UbuntuUpdates.org

Package "sudo"

Name: sudo

Description:

Provide limited super user privileges to specific users

Latest version: 1.8.21p2-3ubuntu1.4
Release: bionic (18.04)
Level: security
Repository: main
Homepage: http://www.sudo.ws/

Links


Download "sudo"


Other versions of "sudo" in Bionic

Repository Area Version
base main 1.8.21p2-3ubuntu1
base universe 1.8.21p2-3ubuntu1
security universe 1.8.21p2-3ubuntu1.4
updates main 1.8.21p2-3ubuntu1.4
updates universe 1.8.21p2-3ubuntu1.4

Changelog

Version: 1.8.21p2-3ubuntu1.4 2021-01-26 20:06:36 UTC

  sudo (1.8.21p2-3ubuntu1.4) bionic-security; urgency=medium

  * SECURITY UPDATE: dir existence issue via sudoedit race
    - debian/patches/CVE-2021-23239.patch: fix potential directory existing
      info leak in sudoedit in src/sudo_edit.c.
    - CVE-2021-23239
  * SECURITY UPDATE: heap-based buffer overflow
    - debian/patches/CVE-2021-3156-pre1.patch: check lock record size in
      plugins/sudoers/timestamp.c.
    - debian/patches/CVE-2021-3156-pre2.patch: sanity check size when
      converting the first record to TS_LOCKEXCL in
      plugins/sudoers/timestamp.c.
    - debian/patches/CVE-2021-3156-1.patch: reset valid_flags to
      MODE_NONINTERACTIVE for sudoedit in src/parse_args.c.
    - debian/patches/CVE-2021-3156-2.patch: add sudoedit flag checks in
      plugin in plugins/sudoers/policy.c.
    - debian/patches/CVE-2021-3156-3.patch: fix potential buffer overflow
      when unescaping backslashes in plugins/sudoers/sudoers.c.
    - debian/patches/CVE-2021-3156-4.patch: fix the memset offset when
      converting a v1 timestamp to TS_LOCKEXCL in
      plugins/sudoers/timestamp.c.
    - debian/patches/CVE-2021-3156-5.patch: don't assume that argv is
      allocated as a single flat buffer in src/parse_args.c.
    - CVE-2021-3156
  * debian/control: added tzdata to Build-Depends so that the time zone
    data directory is present during builds.

 -- Marc Deslauriers <email address hidden> Tue, 19 Jan 2021 09:36:00 -0500

Source diff to previous version
CVE-2021-23239 The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_ed
CVE-2021-3156 Heap-based buffer overflow

Version: 1.8.21p2-3ubuntu1.2 2020-02-03 15:07:10 UTC

  sudo (1.8.21p2-3ubuntu1.2) bionic-security; urgency=medium

  * SECURITY UPDATE: buffer overflow in sudo when pwfeedback is enabled
    - debian/patches/CVE-2019-18634.patch: fix overflow in src/tgetpass.c.
    - CVE-2019-18634

 -- Marc Deslauriers <email address hidden> Fri, 31 Jan 2020 12:18:41 -0500

Source diff to previous version
CVE-2019-18634 In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwf

Version: 1.8.21p2-3ubuntu1.1 2019-10-14 17:07:12 UTC

  sudo (1.8.21p2-3ubuntu1.1) bionic-security; urgency=medium

  * SECURITY UPDATE: privilege escalation via UID -1
    - debian/patches/CVE-2019-14287.patch: treat an ID of -1 as invalid
      in lib/util/strtoid.c.
    - CVE-2019-14287
    - debian/patches/CVE-2019-14287-2.patch: fix and add to tests in
      lib/util/regress/atofoo/atofoo_test.c,
      plugins/sudoers/regress/testsudoers/test5.out.ok,
      plugins/sudoers/regress/testsudoers/test5.sh.
    - CVE-2019-14287

 -- Marc Deslauriers <email address hidden> Thu, 10 Oct 2019 14:32:59 -0400

CVE-2019-14287 Potential bypass of Runas user restrictions



About   -   Send Feedback to @ubuntu_updates