<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">sudo-1.9.7p2-1.4 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11413</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">sudo-1.9.7p2-1.4 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the sudo-1.9.7p2-1.4 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11413</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:11413</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2005-4158/</URL>
      <Description>SUSE CVE CVE-2005-4158 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9680/</URL>
      <Description>SUSE CVE CVE-2014-9680 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7032/</URL>
      <Description>SUSE CVE CVE-2016-7032 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7076/</URL>
      <Description>SUSE CVE CVE-2016-7076 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-1000367/</URL>
      <Description>SUSE CVE CVE-2017-1000367 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-1000368/</URL>
      <Description>SUSE CVE CVE-2017-1000368 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-14287/</URL>
      <Description>SUSE CVE CVE-2019-14287 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-18634/</URL>
      <Description>SUSE CVE CVE-2019-18634 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-23239/</URL>
      <Description>SUSE CVE CVE-2021-23239 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-23240/</URL>
      <Description>SUSE CVE CVE-2021-23240 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3156/</URL>
      <Description>SUSE CVE CVE-2021-3156 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="sudo-1.9.7p2-1.4">
      <FullProductName ProductID="sudo-1.9.7p2-1.4">sudo-1.9.7p2-1.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sudo-devel-1.9.7p2-1.4">
      <FullProductName ProductID="sudo-devel-1.9.7p2-1.4">sudo-devel-1.9.7p2-1.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sudo-plugin-python-1.9.7p2-1.4">
      <FullProductName ProductID="sudo-plugin-python-1.9.7p2-1.4">sudo-plugin-python-1.9.7p2-1.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sudo-test-1.9.7p2-1.4">
      <FullProductName ProductID="sudo-test-1.9.7p2-1.4">sudo-test-1.9.7p2-1.4</FullProductName>
    </Branch>
    <Relationship ProductReference="sudo-1.9.7p2-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:sudo-1.9.7p2-1.4">sudo-1.9.7p2-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="sudo-devel-1.9.7p2-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:sudo-devel-1.9.7p2-1.4">sudo-devel-1.9.7p2-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="sudo-plugin-python-1.9.7p2-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:sudo-plugin-python-1.9.7p2-1.4">sudo-plugin-python-1.9.7p2-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="sudo-test-1.9.7p2-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:sudo-test-1.9.7p2-1.4">sudo-test-1.9.7p2-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Sudo before 1.6.8 p12, when the Perl taint flag is off, does not clear the (1) PERLLIB, (2) PERL5LIB, and (3) PERL5OPT environment variables, which allows limited local users to cause a Perl script to include and execute arbitrary library files that have the same name as library files that are included by the script.</Note>
    </Notes>
    <CVE>CVE-2005-4158</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:sudo-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-devel-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-plugin-python-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-test-1.9.7p2-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2005-4158.html</URL>
        <Description>CVE-2005-4158</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/140300</URL>
        <Description>SUSE Bug 140300</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/145687</URL>
        <Description>SUSE Bug 145687</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/159599</URL>
        <Description>SUSE Bug 159599</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">sudo before 1.8.12 does not ensure that the TZ environment variable is associated with a zoneinfo file, which allows local users to open arbitrary files for read access (but not view file contents) by running a program within an sudo session, as demonstrated by interfering with terminal output, discarding kernel-log messages, or repositioning tape drives.</Note>
    </Notes>
    <CVE>CVE-2014-9680</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:sudo-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-devel-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-plugin-python-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-test-1.9.7p2-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.2</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9680.html</URL>
        <Description>CVE-2014-9680</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917806</URL>
        <Description>SUSE Bug 917806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/919737</URL>
        <Description>SUSE Bug 919737</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/921999</URL>
        <Description>SUSE Bug 921999</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/953359</URL>
        <Description>SUSE Bug 953359</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">sudo_noexec.so in Sudo before 1.8.15 on Linux might allow local users to bypass intended noexec command restrictions via an application that calls the (1) system or (2) popen function.</Note>
    </Notes>
    <CVE>CVE-2016-7032</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:sudo-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-devel-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-plugin-python-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-test-1.9.7p2-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.6</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7032.html</URL>
        <Description>CVE-2016-7032</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007501</URL>
        <Description>SUSE Bug 1007501</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007766</URL>
        <Description>SUSE Bug 1007766</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011975</URL>
        <Description>SUSE Bug 1011975</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011976</URL>
        <Description>SUSE Bug 1011976</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges.</Note>
    </Notes>
    <CVE>CVE-2016-7076</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:sudo-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-devel-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-plugin-python-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-test-1.9.7p2-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.6</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7076.html</URL>
        <Description>CVE-2016-7076</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007501</URL>
        <Description>SUSE Bug 1007501</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011975</URL>
        <Description>SUSE Bug 1011975</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011976</URL>
        <Description>SUSE Bug 1011976</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution.</Note>
    </Notes>
    <CVE>CVE-2017-1000367</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:sudo-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-devel-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-plugin-python-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-test-1.9.7p2-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-1000367.html</URL>
        <Description>CVE-2017-1000367</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007501</URL>
        <Description>SUSE Bug 1007501</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1039361</URL>
        <Description>SUSE Bug 1039361</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042146</URL>
        <Description>SUSE Bug 1042146</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077345</URL>
        <Description>SUSE Bug 1077345</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Todd Miller's sudo version 1.8.20p1 and earlier is vulnerable to an input validation (embedded newlines) in the get_process_ttyname() function resulting in information disclosure and command execution.</Note>
    </Notes>
    <CVE>CVE-2017-1000368</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:sudo-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-devel-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-plugin-python-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-test-1.9.7p2-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-1000368.html</URL>
        <Description>CVE-2017-1000368</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1039361</URL>
        <Description>SUSE Bug 1039361</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042146</URL>
        <Description>SUSE Bug 1042146</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1045986</URL>
        <Description>SUSE Bug 1045986</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.</Note>
    </Notes>
    <CVE>CVE-2019-14287</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:sudo-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-devel-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-plugin-python-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-test-1.9.7p2-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-14287.html</URL>
        <Description>CVE-2019-14287</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153674</URL>
        <Description>SUSE Bug 1153674</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156093</URL>
        <Description>SUSE Bug 1156093</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.</Note>
    </Notes>
    <CVE>CVE-2019-18634</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:sudo-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-devel-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-plugin-python-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-test-1.9.7p2-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-18634.html</URL>
        <Description>CVE-2019-18634</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162202</URL>
        <Description>SUSE Bug 1162202</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.</Note>
    </Notes>
    <CVE>CVE-2021-23239</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:sudo-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-devel-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-plugin-python-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-test-1.9.7p2-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-23239.html</URL>
        <Description>CVE-2021-23239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171722</URL>
        <Description>SUSE Bug 1171722</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180684</URL>
        <Description>SUSE Bug 1180684</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.</Note>
    </Notes>
    <CVE>CVE-2021-23240</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:sudo-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-devel-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-plugin-python-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-test-1.9.7p2-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-23240.html</URL>
        <Description>CVE-2021-23240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171722</URL>
        <Description>SUSE Bug 1171722</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180685</URL>
        <Description>SUSE Bug 1180685</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.</Note>
    </Notes>
    <CVE>CVE-2021-3156</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:sudo-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-devel-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-plugin-python-1.9.7p2-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:sudo-test-1.9.7p2-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3156.html</URL>
        <Description>CVE-2021-3156</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180684</URL>
        <Description>SUSE Bug 1180684</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181090</URL>
        <Description>SUSE Bug 1181090</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181506</URL>
        <Description>SUSE Bug 1181506</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181657</URL>
        <Description>SUSE Bug 1181657</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183936</URL>
        <Description>SUSE Bug 1183936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218863</URL>
        <Description>SUSE Bug 1218863</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225623</URL>
        <Description>SUSE Bug 1225623</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
