Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: sudo-rs

Found 2 matching suggestions

Dismissed
updated 2 days, 6 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse dismissed
sudo-rs doesn't record authenticating user properly in timestamp

sudo-rs is a memory safe implementation of sudo and su written in Rust. With `Defaults targetpw` (or `Defaults rootpw`) enabled, the password of the target account (or root account) instead of the invoking user is used for authentication. sudo-rs starting in version 0.2.5 and prior to version 0.2.10 incorrectly recorded the invoking user’s UID instead of the authenticated-as user's UID in the authentication timestamp. Any later `sudo` invocation on the same terminal while the timestamp was still valid would use that timestamp, potentially bypassing new authentication even if the policy would have required it. A highly-privileged user (able to run commands as other users, or as root, through sudo) who knows one password of an account they are allowed to run commands as, would be able to run commands as any other account the policy permits them to run commands for, even if they don't know the password for those accounts. A common instance of this would be that a user can still use their own password to run commands as root (the default behaviour of `sudo`), effectively negating the intended behaviour of the `targetpw` or `rootpw` options. Version 0.2.10 contains a patch for the issue. Versions prior to 0.2.5 are not affected, since they do not offer `Defaults targetpw` or `Defaults rootpw`.

Affected products

sudo-rs
  • ==>= 0.2.5, < 0.2.10

Matching in nixpkgs

Package maintainers

Current stable branch was never impacted.

https://github.com/NixOS/nixpkgs/commit/225394441f7dcade956f76bcd114fb4144602794
Untriaged
created 4 months, 3 weeks ago
Sudo: improper handling of ipa_hostname leads to privilege mismanagement

A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.

Affected products

sudo
  • ==1.8.28
freeipa

Matching in nixpkgs

pkgs.sudo

Command to run commands as root

pkgs.qsudo

Graphical sudo utility from Project Trident

pkgs.freeipa

Identity, Policy and Audit system

  • nixos-unstable -

pkgs.sudo-rs

Memory safe implementation of sudo and su

  • nixos-unstable -

pkgs.psudohash

Password list generator for orchestrating brute force attacks and cracking hashes

  • nixos-unstable -

pkgs.sudo-font

Font for programmers and command line users

  • nixos-unstable -

pkgs.gnome-sudoku

Test your logic skills in this number grid puzzle

  • nixos-unstable -

pkgs.doas-sudo-shim

Shim for the sudo command that utilizes doas

  • nixos-unstable -