Vulnerability Database
Blog
FAQ
Docs
SUSE-SU-2019:14193-1
See a problem?
Please try reporting it
to the source
first.
Source
https://www.suse.com/support/update/announcement/2019/suse-su-201914193-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2019:14193-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2019:14193-1
Related
CVE-2019-14287
Published
2019-10-18T14:20:07Z
Modified
2019-10-18T14:20:07Z
Summary
Security update for sudo
Details
This update for sudo fixes the following issues:
CVE-2019-14287: Fixed an issue where a user with sudo privileges that allowed them to run commands with an arbitrary uid, could run commands as root, despite being forbidden to do so in sudoers (bsc#1153674).
References
https://www.suse.com/support/update/announcement/2019/suse-su-201914193-1/
https://bugzilla.suse.com/1153674
https://www.suse.com/security/cve/CVE-2019-14287
Affected packages
SUSE:Linux Enterprise Point of Sale 11 SP3
/
sudo
Package
Name
sudo
Purl
purl:rpm/suse/sudo&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1.7.6p2-0.30.5.1
Ecosystem specific
{ "binaries": [ { "sudo": "1.7.6p2-0.30.5.1" } ] }
SUSE:Linux Enterprise Server 11 SP4-LTSS
/
sudo
Package
Name
sudo
Purl
purl:rpm/suse/sudo&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1.7.6p2-0.30.5.1
Ecosystem specific
{ "binaries": [ { "sudo": "1.7.6p2-0.30.5.1" } ] }
SUSE-SU-2019:14193-1 - OSV