USN-4263-2: Sudo vulnerability

Publication date

5 February 2020

Overview

Sudo could allow unintended access to the administrator account.


Packages

  • sudo - Provide limited super user privileges to specific users

Details

USN-4263-1 fixed a vulnerability in Sudo. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

Original advisory details:

Joe Vennix discovered that Sudo incorrectly handled memory operations when
the pwfeedback option is enabled. A local attacker could possibly use this
issue to obtain unintended access to the administrator account.

USN-4263-1 fixed a vulnerability in Sudo. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

Original advisory details:

Joe Vennix discovered that Sudo incorrectly handled memory operations when
the pwfeedback option is enabled. A local attacker could possibly use this
issue to obtain unintended access to the administrator account.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
14.04 trusty sudo-ldap –  1.8.9p5-1ubuntu1.5+esm3
sudo –  1.8.9p5-1ubuntu1.5+esm3
12.04 precise sudo-ldap –  1.8.3p1-1ubuntu3.9
sudo –  1.8.3p1-1ubuntu3.9

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›