SUSE-SU-2019:2656-1

Source
https://www.suse.com/support/update/announcement/2019/suse-su-20192656-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2019:2656-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2019:2656-1
Related
Published
2019-10-14T15:02:27Z
Modified
2019-10-14T15:02:27Z
Summary
Security update for sudo
Details

This update for sudo fixes the following issue:

  • CVE-2019-14287: Fixed an issue where a user with sudo privileges that allowed them to run commands with an arbitrary uid, could run commands as root, despite being forbidden to do so in sudoers (bsc#1153674).
References

Affected packages

SUSE:Linux Enterprise Module for Basesystem 15 / sudo

Package

Name
sudo
Purl
purl:rpm/suse/sudo&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.22-4.6.1

Ecosystem specific

{
    "binaries": [
        {
            "sudo": "1.8.22-4.6.1",
            "sudo-devel": "1.8.22-4.6.1"
        }
    ]
}

SUSE:Linux Enterprise Module for Basesystem 15 SP1 / sudo

Package

Name
sudo
Purl
purl:rpm/suse/sudo&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.22-4.6.1

Ecosystem specific

{
    "binaries": [
        {
            "sudo": "1.8.22-4.6.1",
            "sudo-devel": "1.8.22-4.6.1"
        }
    ]
}