[USN-5811-2] Sudo vulnerability
Leonidas S. Barbosa
leo.barbosa at canonical.com
Wed Jan 18 19:50:57 UTC 2023
==========================================================================
Ubuntu Security Notice USN-5811-2
January 18, 2023
sudo vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 ESM
Summary:
Sudo could be made to possibly edit arbitrary files
if it received a specially crafted input.
Software Description:
- sudo: Provide limited super user privileges to specific users
Details:
USN-5811-1 fixed a vulnerability in Sudo. This update provides
the corresponding update for Ubuntu 16.04 ESM.
Original advisory details:
Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly
handled user-specified editors when using the sudoedit command. A local
attacker that has permission to use the sudoedit command could possibly use
this issue to edit arbitrary files. (CVE-2023-22809)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 ESM:
sudo 1.8.16-0ubuntu1.10+esm1
sudo-ldap 1.8.16-0ubuntu1.10+esm1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5811-2
https://ubuntu.com/security/notices/USN-5811-1
CVE-2023-22809
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20230118/62f03d0a/attachment.sig>
More information about the ubuntu-security-announce
mailing list