|
|
Log in / Subscribe / Register

Ubuntu alert USN-4263-2 (sudo)

From:  "Leonidas S. Barbosa" <leo.barbosa@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-4263-2] Sudo vulnerability
Date:  Wed, 5 Feb 2020 10:40:48 -0300
Message-ID:  <20200205134048.GA30234@d4rkl41n>

========================================================================== Ubuntu Security Notice USN-4263-2 February 05, 2020 sudo vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 ESM - Ubuntu 12.04 ESM Summary: Sudo could allow unintended access to the administrator account. Software Description: - sudo: Provide limited super user privileges to specific users Details: USN-4263-1 fixed a vulnerability in Sudo. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Original advisory details: Joe Vennix discovered that Sudo incorrectly handled memory operations when the pwfeedback option is enabled. A local attacker could possibly use this issue to obtain unintended access to the administrator account. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 ESM: sudo 1.8.9p5-1ubuntu1.5+esm3 sudo-ldap 1.8.9p5-1ubuntu1.5+esm3 Ubuntu 12.04 ESM: sudo 1.8.3p1-1ubuntu3.9 sudo-ldap 1.8.3p1-1ubuntu3.9 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/4263-2 https://usn.ubuntu.com/4263-1 CVE-2019-18634 -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds