{"id":"MGASA-2023-0025","summary":"Updated sudo packages fix security vulnerability","details":"In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra\narguments passed in the user-provided environment variables (SUDO_EDITOR,\nVISUAL, and EDITOR), allowing a local attacker to append arbitrary entries\nto the list of files to process. This can lead to privilege escalation.\nAffected versions are 1.8.0 through 1.9.12.p1. The problem exists because\na user-specified editor may contain a \"--\" argument that defeats a\nprotection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file'\nvalue. (CVE-2023-22809)\n","modified":"2026-02-01T05:45:40.413439Z","published":"2023-01-24T07:58:25Z","related":["CVE-2023-22809"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2023-0025.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=31437"},{"type":"REPORT","url":"https://www.sudo.ws/security/advisories/sudoedit_any/"},{"type":"REPORT","url":"https://www.debian.org/security/2023/dsa-5321"},{"type":"REPORT","url":"https://ubuntu.com/security/notices/USN-5811-1"},{"type":"REPORT","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/2QDGFCGAV5QRJCE6IXRXIS4XJHS57DDH/"}],"affected":[{"package":{"name":"sudo","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/sudo?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.9.5p2-2.2.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2023-0025.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}