Package "sudo"

Name: sudo


Provide limited super user privileges to specific users

Latest version: 1.8.31-1ubuntu1.2
Release: focal (20.04)
Level: updates
Repository: main
Homepage: http://www.sudo.ws/


Download "sudo"

Other versions of "sudo" in Focal

Repository Area Version
base main 1.8.31-1ubuntu1
base universe 1.8.31-1ubuntu1
security main 1.8.31-1ubuntu1.2
security universe 1.8.31-1ubuntu1.2
updates universe 1.8.31-1ubuntu1.2


Version: 1.8.31-1ubuntu1.2 2021-01-26 21:06:23 UTC

  sudo (1.8.31-1ubuntu1.2) focal-security; urgency=medium

  * SECURITY UPDATE: dir existence issue via sudoedit race
    - debian/patches/CVE-2021-23239.patch: fix potential directory existing
      info leak in sudoedit in src/sudo_edit.c.
    - CVE-2021-23239
  * SECURITY UPDATE: heap-based buffer overflow
    - debian/patches/CVE-2021-3156-pre1.patch: sanity check size when
      converting the first record to TS_LOCKEXCL in
    - debian/patches/CVE-2021-3156-1.patch: reset valid_flags to
      MODE_NONINTERACTIVE for sudoedit in src/parse_args.c.
    - debian/patches/CVE-2021-3156-2.patch: add sudoedit flag checks in
      plugin in plugins/sudoers/policy.c.
    - debian/patches/CVE-2021-3156-3.patch: fix potential buffer overflow
      when unescaping backslashes in plugins/sudoers/sudoers.c.
    - debian/patches/CVE-2021-3156-4.patch: fix the memset offset when
      converting a v1 timestamp to TS_LOCKEXCL in
    - debian/patches/CVE-2021-3156-5.patch: don't assume that argv is
      allocated as a single flat buffer in src/parse_args.c.
    - CVE-2021-3156

 -- Marc Deslauriers <email address hidden> Tue, 19 Jan 2021 09:21:02 -0500

Source diff to previous version
CVE-2021-23239 The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_ed
CVE-2021-3156 Heap-based buffer overflow

Version: 1.8.31-1ubuntu1.1 2020-08-10 12:07:01 UTC

  sudo (1.8.31-1ubuntu1.1) focal; urgency=medium

  * d/p/ignore-rlimit-core-failure.patch: Ignore a failure to restore the
    RLIMIT_CORE resource limit. Linux containers don't allow RLIMIT_CORE
    to be set back to RLIM_INFINITY if we set the limit to zero, even for
    root. RLIMIT_NPROC is also not allowed to be set back. This is not a
    problem outside the container.
    (LP: #1857036)

 -- Bryce Harrington <email address hidden> Wed, 15 Jul 2020 00:17:58 +0000

1857036 `sudo --login --user USERNAME` throws `setrlimit(RLIMIT_CORE): Operation not permitted` error when run inside a container.

About   -   Send Feedback to @ubuntu_updates