First published: Wed Feb 05 2020(Updated: )
USN-4263-1 fixed a vulnerability in Sudo. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Original advisory details: Joe Vennix discovered that Sudo incorrectly handled memory operations when the pwfeedback option is enabled. A local attacker could possibly use this issue to obtain unintended access to the administrator account.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/sudo-ldap | <1.8.9p5-1ubuntu1.5+esm3 | 1.8.9p5-1ubuntu1.5+esm3 |
Ubuntu Linux | =14.04 | |
All of | ||
ubuntu/sudo | <1.8.9p5-1ubuntu1.5+esm3 | 1.8.9p5-1ubuntu1.5+esm3 |
Ubuntu Linux | =14.04 | |
All of | ||
ubuntu/sudo-ldap | <1.8.3p1-1ubuntu3.9 | 1.8.3p1-1ubuntu3.9 |
Ubuntu Linux | =12.04 | |
All of | ||
ubuntu/sudo | <1.8.3p1-1ubuntu3.9 | 1.8.3p1-1ubuntu3.9 |
Ubuntu Linux | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-4263-2 addresses a critical vulnerability in Sudo that could allow local attackers to exploit memory handling issues.
To fix USN-4263-2, upgrade to the versions specified in the advisory for Sudo on Ubuntu 12.04 or 14.04.
USN-4263-2 affects Ubuntu 12.04 and 14.04 distributions.
The vulnerability in USN-4263-2 was discovered due to improper memory operation handling in Sudo when the pwfeedback option is enabled.
USN-4263-2 is associated with the sudo and sudo-ldap packages in the specified Ubuntu versions.