.rpm sudo-devel-1.9.2-2.oe1.x86_64.rpm sudo-help-1.9.2-2.oe1.noarch.rpm sudo-1.9.2-3.oe1.x86_64.rpm sudo-debuginfo-1.9.2-3.oe1.x86_64.rpm sudo-debugsource-1.9.2-3.oe1.x86_64.rpm sudo-devel-1.9.2-3.oe1.x86_64.rpm sudo-help-1.9.2-3.oe1.noarch.rpm A flaw was found in sudo. A heap-based buffer overflow was found in the way sudo parses command line arguments. This flaw is exploitable by any local user (normal users and system users, sudoers and non-sudoers), without authentication (i.e., the attacker does not need to know the user's password). Successful exploitation of this flaw could lead to privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. 2021-01-28 CVE-2021-3156 openEuler-20.03-LTS openEuler-20.03-LTS-SP1 High 7.8 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H sudo security update 2021-01-28 https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1002 The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path. 2021-01-28 CVE-2021-23239 openEuler-20.03-LTS openEuler-20.03-LTS-SP1 Low 2.5 AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N sudo security update 2021-01-28 https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1002 selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable. 2021-01-28 CVE-2021-23240 openEuler-20.03-LTS openEuler-20.03-LTS-SP1 High 7.8 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H sudo security update 2021-01-28 https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1002