Skip to content

Update CVE list with Sudoedit-related CVE's #1188

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Draft
wants to merge 1 commit into
base: main
Choose a base branch
from
Draft

Conversation

squell
Copy link
Member

@squell squell commented Jul 8, 2025

This moves CVE's that were listed as "non applicable" to the "applicable" category. One CVE remains inapplicable, for a few others we are already not vulnerable (simply by having a different architecture). Two remain on our radar.

Issues that need to be closed before this can become non-draft: #1186, #1187

@squell squell added this to the Sudoedit milestone Jul 8, 2025
@squell squell added the documentation Improvements or additions to documentation label Jul 8, 2025
docs/sudo-cve.md Outdated
[^20]: Sudo-rs doesn't use a "stringly typed" interface between the execution and policy modules.
[^21]: Rust memory safety should prevent this, sudo-rs doesn't allow `-s` and `-e` to be combined, and sudo-rs
doesn't "unescape" program arguments in the sudoers module
[^22]: Sudo-rs uses pipes to communicate between the root process and the child process running the editor
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The thing that matters here is that the child process is unprivileged. Also technically I used a unix socket rather than a pipe as only the former has a safe api in the standard library that is available on our MSRV.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Feel free to add a commit to this PR rephrasing that footnote

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think that for the mentioned CVE the privileged/unprivileged nature of the child process is really relevant, by the way.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This CVE wouldn't have been possible if the code reading the edited file back was unprivileged.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Right, I was focussing on the original file, not the temporary one.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
documentation Improvements or additions to documentation
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants