summaryrefslogtreecommitdiffstats
path: root/meta/recipes-extended/sudo/files/CVE-2025-32462.patch
diff options
context:
space:
mode:
Diffstat (limited to 'meta/recipes-extended/sudo/files/CVE-2025-32462.patch')
-rw-r--r--meta/recipes-extended/sudo/files/CVE-2025-32462.patch42
1 files changed, 0 insertions, 42 deletions
diff --git a/meta/recipes-extended/sudo/files/CVE-2025-32462.patch b/meta/recipes-extended/sudo/files/CVE-2025-32462.patch
deleted file mode 100644
index 04610d40fd..0000000000
--- a/meta/recipes-extended/sudo/files/CVE-2025-32462.patch
+++ /dev/null
@@ -1,42 +0,0 @@
1From d530367828e3713d09489872743eb92d31fb11ff Mon Sep 17 00:00:00 2001
2From: "Todd C. Miller" <Todd.Miller@sudo.ws>
3Date: Tue, 1 Apr 2025 09:24:51 -0600
4Subject: [PATCH] Only allow a remote host to be specified when listing
5 privileges.
6
7This fixes a bug where a user with sudoers privileges on a different
8host could execute a command on the local host, even if the sudoers
9file would not otherwise allow this. CVE-2025-32462
10
11Reported by Rich Mirch @ Stratascale Cyber Research Unit (CRU).
12
13Upstream-Status: Backport [https://github.com/sudo-project/sudo/commit/d530367828e3713d09489872743eb92d31fb11ff]
14CVE: CVE-2025-32462
15Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
16---
17 plugins/sudoers/sudoers.c | 12 ++++++++++++
18 1 file changed, 12 insertions(+)
19
20diff --git a/plugins/sudoers/sudoers.c b/plugins/sudoers/sudoers.c
21index 70a0c1a528..ad2fa2f61c 100644
22--- a/plugins/sudoers/sudoers.c
23+++ b/plugins/sudoers/sudoers.c
24@@ -350,6 +350,18 @@ sudoers_check_common(struct sudoers_context *ctx, int pwflag)
25 time_t now;
26 debug_decl(sudoers_check_common, SUDOERS_DEBUG_PLUGIN);
27
28+ /* The user may only specify a host for "sudo -l". */
29+ if (!ISSET(ctx->mode, MODE_LIST|MODE_CHECK)) {
30+ if (strcmp(ctx->runas.host, ctx->user.host) != 0) {
31+ log_warningx(ctx, SLOG_NO_STDERR|SLOG_AUDIT,
32+ N_("user not allowed to set remote host for command"));
33+ sudo_warnx("%s",
34+ U_("a remote host may only be specified when listing privileges."));
35+ ret = false;
36+ goto done;
37+ }
38+ }
39+
40 /* If given the -P option, set the "preserve_groups" flag. */
41 if (ISSET(ctx->mode, MODE_PRESERVE_GROUPS))
42 def_preserve_groups = true;