Package "sudo"
Name: |
sudo
|
Description: |
Provide limited super user privileges to specific users
|
Latest version: |
1.8.31-1ubuntu1.5 |
Release: |
focal (20.04) |
Level: |
updates |
Repository: |
main |
Homepage: |
http://www.sudo.ws/ |
Links
Download "sudo"
Other versions of "sudo" in Focal
Changelog
sudo (1.8.31-1ubuntu1.5) focal-security; urgency=medium
* SECURITY UPDATE: does not escape control characters
- debian/patches/CVE-2023-2848x-1.patch: escape control characters in
log messages and sudoreplay output in docs/sudoers.man.in,
docs/sudoers.mdoc.in, docs/sudoreplay.man.in,
docs/sudoreplay.mdoc.in, include/sudo_compat.h, include/sudo_lbuf.h,
lib/util/lbuf.c, lib/util/util.exp.in, plugins/sudoers/logging.c,
plugins/sudoers/sudoreplay.c.
- debian/patches/CVE-2023-2848x-2.patch: fix regression in
plugins/sudoers/logging.c.
- CVE-2023-28486
- CVE-2023-28487
-- Marc Deslauriers <email address hidden> Tue, 04 Apr 2023 07:56:28 -0400
|
Source diff to previous version |
CVE-2023-28486 |
Sudo before 1.9.13 does not escape control characters in log messages. |
CVE-2023-28487 |
Sudo before 1.9.13 does not escape control characters in sudoreplay output. |
|
sudo (1.8.31-1ubuntu1.4) focal-security; urgency=medium
* SECURITY UPDATE: arbitrary file overwrite via sudoedit
- debian/patches/CVE-2023-22809.patch: do not permit editor arguments
to include -- in plugins/sudoers/editor.c, plugins/sudoers/sudoers.c,
plugins/sudoers/visudo.c.
- CVE-2023-22809
-- Marc Deslauriers <email address hidden> Mon, 16 Jan 2023 08:06:24 -0500
|
Source diff to previous version |
sudo (1.8.31-1ubuntu1.2) focal-security; urgency=medium
* SECURITY UPDATE: dir existence issue via sudoedit race
- debian/patches/CVE-2021-23239.patch: fix potential directory existing
info leak in sudoedit in src/sudo_edit.c.
- CVE-2021-23239
* SECURITY UPDATE: heap-based buffer overflow
- debian/patches/CVE-2021-3156-pre1.patch: sanity check size when
converting the first record to TS_LOCKEXCL in
plugins/sudoers/timestamp.c.
- debian/patches/CVE-2021-3156-1.patch: reset valid_flags to
MODE_NONINTERACTIVE for sudoedit in src/parse_args.c.
- debian/patches/CVE-2021-3156-2.patch: add sudoedit flag checks in
plugin in plugins/sudoers/policy.c.
- debian/patches/CVE-2021-3156-3.patch: fix potential buffer overflow
when unescaping backslashes in plugins/sudoers/sudoers.c.
- debian/patches/CVE-2021-3156-4.patch: fix the memset offset when
converting a v1 timestamp to TS_LOCKEXCL in
plugins/sudoers/timestamp.c.
- debian/patches/CVE-2021-3156-5.patch: don't assume that argv is
allocated as a single flat buffer in src/parse_args.c.
- CVE-2021-3156
-- Marc Deslauriers <email address hidden> Tue, 19 Jan 2021 09:21:02 -0500
|
Source diff to previous version |
CVE-2021-23239 |
The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_ed |
CVE-2021-3156 |
Heap-based buffer overflow |
|
sudo (1.8.31-1ubuntu1.1) focal; urgency=medium
* d/p/ignore-rlimit-core-failure.patch: Ignore a failure to restore the
RLIMIT_CORE resource limit. Linux containers don't allow RLIMIT_CORE
to be set back to RLIM_INFINITY if we set the limit to zero, even for
root. RLIMIT_NPROC is also not allowed to be set back. This is not a
problem outside the container.
(LP: #1857036)
-- Bryce Harrington <email address hidden> Wed, 15 Jul 2020 00:17:58 +0000
|
1857036 |
`sudo --login --user USERNAME` throws `setrlimit(RLIMIT_CORE): Operation not permitted` error when run inside a container. |
|
About
-
Send Feedback to @ubuntu_updates