Vulnerable are sudo versions from 1.9.14 to 1.9.17 (possibly more). On my tumbleweed installation I have version 1.9.16 after the latest update, this is relevant.
Leap 15.6 inherits updates from SUSE and SUSE gets notified before embargo is lifted and so has time to prepare the update before vulnerability is published.
andrei@tumbleweed:~> zypper se sudo-policy
Loading repository data...
Reading installed packages...
S | Name | Summary | Type
---+-----------------------------+----------------------------------------------------+--------
| sudo-policy-sudo-auth-self | Users in the sudo group can authenticate as admin | package
| sudo-policy-wheel-auth-self | Users in the wheel group can authenticate as admin | package
andrei@tumbleweed:~>
No … pretty sure it was fixed a month ago … that one has to do with pam and overriding env variables … totally different from sudo escalation and timer attacks
It will be published in one of the next Tumbleweed snapshots after they pass openQA tests.
If you have good arguments why it should be published immediately - there is Tumbleweed Update channel that bypasses openQA. You may consider raising this question on factory mailing list.
With today’s upgrade in tumbleweed I have got sudo version 1.9.17p1.
From the above mentioned request I take that that is the version that fixes the security issue. That should close the case.
Is that right ?