[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 3732-1] sudo security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3732-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                   Bastien Roucariès
February 03, 2024                             https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : sudo
Version        : 1.8.27-1+deb10u6
CVE ID         : CVE-2023-7090 CVE-2023-28486 CVE-2023-28487

Sudo, a program designed to allow a sysadmin to give limited
root privileges to users and log root activity, was vulnerable.

CVE-2023-7090

    A flaw was found in sudo in the handling of ipa_hostname, where
    ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo.
    Therefore, it leads to privilege mismanagement vulnerability in
    applications, where client hosts retain privileges even after
    retracting them.

CVE-2023-28486

    Sudo did not escape control characters in log messages.

CVE-2023-28487

    Sudo did not escape control characters in sudoreplay output.

For Debian 10 buster, these problems have been fixed in version
1.8.27-1+deb10u6.

We recommend that you upgrade your sudo packages.

For the detailed security status of sudo please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/sudo

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=cHgw
-----END PGP SIGNATURE-----


Reply to: