MGASA-2020-0246

Source
https://advisories.mageia.org/MGASA-2020-0246.html
Import Source
https://advisories.mageia.org/MGASA-2020-0246.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2020-0246
Upstream
  • CVE-2019-19233
Published
2020-06-10T22:26:12Z
Modified
2026-04-16T04:42:08.972772512Z
Summary
Updated sudo packages fix security vulnerability
Details

Updated sudo packages fix security vulnerabilities:

It was found that sudo always allowed commands to be run with unknown user or group ids if the sudo configuration allowed it for example via the "ALL" alias. This could allow sudo to impersonate non-existent account and depending on how applications are configured, could lead to certain restriction bypass. This is now explicitly disabled. A new setting called "allowunknownrunas_id" was introduced in order to enable this (CVE-2019-19232).

When an account is disabled via the shadow file, by replacing the password hash with "!", it is not considered disabled by sudo. And depending on the configuration, sudo can be run by using such disabled account (CVE-2019-19234).

The sudo package has been updated to version 1.8.31p1, fixing these issues and other bugs.

References
Credits

Affected packages

Mageia:7 / sudo

Package

Name
sudo
Purl
pkg:rpm/mageia/sudo?arch=source&distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.31p1-1.1.mga7

Ecosystem specific

{
    "section": "core"
}

Database specific

source
"https://advisories.mageia.org/MGASA-2020-0246.json"