Description
In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3272-1 | sudo security update |
Debian DSA |
DSA-5321-1 | sudo security update |
Ubuntu USN |
USN-5811-1 | Sudo vulnerabilities |
Ubuntu USN |
USN-5811-2 | Sudo vulnerability |
Ubuntu USN |
USN-5811-3 | Sudo vulnerability |
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 04 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Apple
Subscribe
Macos
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Rhel Aus
Subscribe
Rhel E4s
Subscribe
Rhel Els
Subscribe
Rhel Eus
Subscribe
Rhel Tus
Subscribe
Rhev Hypervisor
Subscribe
Sudo Project
Subscribe
Sudo
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-04T15:45:24.835Z
Reserved: 2023-01-06T00:00:00.000Z
Link: CVE-2023-22809
Updated: 2024-08-02T10:20:30.856Z
Status : Modified
Published: 2023-01-18T17:15:10.353
Modified: 2025-04-04T16:15:16.850
Link: CVE-2023-22809
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
Ubuntu USN