[USN-5811-2] Sudo vulnerability

Leonidas S. Barbosa leo.barbosa at canonical.com
Wed Jan 18 19:50:57 UTC 2023


==========================================================================
Ubuntu Security Notice USN-5811-2
January 18, 2023

sudo vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM

Summary:

Sudo could be made to possibly edit arbitrary files
if it received a specially crafted input.

Software Description:
- sudo: Provide limited super user privileges to specific users

Details:

USN-5811-1 fixed a vulnerability in Sudo. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

 Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly
 handled user-specified editors when using the sudoedit command. A local
 attacker that has permission to use the sudoedit command could possibly use
 this issue to edit arbitrary files. (CVE-2023-22809)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  sudo                            1.8.16-0ubuntu1.10+esm1
  sudo-ldap                       1.8.16-0ubuntu1.10+esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5811-2
  https://ubuntu.com/security/notices/USN-5811-1
  CVE-2023-22809
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20230118/62f03d0a/attachment.sig>


More information about the ubuntu-security-announce mailing list