CVE-2022-29527
https://notcve.org/view.php?id=CVE-2022-29527
Amazon AWS amazon-ssm-agent before 3.1.1208.0 creates a world-writable sudoers file, which allows local attackers to inject Sudo rules and escalate privileges to root. This occurs in certain situations involving a race condition. Amazon AWS amazon-ssm-agent versiones anteriores a 3.1.1208.0, crea un archivo sudoers escribible en todo el mundo, lo que permite a los atacantes locales inyectar reglas Sudo y escalar privilegios a root. Esto ocurre en determinadas situaciones que implican una condición de carrera • https://bugzilla.suse.com/show_bug.cgi?id=1196556 https://github.com/aws/amazon-ssm-agent/commit/0fe8ae99b2ff25649c7b86d3bc05fc037400aca7 https://github.com/aws/amazon-ssm-agent/releases/tag/3.1.1208.0 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-732: Incorrect Permission Assignment for Critical Resource •