OESA-2023-1049

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1049
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2023-1049.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2023-1049
Upstream
Published
2023-02-03T11:04:50Z
Modified
2025-08-12T05:18:20.672058Z
Summary
sudo security update
Details

Sudo is a program designed to allow a sysadmin to give limited root privileges to users and log root activity. The basic philosophy is to give as few privileges as possible but still allow people to get their work done.

Security Fix(es):

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.(CVE-2023-22809)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:20.03-LTS-SP1 / sudo

Package

Name
sudo
Purl
pkg:rpm/openEuler/sudo&distro=openEuler-20.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.2-10.oe1

Ecosystem specific

{
    "x86_64": [
        "sudo-debuginfo-1.9.2-10.oe1.x86_64.rpm",
        "sudo-1.9.2-10.oe1.x86_64.rpm",
        "sudo-devel-1.9.2-10.oe1.x86_64.rpm",
        "sudo-debugsource-1.9.2-10.oe1.x86_64.rpm"
    ],
    "noarch": [
        "sudo-help-1.9.2-10.oe1.noarch.rpm"
    ],
    "aarch64": [
        "sudo-devel-1.9.2-10.oe1.aarch64.rpm",
        "sudo-debuginfo-1.9.2-10.oe1.aarch64.rpm",
        "sudo-1.9.2-10.oe1.aarch64.rpm",
        "sudo-debugsource-1.9.2-10.oe1.aarch64.rpm"
    ],
    "src": [
        "sudo-1.9.2-10.oe1.src.rpm"
    ]
}

openEuler:20.03-LTS-SP3 / sudo

Package

Name
sudo
Purl
pkg:rpm/openEuler/sudo&distro=openEuler-20.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.2-10.oe1

Ecosystem specific

{
    "x86_64": [
        "sudo-debuginfo-1.9.2-10.oe1.x86_64.rpm",
        "sudo-devel-1.9.2-10.oe1.x86_64.rpm",
        "sudo-1.9.2-10.oe1.x86_64.rpm",
        "sudo-debugsource-1.9.2-10.oe1.x86_64.rpm"
    ],
    "noarch": [
        "sudo-help-1.9.2-10.oe1.noarch.rpm"
    ],
    "aarch64": [
        "sudo-1.9.2-10.oe1.aarch64.rpm",
        "sudo-debuginfo-1.9.2-10.oe1.aarch64.rpm",
        "sudo-debugsource-1.9.2-10.oe1.aarch64.rpm",
        "sudo-devel-1.9.2-10.oe1.aarch64.rpm"
    ],
    "src": [
        "sudo-1.9.2-10.oe1.src.rpm"
    ]
}

openEuler:22.03-LTS / sudo

Package

Name
sudo
Purl
pkg:rpm/openEuler/sudo&distro=openEuler-22.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.8p2-9.oe2203sp1

Ecosystem specific

{
    "x86_64": [
        "sudo-debuginfo-1.9.8p2-9.oe2203.x86_64.rpm",
        "sudo-devel-1.9.8p2-9.oe2203.x86_64.rpm",
        "sudo-1.9.8p2-9.oe2203.x86_64.rpm",
        "sudo-debugsource-1.9.8p2-9.oe2203.x86_64.rpm",
        "sudo-1.9.8p2-9.oe2203sp1.x86_64.rpm",
        "sudo-debuginfo-1.9.8p2-9.oe2203sp1.x86_64.rpm",
        "sudo-debugsource-1.9.8p2-9.oe2203sp1.x86_64.rpm",
        "sudo-devel-1.9.8p2-9.oe2203sp1.x86_64.rpm"
    ],
    "noarch": [
        "sudo-help-1.9.8p2-9.oe2203.noarch.rpm",
        "sudo-help-1.9.8p2-9.oe2203sp1.noarch.rpm"
    ],
    "aarch64": [
        "sudo-1.9.8p2-9.oe2203.aarch64.rpm",
        "sudo-debuginfo-1.9.8p2-9.oe2203.aarch64.rpm",
        "sudo-devel-1.9.8p2-9.oe2203.aarch64.rpm",
        "sudo-debugsource-1.9.8p2-9.oe2203.aarch64.rpm",
        "sudo-1.9.8p2-9.oe2203sp1.aarch64.rpm",
        "sudo-debuginfo-1.9.8p2-9.oe2203sp1.aarch64.rpm",
        "sudo-devel-1.9.8p2-9.oe2203sp1.aarch64.rpm",
        "sudo-debugsource-1.9.8p2-9.oe2203sp1.aarch64.rpm"
    ],
    "src": [
        "sudo-1.9.8p2-9.oe2203.src.rpm",
        "sudo-1.9.8p2-9.oe2203sp1.src.rpm"
    ]
}

openEuler:22.03-LTS-SP1 / sudo

Package

Name
sudo
Purl
pkg:rpm/openEuler/sudo&distro=openEuler-22.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.8p2-9.oe2203sp1

Ecosystem specific

{
    "x86_64": [
        "sudo-1.9.8p2-9.oe2203sp1.x86_64.rpm",
        "sudo-debuginfo-1.9.8p2-9.oe2203sp1.x86_64.rpm",
        "sudo-debugsource-1.9.8p2-9.oe2203sp1.x86_64.rpm",
        "sudo-devel-1.9.8p2-9.oe2203sp1.x86_64.rpm"
    ],
    "noarch": [
        "sudo-help-1.9.8p2-9.oe2203sp1.noarch.rpm"
    ],
    "aarch64": [
        "sudo-1.9.8p2-9.oe2203sp1.aarch64.rpm",
        "sudo-debuginfo-1.9.8p2-9.oe2203sp1.aarch64.rpm",
        "sudo-devel-1.9.8p2-9.oe2203sp1.aarch64.rpm",
        "sudo-debugsource-1.9.8p2-9.oe2203sp1.aarch64.rpm"
    ],
    "src": [
        "sudo-1.9.8p2-9.oe2203sp1.src.rpm"
    ]
}