Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1453074 - (CVE-2017-1000367) CVE-2017-1000367 sudo: Privilege escalation in via improper get_process_ttyname() parsing
CVE-2017-1000367 sudo: Privilege escalation in via improper get_process_ttyna...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
impact=important,public=20170530,repo...
: Security
Depends On: 1455198 1455399 1455400 1455401 1455402 1456237 1456884
Blocks: 1449010
  Show dependency treegraph
 
Reported: 2017-05-22 01:54 EDT by Huzaifa S. Sidhpurwala
Modified: 2018-07-15 17:31 EDT (History)
15 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the way sudo parsed tty information from the process status file in the proc filesystem. A local user with privileges to execute commands via sudo could use this flaw to escalate their privileges to root.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
sudo patch (2.08 KB, patch)
2017-05-24 23:40 EDT, Huzaifa S. Sidhpurwala
no flags Details | Diff
proposed rhel-7.3.z patch (990 bytes, text/plain)
2017-05-25 04:29 EDT, Jakub Jelen
no flags Details
Isolated reproducer with commented out old code (copied code from sudo-1.8.6) (1.18 KB, text/plain)
2017-05-25 04:49 EDT, Jakub Jelen
no flags Details


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:1381 normal SHIPPED_LIVE Important: sudo security update 2017-05-30 17:02:16 EDT
Red Hat Product Errata RHSA-2017:1382 normal SHIPPED_LIVE Important: sudo security update 2017-05-30 19:33:40 EDT

  None (edit)
Description Huzaifa S. Sidhpurwala 2017-05-22 01:54:32 EDT
A flaw was found in the way sudo read the device number of the tty from field 7 (tty_nr) from "/proc/[pid]/stat". A local attacker could use this flaw to escalate his privilege to root.
Comment 1 Huzaifa S. Sidhpurwala 2017-05-22 01:54:36 EDT
Acknowledgments:

Name: Qualys Security
Comment 6 Huzaifa S. Sidhpurwala 2017-05-24 23:40 EDT
Created attachment 1282109 [details]
sudo patch
Comment 9 Jakub Jelen 2017-05-25 04:29 EDT
Created attachment 1282148 [details]
proposed rhel-7.3.z patch
Comment 10 Jakub Jelen 2017-05-25 04:49 EDT
Created attachment 1282158 [details]
Isolated reproducer with commented out old code (copied code from sudo-1.8.6)

The same patch applies to rhel-6.10 and rhel-6.9.
Comment 13 Andrej Nemec 2017-05-30 11:31:20 EDT
Created sudo tracking bugs for this issue:

Affects: fedora-all [bug 1456884]
Comment 15 Andrej Nemec 2017-05-30 11:36:00 EDT
References:

http://seclists.org/oss-sec/2017/q2/358
Comment 16 errata-xmlrpc 2017-05-30 13:06:21 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 5 Extended Lifecycle Support

Via RHSA-2017:1381 https://access.redhat.com/errata/RHSA-2017:1381
Comment 18 errata-xmlrpc 2017-05-30 15:34:07 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7
  Red Hat Enterprise Linux 6

Via RHSA-2017:1382 https://access.redhat.com/errata/RHSA-2017:1382

Note You need to log in before you can comment on or make changes to this bug.