USN-5811-2: Sudo vulnerability
18 January 2023
Sudo could be made to possibly edit arbitrary files if it received a specially crafted input.
Releases
Packages
- sudo - Provide limited super user privileges to specific users
Details
USN-5811-1 fixed a vulnerability in Sudo. This update provides
the corresponding update for Ubuntu 16.04 ESM.
Original advisory details:
Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly
handled user-specified editors when using the sudoedit command. A local
attacker that has permission to use the sudoedit command could possibly use
this issue to edit arbitrary files. (CVE-2023-22809)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
sudo-ldap
-
1.8.16-0ubuntu1.10+esm1
Available with Ubuntu Pro
-
sudo
-
1.8.16-0ubuntu1.10+esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-5811-1: sudo, sudo-ldap
- USN-5811-3: sudo, sudo-ldap