An update for sudo is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2021-1002
Final
1.0
1.0
2021-01-28
Initial
2021-01-28
2021-01-28
openEuler SA Tool V1.0
2021-01-28
sudo security update
An update for sudo is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1.
A flaw was found in sudo. A heap-based buffer overflow was found in the way sudo parses command line arguments. This flaw is exploitable by any local user (normal users and system users, sudoers and non-sudoers), without authentication (i.e., the attacker does not need to know the user's password). Successful exploitation of this flaw could lead to privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2021-3156)\r\n\r\n
The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.(CVE-2021-23239)\r\n\r\n
selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.(CVE-2021-23240)\r\n\r\n
An update for sudo is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1.\r\n\r\n
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
sudo
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1002
https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-3156
https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-23239
https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-23240
https://nvd.nist.gov/vuln/detail/CVE-2021-3156
https://nvd.nist.gov/vuln/detail/CVE-2021-23239
https://nvd.nist.gov/vuln/detail/CVE-2021-23240
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
sudo-1.9.2-2.oe1.aarch64.rpm
sudo-debuginfo-1.9.2-2.oe1.aarch64.rpm
sudo-debugsource-1.9.2-2.oe1.aarch64.rpm
sudo-devel-1.9.2-2.oe1.aarch64.rpm
sudo-help-1.9.2-2.oe1.noarch.rpm
sudo-1.9.2-3.oe1.aarch64.rpm
sudo-debuginfo-1.9.2-3.oe1.aarch64.rpm
sudo-debugsource-1.9.2-3.oe1.aarch64.rpm
sudo-devel-1.9.2-3.oe1.aarch64.rpm
sudo-help-1.9.2-3.oe1.noarch.rpm
sudo-1.9.2-2.oe1.src.rpm
sudo-1.9.2-3.oe1.src.rpm
sudo-1.9.2-2.oe1.x86_64.rpm
sudo-debuginfo-1.9.2-2.oe1.x86_64.rpm
sudo-debugsource-1.9.2-2.oe1.x86_64.rpm
sudo-devel-1.9.2-2.oe1.x86_64.rpm
sudo-help-1.9.2-2.oe1.noarch.rpm
sudo-1.9.2-3.oe1.x86_64.rpm
sudo-debuginfo-1.9.2-3.oe1.x86_64.rpm
sudo-debugsource-1.9.2-3.oe1.x86_64.rpm
sudo-devel-1.9.2-3.oe1.x86_64.rpm
sudo-help-1.9.2-3.oe1.noarch.rpm
A flaw was found in sudo. A heap-based buffer overflow was found in the way sudo parses command line arguments. This flaw is exploitable by any local user (normal users and system users, sudoers and non-sudoers), without authentication (i.e., the attacker does not need to know the user's password). Successful exploitation of this flaw could lead to privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
2021-01-28
CVE-2021-3156
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
High
7.8
AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
sudo security update
2021-01-28
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1002
The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.
2021-01-28
CVE-2021-23239
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
Low
2.5
AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
sudo security update
2021-01-28
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1002
selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.
2021-01-28
CVE-2021-23240
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
High
7.8
AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
sudo security update
2021-01-28
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1002