CVE-2019-18684

Priority
Description
** DISPUTED ** Sudo through 1.8.29 allows local users to escalate to root
if they have write access to file descriptor 3 of the sudo process. This
occurs because of a race condition between determining a uid, and the
setresuid and openat system calls. The attacker can write "ALL ALL=(ALL)
NOPASSWD:ALL" to /proc/#####/fd/3 at a time when Sudo is prompting for a
password. NOTE: This has been disputed due to the way Linux /proc works. It
has been argued that writing to /proc/#####/fd/3 would only be viable if
you had permission to write to /etc/sudoers. Even with write permission to
/proc/#####/fd/3, it would not help you write to /etc/sudoers.
Notes
mdeslaurthis probably isn't an issue and will be rejected by upstream
Package
Source: sudo (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):needs-triage
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 19.04 (Disco Dingo):needs-triage
Ubuntu 19.10 (Eoan Ermine):needs-triage
Ubuntu 20.04 (Focal Fossa):needs-triage
More Information

Updated: 2019-11-13 21:14:29 UTC (commit f874c2948abb729ad223375b3031252b8217a64a)