@@ -14,10 +14,13 @@ These CVEs/advisories are possibly relevant to sudo-rs:
14
14
| - [ ^ rust ] | | https://www.sudo.ws/security/advisories/heap_corruption/ |
15
15
| CVE-2002 -0184 [ ^ rust ] | | https://www.sudo.ws/security/advisories/prompt/ |
16
16
| CVE-2004 -1051 [ ^ 4 ] | | https://www.sudo.ws/security/advisories/bash_functions/ |
17
+ | CVE-2004 -1689 [ ^ 22 ] | | https://www.sudo.ws/security/advisories/sudoedit/ |
17
18
| CVE-2005 -1119 [ ^ 5 ] | | Corrupt arbitrary files via a symlink attack |
18
19
| CVE-2005 -1993 [ ^ 6 ] | | https://www.sudo.ws/security/advisories/path_race/ |
19
20
| CVE-2005 -4890 [ ^ 7 ] | | TTY hijacking when a privileged user uses sudo to run unprivileged commands |
20
21
| - [ ^ 9 ] | | https://www.sudo.ws/security/advisories/cmnd_alias_negation/ |
22
+ | CVE-2010 -0426 [ ^ 23 ] | | https://www.sudo.ws/security/advisories/sudoedit_escalate/ |
23
+ | CVE-2010 -1163 [ ^ 23 ] | | https://www.sudo.ws/security/advisories/sudoedit_escalate2/ |
21
24
| CVE-2010 -1646 [ ^ 10 ] | | https://www.sudo.ws/security/advisories/secure_path/ |
22
25
| CVE-2010 -2956 [ ^ 11 ] | | https://www.sudo.ws/security/advisories/runas_group/ |
23
26
| CVE-2011 -0010 [ ^ 12 ] | | https://www.sudo.ws/security/advisories/runas_group_pw/ |
@@ -27,11 +30,15 @@ These CVEs/advisories are possibly relevant to sudo-rs:
27
30
| CVE-2013 -2776 [ ^ 15 ] | | https://www.sudo.ws/security/advisories/tty_tickets/ |
28
31
| CVE-2013 -2777 [ ^ 15 ] | | https://www.sudo.ws/security/advisories/tty_tickets/ |
29
32
| CVE-2014 -9680 [ ^ 16 ] | | https://www.sudo.ws/security/advisories/tz/ |
33
+ | CVE-2015 -5602 [ ^ 24 ] | | https://bugzilla.sudo.ws/show_bug.cgi?id=707 |
30
34
| CVE-2016 -7032 [ ^ 17 ] | | https://www.sudo.ws/security/advisories/noexec_bypass/ |
31
35
| CVE-2016 -7076 [ ^ 17 ] | | https://www.sudo.ws/security/advisories/noexec_wordexp/ |
32
36
| CVE-2017 -1000367 [ ^ 18 ] | | https://www.sudo.ws/security/advisories/linux_tty/ |
33
37
| CVE-2017 -1000368 [ ^ 18 ] | | https://www.sudo.ws/security/advisories/linux_tty/ |
34
38
| CVE-2019 -18634 [ ^ rust ] | | https://www.sudo.ws/security/advisories/pwfeedback/ |
39
+ | CVE-2021 -3156 [ ^ 21 ] | | https://www.sudo.ws/security/advisories/unescape_overflow/ |
40
+ | CVE-2021 -23239 [ ^ 25 ] | | https://www.sudo.ws/releases/stable/#1.9.5 |
41
+ | CVE-2023 -22809 [ ^ 20 ] | | https://www.sudo.ws/security/advisories/sudoedit_any/ |
35
42
| CVE-2023 -28486 [ ^ 19 ] | | Syslog messages do not escape control characters |
36
43
37
44
[ ^ 1 ] : All our path checks should only ever be done with absolute paths
@@ -55,6 +62,13 @@ These CVEs/advisories are possibly relevant to sudo-rs:
55
62
[ ^ 17 ] : Sudo-rs uses seccomp filtering rather than libc function interception through LD_PRELOAD.
56
63
[ ^ 18 ] : -
57
64
[ ^ 19 ] : -
65
+ [ ^ 20 ] : Sudo-rs doesn't use a "stringly typed" interface between the execution and policy modules.
66
+ [ ^ 21 ] : Rust memory safety should prevent this, sudo-rs doesn't allow ` -s ` and ` -e ` to be combined, and sudo-rs
67
+ doesn't "unescape" program arguments in the sudoers module
68
+ [ ^ 22 ] : Sudo-rs uses sockets to communicate between the root process and the child process running the editor
69
+ [ ^ 23 ] : Sudo-rs matched commands based on (canonicalized and resolved) path names, so ` sudoedit ` never matches.
70
+ [ ^ 24 ] : Sudo-rs doesn't allow wildcards or symlinks in configuration arguments to sudoedit.
71
+ [ ^ 25 ] : TODO (#1187 )
58
72
59
73
## Non-applicable CVEs
60
74
@@ -67,26 +81,19 @@ relevant at that time.
67
81
| CVE | Reason |
68
82
| -------------- | ----------------------------------------------------------------------------------------------------------- |
69
83
| CVE-2002 -0043 | mail functionality is not implemented, https://www.sudo.ws/security/advisories/postfix/ |
70
- | CVE-2004 -1689 | ` sudoedit ` /` sudo -e ` is not implemented, https://www.sudo.ws/security/advisories/sudoedit/ |
71
84
| CVE-2005 -2959 | env_reset is always enabled / blacklist is not supported, https://www.sudo.ws/security/advisories/bash_env/ |
72
85
| CVE-2005 -4158 | env_reset is always enabled / blacklist is not supported, https://www.sudo.ws/security/advisories/perl_env/ |
73
86
| CVE-2006 -0151 | env_reset is always enabled / blacklist is not supported |
74
87
| CVE-2007 -3149 | Kerberos functionality is not implemented, https://www.sudo.ws/security/advisories/kerberos5/ |
75
88
| CVE-2009 -0034 | The group matching logic does not have this bug, https://www.sudo.ws/security/advisories/group_vector/ |
76
- | CVE-2010 -0426 | ` sudoedit ` /` sudo -e ` is not implemented, https://www.sudo.ws/security/advisories/sudoedit_escalate/ |
77
89
| CVE-2010 -0427 | runas_default is not implemented |
78
- | CVE-2010 -1163 | ` sudoedit ` /` sudo -e ` is not implemented, https://www.sudo.ws/security/advisories/sudoedit_escalate2/ |
79
90
| CVE-2012 -2337 | No host ip-based rule matching is currently implemented, https://www.sudo.ws/security/advisories/netmask/ |
80
91
| CVE-2012 -3440 | Related to Red Hat specific script and not sudo directly |
81
92
| CVE-2014 -0106 | Disabling env_reset is not supported, https://www.sudo.ws/security/advisories/env_add/ |
82
- | CVE-2015 -5602 | ` sudoedit ` /` sudo -e ` is not implemented |
83
93
| CVE-2015 -8239 | The sha2 digest feature is not implemented |
84
94
| CVE-2019 -14287 | This bug is not present, https://www.sudo.ws/security/advisories/minus_1_uid/ |
85
- | CVE-2021 -3156 | ` sudoedit ` /` sudo -e ` is not implemented, https://www.sudo.ws/security/advisories/unescape_overflow/ |
86
- | CVE-2021 -23239 | ` sudoedit ` /` sudo -e ` is not implemented |
87
- | CVE-2021 -23240 | ` sudoedit ` /` sudo -e ` is not implemented, https://www.sudo.ws/security/advisories/sudoedit_selinux/ |
95
+ | CVE-2021 -23240 | sudo-rs does not have SELinux support, https://www.sudo.ws/security/advisories/sudoedit_selinux/ |
88
96
| CVE-2022 -43995 | crypt/password backend is not implemented, only PAM |
89
- | CVE-2023 -22809 | ` sudoedit ` /` sudo -e ` is not implemented, https://www.sudo.ws/security/advisories/sudoedit_any/ |
90
97
| CVE-2023 -27320 | The chroot functionality is not implemented, https://www.sudo.ws/security/advisories/double_free/ |
91
98
| CVE-2023 -28487 | Sudoreplay is not implemented |
92
99
0 commit comments