|
|
Subscribe / Log in / New account

Ubuntu alert USN-6005-2 (sudo)

From:  Ian Constantin <ian.constantin@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-6005-2] Sudo vulnerabilities
Date:  Mon, 29 May 2023 14:25:34 +0300
Message-ID:  <8e38cae1-7290-cfe6-f763-17d670fdde32@canonical.com>

========================================================================== Ubuntu Security Notice USN-6005-2 May 29, 2023 sudo vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 LTS (Available with Ubuntu Pro) Summary: Several security issues were fixed in Sudo. Software Description: - sudo: Provide limited super user privileges to specific users Details: USN-6005-1 fixed vulnerabilities in Sudo. This update provides the corresponding updates for Ubuntu 16.04 LTS. Original advisory details:  Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly  escaped control characters in log messages and sudoreplay output. An  attacker could possibly use these issues to inject terminal control  characters that alter output when being viewed. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 LTS (Available with Ubuntu Pro):   sudo                               1.8.16-0ubuntu1.10+esm2   sudo-ldap                       1.8.16-0ubuntu1.10+esm2 In general, a standard system update will make all the necessary changes. References:   https://ubuntu.com/security/notices/USN-6005-2   https://ubuntu.com/security/notices/USN-6005-1   CVE-2023-28486, CVE-2023-28487


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds