Source: sudo
Version: 1.9.17p2-4
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi

As explained in
https://cdn2.qualys.com/advisory/2026/03/10/crack-armor.txt a
fail-open suituation in sudo was possible to be exploited for a LPE,
when the setuid capability was denied fo sudo via a loaded new
AppArmor profile, preventing sudo from pdropping its root privileges
before executing /usr/sbin/sendmail.

As this uncvered this bug in sudo as well, filling this bug for
tracking the issue.

Upstream fix:
https://github.com/sudo-project/sudo/commit/3e474c2

Regards,
Salvatore

Reply via email to