UBUNTU-CVE-2023-22809

Source
https://ubuntu.com/security/CVE-2023-22809
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-22809.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2023-22809
Related
Published
2023-01-18T00:00:00Z
Modified
2023-01-18T00:00:00Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.

References

Affected packages

Ubuntu:Pro:14.04:LTS / sudo

Package

Name
sudo
Purl
pkg:deb/ubuntu/sudo?arch=src?distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.9p5-1ubuntu1.5+esm7

Affected versions

1.*

1.8.6p3-0ubuntu3
1.8.8-2ubuntu1
1.8.8-2ubuntu2
1.8.9p4-1ubuntu1
1.8.9p4-1ubuntu2
1.8.9p5-1ubuntu1
1.8.9p5-1ubuntu1.1
1.8.9p5-1ubuntu1.2
1.8.9p5-1ubuntu1.3
1.8.9p5-1ubuntu1.4
1.8.9p5-1ubuntu1.5+esm1
1.8.9p5-1ubuntu1.5+esm2
1.8.9p5-1ubuntu1.5+esm3
1.8.9p5-1ubuntu1.5+esm5
1.8.9p5-1ubuntu1.5+esm6

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "1.8.9p5-1ubuntu1.5+esm7",
            "binary_name": "sudo"
        },
        {
            "binary_version": "1.8.9p5-1ubuntu1.5+esm7",
            "binary_name": "sudo-dbgsym"
        },
        {
            "binary_version": "1.8.9p5-1ubuntu1.5+esm7",
            "binary_name": "sudo-ldap"
        },
        {
            "binary_version": "1.8.9p5-1ubuntu1.5+esm7",
            "binary_name": "sudo-ldap-dbgsym"
        }
    ]
}

Ubuntu:Pro:16.04:LTS / sudo

Package

Name
sudo
Purl
pkg:deb/ubuntu/sudo?arch=src?distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.16-0ubuntu1.10+esm1

Affected versions

1.*

1.8.12-1ubuntu3
1.8.16-0ubuntu1
1.8.16-0ubuntu1.1
1.8.16-0ubuntu1.2
1.8.16-0ubuntu1.3
1.8.16-0ubuntu1.4
1.8.16-0ubuntu1.5
1.8.16-0ubuntu1.6
1.8.16-0ubuntu1.7
1.8.16-0ubuntu1.8
1.8.16-0ubuntu1.9
1.8.16-0ubuntu1.10

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "1.8.16-0ubuntu1.10+esm1",
            "binary_name": "sudo"
        },
        {
            "binary_version": "1.8.16-0ubuntu1.10+esm1",
            "binary_name": "sudo-dbgsym"
        },
        {
            "binary_version": "1.8.16-0ubuntu1.10+esm1",
            "binary_name": "sudo-ldap"
        },
        {
            "binary_version": "1.8.16-0ubuntu1.10+esm1",
            "binary_name": "sudo-ldap-dbgsym"
        }
    ]
}

Ubuntu:18.04:LTS / sudo

Package

Name
sudo
Purl
pkg:deb/ubuntu/sudo?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.21p2-3ubuntu1.5

Affected versions

1.*

1.8.20p2-1ubuntu1
1.8.21p2-2ubuntu1
1.8.21p2-3ubuntu1
1.8.21p2-3ubuntu1.1
1.8.21p2-3ubuntu1.2
1.8.21p2-3ubuntu1.3
1.8.21p2-3ubuntu1.4

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "1.8.21p2-3ubuntu1.5",
            "binary_name": "sudo"
        },
        {
            "binary_version": "1.8.21p2-3ubuntu1.5",
            "binary_name": "sudo-dbgsym"
        },
        {
            "binary_version": "1.8.21p2-3ubuntu1.5",
            "binary_name": "sudo-ldap"
        },
        {
            "binary_version": "1.8.21p2-3ubuntu1.5",
            "binary_name": "sudo-ldap-dbgsym"
        }
    ]
}

Ubuntu:20.04:LTS / sudo

Package

Name
sudo
Purl
pkg:deb/ubuntu/sudo?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.31-1ubuntu1.4

Affected versions

1.*

1.8.27-1ubuntu4
1.8.29-1ubuntu1
1.8.31-1ubuntu1
1.8.31-1ubuntu1.1
1.8.31-1ubuntu1.2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "1.8.31-1ubuntu1.4",
            "binary_name": "sudo"
        },
        {
            "binary_version": "1.8.31-1ubuntu1.4",
            "binary_name": "sudo-dbgsym"
        },
        {
            "binary_version": "1.8.31-1ubuntu1.4",
            "binary_name": "sudo-ldap"
        },
        {
            "binary_version": "1.8.31-1ubuntu1.4",
            "binary_name": "sudo-ldap-dbgsym"
        }
    ]
}

Ubuntu:22.04:LTS / sudo

Package

Name
sudo
Purl
pkg:deb/ubuntu/sudo?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.9-1ubuntu2.2

Affected versions

1.*

1.9.5p2-3ubuntu2
1.9.9-1ubuntu2
1.9.9-1ubuntu2.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "1.9.9-1ubuntu2.2",
            "binary_name": "sudo"
        },
        {
            "binary_version": "1.9.9-1ubuntu2.2",
            "binary_name": "sudo-dbgsym"
        },
        {
            "binary_version": "1.9.9-1ubuntu2.2",
            "binary_name": "sudo-ldap"
        },
        {
            "binary_version": "1.9.9-1ubuntu2.2",
            "binary_name": "sudo-ldap-dbgsym"
        }
    ]
}