Search CVE reports


Toggle filters

11 – 20 of 54 results


CVE-2023-22809

Medium priority
Fixed

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the...

1 affected package

sudo

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
sudo Fixed Fixed Fixed
Show less packages

CVE-2022-43995

Medium priority
Not affected

Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with...

1 affected package

sudo

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
sudo Not affected Not affected Not affected
Show less packages

CVE-2022-33070

Medium priority

Some fixes available 9 of 80

Protobuf-c v1.4.0 was discovered to contain an invalid arithmetic shift via the function parse_tag_and_wiretype in protobuf-c/protobuf-c.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors.

9 affected packages

argyll, ccextractor, libgadu, libpg-query, libsignal-protocol-c...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
argyll Needs evaluation Needs evaluation Needs evaluation Needs evaluation
ccextractor Needs evaluation Needs evaluation Needs evaluation
libgadu Needs evaluation Needs evaluation Needs evaluation Needs evaluation
libpg-query Needs evaluation Needs evaluation
libsignal-protocol-c Needs evaluation Needs evaluation Needs evaluation Needs evaluation
ocserv Needs evaluation Needs evaluation Needs evaluation Needs evaluation
pidgin Needs evaluation Needs evaluation Needs evaluation Needs evaluation
protobuf-c Fixed Fixed Fixed Needs evaluation
sudo Not affected Fixed Not affected Not affected
Show all 9 packages Show less packages

CVE-2021-3156

High priority
Fixed

Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.

1 affected package

sudo

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
sudo Fixed Fixed
Show less packages

CVE-2021-23240

Negligible priority
Needs evaluation

selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects...

1 affected package

sudo

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
sudo Not affected Not affected Needs evaluation Needs evaluation
Show less packages

CVE-2021-23239

Low priority

Some fixes available 13 of 14

The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an...

1 affected package

sudo

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
sudo Fixed Fixed Fixed Fixed
Show less packages

CVE-2019-19234

Low priority

Some fixes available 1 of 2

** DISPUTED ** In Sudo through 1.8.29, the fact that a user has been blocked (e.g., by using the ! character in the shadow file instead of a password hash) is not considered, allowing an attacker (who has access to a Runas ALL...

1 affected package

sudo

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
sudo Fixed Not affected
Show less packages

CVE-2019-19232

Low priority

Some fixes available 1 of 2

** DISPUTED ** In Sudo through 1.8.29, an attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user by invoking sudo with a numeric uid that is not associated with any user. NOTE: The...

1 affected package

sudo

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
sudo Fixed Not affected
Show less packages

CVE-2019-18684

Low priority
Not affected

** DISPUTED ** Sudo through 1.8.29 allows local users to escalate to root if they have write access to file descriptor 3 of the sudo process. This occurs because of a race condition between determining a uid, and the setresuid and...

1 affected package

sudo

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
sudo Not affected
Show less packages

CVE-2019-18634

Low priority
Fixed

In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT...

1 affected package

sudo

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
sudo Fixed
Show less packages