Search CVE reports


Toggle filters

11 – 20 of 54 results


CVE-2023-22809

Medium priority
Fixed

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the...

1 affected package

sudo

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
sudo Fixed Fixed Fixed
Show less packages

CVE-2022-43995

Medium priority
Not affected

Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with...

1 affected package

sudo

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
sudo Not affected Not affected Not affected
Show less packages

CVE-2022-33070

Medium priority

Some fixes available 9 of 80

Protobuf-c v1.4.0 was discovered to contain an invalid arithmetic shift via the function parse_tag_and_wiretype in protobuf-c/protobuf-c.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors.

9 affected packages

protobuf-c, libgadu, pidgin, libpg-query, sudo...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
protobuf-c Fixed Fixed Fixed Needs evaluation
libgadu Needs evaluation Needs evaluation Needs evaluation Needs evaluation
pidgin Needs evaluation Needs evaluation Needs evaluation Needs evaluation
libpg-query Needs evaluation Needs evaluation
sudo Not affected Fixed Not affected Not affected
argyll Needs evaluation Needs evaluation Needs evaluation Needs evaluation
libsignal-protocol-c Needs evaluation Needs evaluation Needs evaluation Needs evaluation
ocserv Needs evaluation Needs evaluation Needs evaluation Needs evaluation
ccextractor Needs evaluation Needs evaluation Needs evaluation
Show all 9 packages Show less packages

CVE-2021-3156

High priority
Fixed

Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.

1 affected package

sudo

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
sudo Fixed Fixed
Show less packages

CVE-2021-23240

Negligible priority
Needs evaluation

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects...

1 affected package

sudo

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
sudo Not affected Not affected Needs evaluation Needs evaluation
Show less packages

CVE-2021-23239

Low priority

Some fixes available 13 of 14

The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an...

1 affected package

sudo

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
sudo Fixed Fixed Fixed Fixed
Show less packages

CVE-2019-19234

Low priority

Some fixes available 1 of 2

In Sudo through 1.8.29, the fact that a user has been blocked (e.g., by using the ! character in the shadow file instead of a password hash) is not considered, allowing an attacker (who has access to a Runas ALL sudoer account) to...

1 affected package

sudo

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
sudo Fixed Not affected
Show less packages

CVE-2019-19232

Low priority

Some fixes available 1 of 2

In Sudo through 1.8.29, an attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user by invoking sudo with a numeric uid that is not associated with any user. NOTE: The software maintainer believes that...

1 affected package

sudo

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
sudo Fixed Not affected
Show less packages

CVE-2019-18684

Low priority
Not affected

Sudo through 1.8.29 allows local users to escalate to root if they have write access to file descriptor 3 of the sudo process. This occurs because of a race condition between determining a uid, and the setresuid and openat system...

1 affected package

sudo

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
sudo Not affected
Show less packages

CVE-2019-18634

Low priority
Fixed

In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT...

1 affected package

sudo

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
sudo Fixed
Show less packages