USN-5811-2

Source
https://ubuntu.com/security/notices/USN-5811-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5811-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5811-2
Related
Published
2023-01-18T19:23:38.754318Z
Modified
2023-01-18T19:23:38.754318Z
Summary
sudo vulnerability
Details

USN-5811-1 fixed a vulnerability in Sudo. This update provides the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly handled user-specified editors when using the sudoedit command. A local attacker that has permission to use the sudoedit command could possibly use this issue to edit arbitrary files. (CVE-2023-22809)

References

Affected packages

Ubuntu:Pro:16.04:LTS / sudo

Package

Name
sudo
Purl
pkg:deb/ubuntu/sudo?arch=src?distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.16-0ubuntu1.10+esm1

Affected versions

1.*

1.8.12-1ubuntu3
1.8.16-0ubuntu1
1.8.16-0ubuntu1.1
1.8.16-0ubuntu1.2
1.8.16-0ubuntu1.3
1.8.16-0ubuntu1.4
1.8.16-0ubuntu1.5
1.8.16-0ubuntu1.6
1.8.16-0ubuntu1.7
1.8.16-0ubuntu1.8
1.8.16-0ubuntu1.9
1.8.16-0ubuntu1.10

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "1.8.16-0ubuntu1.10+esm1",
            "binary_name": "sudo"
        },
        {
            "binary_version": "1.8.16-0ubuntu1.10+esm1",
            "binary_name": "sudo-dbgsym"
        },
        {
            "binary_version": "1.8.16-0ubuntu1.10+esm1",
            "binary_name": "sudo-ldap"
        },
        {
            "binary_version": "1.8.16-0ubuntu1.10+esm1",
            "binary_name": "sudo-ldap-dbgsym"
        }
    ]
}