{"id":36541,"date":"2023-01-24T10:08:34","date_gmt":"2023-01-24T07:08:34","guid":{"rendered":"https:\/\/packetstormsecurity.com\/files\/170636\/RHSA-2023-0284-01.txt"},"modified":"2023-01-24T11:09:31","modified_gmt":"2023-01-24T07:39:31","slug":"red-hat-security-advisory-2023-0284-01-sudo","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/red-hat-security-advisory-2023-0284-01-sudo\/","title":{"rendered":"Red Hat Security Advisory 2023-0284-01 sudo"},"content":{"rendered":"<p dir=\"ltr\">&#8212;&#8211;BEGIN PGP SIGNED MESSAGE&#8212;&#8211;<br \/>\nHash: SHA256<\/p>\n<p dir=\"ltr\">=====================================================================<br \/>\nRed Hat Security Advisory<\/p>\n<p dir=\"ltr\">Synopsis: Important: sudo security update<br \/>\nAdvisory ID: RHSA-2023:0284-01<br \/>\nProduct: Red Hat Enterprise Linux<br \/>\nAdvisory URL: https:\/\/access.redhat.com\/errata\/RHSA-2023:0284<br \/>\nIssue date: 2023-01-23<br \/>\nCVE Names: CVE-2023-22809<br \/>\n=====================================================================<\/p>\n<p dir=\"ltr\">1. Summary:<\/p>\n<p dir=\"ltr\">An update for sudo is now available for Red Hat Enterprise Linux 8.<\/p>\n<p dir=\"ltr\">Red Hat Product Security has rated this update as having a security impact<br \/>\nof Important. A Common Vulnerability Scoring System (CVSS) base score,<br \/>\nwhich gives a detailed severity rating, is available for each vulnerability<br \/>\nfrom the CVE link(s) in the References section.<\/p>\n<p dir=\"ltr\">2. Relevant releases\/architectures:<\/p>\n<p dir=\"ltr\">Red Hat Enterprise Linux BaseOS (v. 8) &#8211; aarch64, ppc64le, s390x, x86_64<\/p>\n<p dir=\"ltr\">3. Description:<\/p>\n<p dir=\"ltr\">The sudo packages contain the sudo utility which allows system<br \/>\nadministrators to provide certain users with the permission to execute<br \/>\nprivileged commands, which are used for system management purposes, without<br \/>\nhaving to log in as root.<\/p>\n<p dir=\"ltr\">Security Fix(es):<\/p>\n<p dir=\"ltr\">* sudo: arbitrary file write with privileges of the RunAs user<br \/>\n(CVE-2023-22809)<\/p>\n<p dir=\"ltr\">For more details about the security issue(s), including the impact, a CVSS<br \/>\nscore, acknowledgments, and other related information, refer to the CVE<br \/>\npage(s) listed in the References section.<\/p>\n<p dir=\"ltr\">4. Solution:<\/p>\n<p dir=\"ltr\">For details on how to apply this update, which includes the changes<br \/>\ndescribed in this advisory, refer to:<\/p>\n<p dir=\"ltr\">https:\/\/access.redhat.com\/articles\/11258<\/p>\n<p dir=\"ltr\">5. Bugs fixed (https:\/\/bugzilla.redhat.com\/):<\/p>\n<p dir=\"ltr\">2161142 &#8211; CVE-2023-22809 sudo: arbitrary file write with privileges of the RunAs user<\/p>\n<p dir=\"ltr\">6. Package List:<\/p>\n<p dir=\"ltr\">Red Hat Enterprise Linux BaseOS (v. 8):<\/p>\n<p dir=\"ltr\">Source:<br \/>\nsudo-1.8.29-8.el8_7.1.src.rpm<\/p>\n<p dir=\"ltr\">aarch64:<br \/>\nsudo-1.8.29-8.el8_7.1.aarch64.rpm<br \/>\nsudo-debuginfo-1.8.29-8.el8_7.1.aarch64.rpm<br \/>\nsudo-debugsource-1.8.29-8.el8_7.1.aarch64.rpm<\/p>\n<p dir=\"ltr\">ppc64le:<br \/>\nsudo-1.8.29-8.el8_7.1.ppc64le.rpm<br \/>\nsudo-debuginfo-1.8.29-8.el8_7.1.ppc64le.rpm<br \/>\nsudo-debugsource-1.8.29-8.el8_7.1.ppc64le.rpm<\/p>\n<p dir=\"ltr\">s390x:<br \/>\nsudo-1.8.29-8.el8_7.1.s390x.rpm<br \/>\nsudo-debuginfo-1.8.29-8.el8_7.1.s390x.rpm<br \/>\nsudo-debugsource-1.8.29-8.el8_7.1.s390x.rpm<\/p>\n<p dir=\"ltr\">x86_64:<br \/>\nsudo-1.8.29-8.el8_7.1.x86_64.rpm<br \/>\nsudo-debuginfo-1.8.29-8.el8_7.1.x86_64.rpm<br \/>\nsudo-debugsource-1.8.29-8.el8_7.1.x86_64.rpm<\/p>\n<p dir=\"ltr\">These packages are GPG signed by Red Hat for security. Our key and<br \/>\ndetails on how to verify the signature are available from<br \/>\nhttps:\/\/access.redhat.com\/security\/team\/key\/<\/p>\n<p dir=\"ltr\">7. References:<\/p>\n<p dir=\"ltr\">https:\/\/access.redhat.com\/security\/cve\/CVE-2023-22809<br \/>\nhttps:\/\/access.redhat.com\/security\/updates\/classification\/#important<\/p>\n<p dir=\"ltr\">8. Contact:<\/p>\n<p dir=\"ltr\">The Red Hat security contact is &lt;secalert@redhat.com&gt;. More contact<br \/>\ndetails at https:\/\/access.redhat.com\/security\/team\/contact\/<\/p>\n<p dir=\"ltr\">Copyright 2023 Red Hat, Inc.<br \/>\n&#8212;&#8211;BEGIN PGP SIGNATURE&#8212;&#8211;<br \/>\nVersion: GnuPG v1<\/p>\n<p dir=\"ltr\">iQIVAwUBY85izdzjgjWX9erEAQg4SA\/\/aywYFG1DlblFxPi50A7qSriQS\/9zmP6H<br \/>\nG80\/ATiO+PVzYGOR+CttdzSevLC38KFJ6xB0AMq\/fKlw2Wxofriid3FjsgErh\/8O<br \/>\nFzL\/gUqZNLFY11sDaDxdTqQD5n9xRmVOwXimJHYAEhpFinkkJNRoQUQ1Nb8SEJwp<br \/>\nWCmPqYM1oRU6lHq0q+CDL5GS7zIRB2zndXIRMLIy468\/eVGwhXhbqDVHdEttptvy<br \/>\nhZtOl75MsslbUVqZFYulRLz31byf0Cmd9HTpnRtkagPYP4\/ON2ur6pHLGtdTDVNu<br \/>\nDWCgX6Z+zqtIYSS7vxpGPle2AF1AYnJ2nNMltiDsYnbTFvIbvNEjvT5Rk+Iq6qzh<br \/>\nCZLHkG6bMhBDwTbpGldqOUynI9ydJv2D6waSvp5MJ57\/WnHY9lM472LuCfGH4cmB<br \/>\nJgDkpX\/7zDqvOCmrmTp7KMlnNxLxxNHREFEYcK2Uy4VlyBgABJt0BqL3tib3VLc\/<br \/>\n4pbCq4NaR8zccUDVhe+Q+3ARrc+14U22X3elGQH9IQbzOaI99HHwoGIOQZFCKIsX<br \/>\nkPLdVtRMp48FiM9xEosd20vgk3nZpIvFV2MPbOnUtgtydspK7QvqZ6KMuI38+n8S<br \/>\nUd34u6U0trddUJGgg5iZOJ6m9CQ2aP8fh0Q9g7Yl2kaMZv\/5cbe\/aPBeK2JtwF9e<br \/>\nKXTQ8DRWGAI=<br \/>\n=CWM+<br \/>\n&#8212;&#8211;END PGP SIGNATURE&#8212;&#8211;<br \/>\n&#8212;<br \/>\nRHSA-announce mailing list<br \/>\nRHSA-announce@redhat.com<br \/>\nhttps:\/\/listman.redhat.com\/mailman\/listinfo\/rhsa-announce<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8212;&#8211;BEGIN PGP SIGNED MESSAGE&#8212;&#8211; Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: sudo security update Advisory ID: RHSA-2023:0284-01 Product: Red Hat Enterprise Linux Advisory URL: https:\/\/access.redhat.com\/errata\/RHSA-2023:0284 Issue date: 2023-01-23 CVE Names: CVE-2023-22809 ===================================================================== 1. Summary: An update for sudo is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-36541","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/36541","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=36541"}],"version-history":[{"count":1,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/36541\/revisions"}],"predecessor-version":[{"id":36542,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/36541\/revisions\/36542"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=36541"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=36541"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=36541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}