Sudo Project Sudo 1.8.28 Patch 1

CPE Details

Sudo Project Sudo 1.8.28 Patch 1
1.8.28
2019-10-28
13h23 +00:00
2019-10-28
13h23 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:sudo_project:sudo:1.8.28:p1:*:*:*:*:*:*

Informations

Vendor

sudo_project

Product

sudo

Version

1.8.28

Update

p1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-42465 2023-12-21 23h00 +00:00 Sudo before 1.9.15 might allow row hammer attacks (for authentication bypass or privilege escalation) because application logic sometimes is based on not equaling an error value (instead of equaling a success value), and because the values do not resist flips of a single bit.
7
High
CVE-2023-28486 2023-03-15 23h00 +00:00 Sudo before 1.9.13 does not escape control characters in log messages.
5.3
Medium
CVE-2023-28487 2023-03-15 23h00 +00:00 Sudo before 1.9.13 does not escape control characters in sudoreplay output.
5.3
Medium
CVE-2023-22809 2023-01-17 23h00 +00:00 In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.
7.8
High
CVE-2022-43995 2022-11-01 23h00 +00:00 Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.
7.1
High
CVE-2021-3156 2021-01-26 00h00 +00:00 Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
7.8
High
CVE-2021-23240 2021-01-12 07h17 +00:00 selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.
7.8
High
CVE-2021-23239 2021-01-11 23h00 +00:00 The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.
2.5
Low
CVE-2019-18684 2019-11-04 14h53 +00:00 Sudo through 1.8.29 allows local users to escalate to root if they have write access to file descriptor 3 of the sudo process. This occurs because of a race condition between determining a uid, and the setresuid and openat system calls. The attacker can write "ALL ALL=(ALL) NOPASSWD:ALL" to /proc/#####/fd/3 at a time when Sudo is prompting for a password. NOTE: This has been disputed due to the way Linux /proc works. It has been argued that writing to /proc/#####/fd/3 would only be viable if you had permission to write to /etc/sudoers. Even with write permission to /proc/#####/fd/3, it would not help you write to /etc/sudoers
7
High