Bug 267617 - security/sudo: Update to 1.9.12p1
Summary: security/sudo: Update to 1.9.12p1
Status: Closed FIXED
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: Normal Affects Many People
Assignee: Cy Schubert
URL: https://www.sudo.ws/releases/stable/#...
Keywords: needs-patch, security
Depends on:
Blocks:
 
Reported: 2022-11-07 14:22 UTC by Cy Schubert
Modified: 2022-11-08 22:52 UTC (History)
4 users (show)

See Also:
garga: maintainer-feedback+
koobs: merge-quarterly?


Attachments
Update sudo to 1.9.12p1 (1.36 KB, patch)
2022-11-07 14:22 UTC, Cy Schubert
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Cy Schubert freebsd_committer freebsd_triage 2022-11-07 14:22:51 UTC
Created attachment 237918 [details]
Update sudo to 1.9.12p1

Sudo version 1.9.12p1 is now available which fixes several minor
bugs in sudo 1.9.12.  It includes a fix for CVE-2022-43995, a
non-exploitable potential out-of-bounds write on systems that do
not use PAM, AIX authentication or BSD authentication.

Source:
    https://www.sudo.ws/dist/sudo-1.9.12p1.tar.gz
    ftp://ftp.sudo.ws/pub/sudo/sudo-1.9.12p1.tar.gz

SHA256 checksum:
    475a18a8eb3da8b2917ceab063a6baf51ea09128c3c47e3e0e33ab7497bab7d8
MD5 checksum:
    486ebd8ff62a8671f609d9067b0dd79b

Binary packages:
    https://www.sudo.ws/getting/packages/
    https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_12p1

For a list of download mirror sites, see:
    https://www.sudo.ws/getting/download_mirrors/

Sudo web site:
    https://www.sudo.ws/

Major changes between sudo 1.9.12p1 and 1.9.12:

 * Sudo's configure script now does a better job of detecting when
   the -fstack-clash-protection compiler option does not work.
   GitHub issue #191.

 * Fixed CVE-2022-43995, a potential out-of-bounds write for passwords
   smaller than 8 characters when passwd authentication is enabled.
   This does not affect configurations that use other authentication
   methods such as PAM, AIX authentication or BSD authentication.

 * Fixed a build error with some configurations compiling host_port.c.

Major changes between sudo 1.9.12 and 1.9.11p3:

 * Fixed a bug in the ptrace-based intercept mode where the current
   working directory could include garbage at the end.

 * Fixed a compilation error on systems that lack the stdint.h
   header.  Bug #1035

 * Fixed a bug when logging the command's exit status in intercept
   mode.  The wrong command could be logged with the exit status.

 * For ptrace-based intercept mode, sudo will now attempt to
   verify that the command path name, arguments and environment
   have not changed from the time when they were authorized by the
   security policy.  The new "intercept_verify" sudoers setting can
   be used to control this behavior.

 * Fixed running commands with a relative path (e.g. ./foo) in
   intercept mode.  Previously, this would fail if sudo's current
   working directory was different from that of the command.

 * Sudo now supports passing the execve(2) system call the NULL
   pointer for the `argv` and/or `envp` arguments when in intercept
   mode.  Linux treats a NULL pointer like an empty array.

 * The sudoers LDAP schema now allows sudoUser, sudoRunasUser and
   sudoRunasGroup to include UTF-8 characters, not just 7-bit ASCII.

 * Fixed a problem with "sudo -i" on SELinux when the target user's
   home directory is not searchable by sudo.  GitHub issue #160.

 * Neovim has been added to the list of visudo editors that support
   passing the line number on the command line.

 * Fixed a bug in sudo's SHA384 and SHA512 message digest padding.

 * Added a new "-N" (--no-update) command line option to sudo which
   can be used to prevent sudo from updating the user's cached
   credentials.  It is now possible to determine whether or not a
   user's cached credentials are currently valid by running:

	$ sudo -Nnv

   and checking the exit value.  One use case for this is to indicate
   in a shell prompt that sudo is "active" for the user.

 * PAM approval modules are no longer invoked when running sub-commands
   in intercept mode unless the "intercept_authenticate" option is set.
   There is a substantial performance penalty for calling into PAM
   for each command run.  PAM approval modules are still called for
   the initial command.

 * Intercept mode on Linux now uses process_vm_readv(2) and
   process_vm_writev(2) if available.

 * The XDG_CURRENT_DESKTOP environment variable is now preserved
   by default.  This makes it possible for graphical applications
   to choose the correct theme when run via sudo.

 * On 64-bit systems, if sudo fails to load a sudoers group plugin,
   it will use system-specific heuristics to try to locate a 64-bit
   version of the plugin.

 * The cvtsudoers manual now documents the JSON and CSV output
   formats.  GitHub issue #172.

 * Fixed a bug where sub-commands were not being logged to a remote
   log server when log_subcmds was enabled.  GitHub issue #174.

 * The new log_stdin, log_stdout, log_stderr, log_ttyin, and log_ttyout
   sudoers settings can be used to support more fine-grained I/O logging.
   The sudo front-end no longer allocates a pseudo-terminal when running
   a command if the I/O logging plugin requests logging of stdin, stdout,
   or stderr but not terminal input/output.

 * Quieted a libgcrypt run-time initialization warning.
   This fixes Debian bug #1019428 and Ubuntu bug #1397663.

 * Fixed a bug in visudo that caused literal backslashes to be removed
   from the EDITOR environment variable.  GitHub issue #179.

 * The sudo Python plugin now implements the "find_spec" method instead
   of the the deprecated "find_module".  This fixes a test failure when
   a newer version of setuptools that doesn't include "find_module" is
   found on the system.

 * Fixed a bug introduced in sudo 1.9.9 where sudo_logsrvd created
   the process ID file, usually /var/run/sudo/sudo_logsrvd.pid, as
   a directory instead of a plain file.  The same bug could result
   in I/O log directories that end in six or more X's being created
   literally in addition to the name being used as a template for
   the mkdtemp(3) function.

 * Fixed a long-standing bug where a sudoers rule with a command
   line argument of "", which indicates the command may be run with
   no arguments, would also match a literal "" on the command line.
   GitHub issue #182.

 * Added the -I option to visudo which only edits the main sudoers
   file.  Include files are not edited unless a syntax error is found.

 * Fixed "sudo -l -U otheruser" output when the runas list is empty.
   Previously, sudo would list the invoking user instead of the
   list user.  GitHub issue #183.

 * Fixed the display of command tags and options in "sudo -l" output
   when the RunAs user or group changes.  A new line is started for
   RunAs changes which means we need to display the command tags
   and options again.  GitHub issue #184.

 * The sesh helper program now uses getopt_long(3) to parse the
   command line options.

 * The embedded copy of zlib has been updated to version 1.2.13.

 * Fixed a bug that prevented event log data from being sent to the
   log server when I/O logging was not enabled.  This only affected
   systems without PAM or configurations where the pam_session and
   pam_setcred options were disabled in the sudoers file.

 * Fixed a bug where "sudo -l" output included a carriage return
   after the newline.  This is only needed when displaying to a
   terminal in raw mode.  Bug #1042.
Comment 1 Renato Botelho freebsd_committer freebsd_triage 2022-11-07 15:05:31 UTC
Approved.  Thank you!
Comment 2 commit-hook freebsd_committer freebsd_triage 2022-11-07 15:34:02 UTC
A commit in branch main references this bug:

URL: https://cgit.FreeBSD.org/ports/commit/?id=271b349b390a6036d501ed3d27c0189ff3d43e47

commit 271b349b390a6036d501ed3d27c0189ff3d43e47
Author:     Cy Schubert <cy@FreeBSD.org>
AuthorDate: 2022-11-07 14:18:09 +0000
Commit:     Cy Schubert <cy@FreeBSD.org>
CommitDate: 2022-11-07 15:33:45 +0000

    security/sudo: Update to 1.9.12p1

    This release includes fixes to minor bugs, including a fix for
    CVE-2022-43995, a non-exploitable potential out-of-bounds write on
    systems that do not use PAM, AIX authentication or BSD authentication.

    PR:             267617
    Approved by:    garga (Maintainer)
    MFH:            2022Q4
    Security:       CVE-2022-43995

 security/sudo/Makefile | 2 +-
 security/sudo/distinfo | 6 +++---
 2 files changed, 4 insertions(+), 4 deletions(-)
Comment 3 Kubilay Kocak freebsd_committer freebsd_triage 2022-11-07 22:27:04 UTC
^Triage: 

- [tags] in Summary are deprecated
- Re-open pending MFH
- Doesn't look like VuXML entry has been added yet
- Assign to committer resolving
Comment 4 commit-hook freebsd_committer freebsd_triage 2022-11-08 00:05:28 UTC
A commit in branch 2022Q4 references this bug:

URL: https://cgit.FreeBSD.org/ports/commit/?id=4d74603950cae23c69d9e07c27effa093b9b58a5

commit 4d74603950cae23c69d9e07c27effa093b9b58a5
Author:     Cy Schubert <cy@FreeBSD.org>
AuthorDate: 2022-11-07 14:18:09 +0000
Commit:     Cy Schubert <cy@FreeBSD.org>
CommitDate: 2022-11-08 00:04:06 +0000

    security/sudo: Update to 1.9.12p1

    This release includes fixes to minor bugs, including a fix for
    CVE-2022-43995, a non-exploitable potential out-of-bounds write on
    systems that do not use PAM, AIX authentication or BSD authentication.

    PR:             267617
    Approved by:    garga (Maintainer)
    Security:       CVE-2022-43995

    (cherry picked from commit 271b349b390a6036d501ed3d27c0189ff3d43e47)

 security/sudo/Makefile | 2 +-
 security/sudo/distinfo | 6 +++---
 2 files changed, 4 insertions(+), 4 deletions(-)
Comment 5 commit-hook freebsd_committer freebsd_triage 2022-11-08 00:19:30 UTC
A commit in branch main references this bug:

URL: https://cgit.FreeBSD.org/ports/commit/?id=3cd785707f9dc7b53396ecfd729d1fba07c3ca04

commit 3cd785707f9dc7b53396ecfd729d1fba07c3ca04
Author:     Cy Schubert <cy@FreeBSD.org>
AuthorDate: 2022-11-08 00:16:07 +0000
Commit:     Cy Schubert <cy@FreeBSD.org>
CommitDate: 2022-11-08 00:18:23 +0000

    security/vuxml: Document sudo CVE-2022-43995

    Document a potential out-of-bounds write for passwords smaller than
    eight bytes when crypt() is used.

    PR:             267617
    Security:       CVE-2022-43995

 security/vuxml/vuln-2022.xml | 32 ++++++++++++++++++++++++++++++++
 1 file changed, 32 insertions(+)
Comment 6 Cy Schubert freebsd_committer freebsd_triage 2022-11-08 22:52:43 UTC
Committed and merged to quarterly. Added vuxml.