Package "sudo"

Name: sudo


This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Provide limited super user privileges to specific users

Latest version: 1.8.21p2-3ubuntu1.3
Release: bionic (18.04)
Level: updates
Repository: universe


Other versions of "sudo" in Bionic

Repository Area Version
base main 1.8.21p2-3ubuntu1
base universe 1.8.21p2-3ubuntu1
security universe 1.8.21p2-3ubuntu1.2
security main 1.8.21p2-3ubuntu1.2
updates main 1.8.21p2-3ubuntu1.3

Packages in group

Deleted packages are displayed in grey.


Version: 1.8.21p2-3ubuntu1.3 2020-10-26 13:07:12 UTC

  sudo (1.8.21p2-3ubuntu1.3) bionic; urgency=medium

  * d/p/0001-In-pty_close-close-the-slave-and-remove-any-events-a.patch:
    - fix sudo hangs when IO logging is enabled (LP: #1895757)

 -- Heitor Alves de Siqueira <email address hidden> Wed, 23 Sep 2020 14:59:35 +0000

Source diff to previous version
1895757 Terminal hangs running sudo when \

Version: 1.8.21p2-3ubuntu1.2 2020-02-03 15:07:13 UTC

  sudo (1.8.21p2-3ubuntu1.2) bionic-security; urgency=medium

  * SECURITY UPDATE: buffer overflow in sudo when pwfeedback is enabled
    - debian/patches/CVE-2019-18634.patch: fix overflow in src/tgetpass.c.
    - CVE-2019-18634

 -- Marc Deslauriers <email address hidden> Fri, 31 Jan 2020 12:18:41 -0500

Source diff to previous version
CVE-2019-18634 In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwf

Version: 1.8.21p2-3ubuntu1.1 2019-10-14 17:07:16 UTC

  sudo (1.8.21p2-3ubuntu1.1) bionic-security; urgency=medium

  * SECURITY UPDATE: privilege escalation via UID -1
    - debian/patches/CVE-2019-14287.patch: treat an ID of -1 as invalid
      in lib/util/strtoid.c.
    - CVE-2019-14287
    - debian/patches/CVE-2019-14287-2.patch: fix and add to tests in
    - CVE-2019-14287

 -- Marc Deslauriers <email address hidden> Thu, 10 Oct 2019 14:32:59 -0400

CVE-2019-14287 Potential bypass of Runas user restrictions

About   -   Send Feedback to @ubuntu_updates