USN-5811-1

Source
https://ubuntu.com/security/notices/USN-5811-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-5811-1.json
Related
Published
2023-01-18T17:44:58.006204Z
Modified
2023-01-18T17:44:58.006204Z
Details

Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly handled user-specified editors when using the sudoedit command. A local attacker that has permission to use the sudoedit command could possibly use this issue to edit arbitrary files. (CVE-2023-22809)

It was discovered that the Protobuf-c library, used by Sudo, incorrectly handled certain arithmetic shifts. An attacker could possibly use this issue to cause Sudo to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-33070)

References

Affected packages

Ubuntu:22.04:LTS / sudo

Package

Name
sudo

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
1.9.9-1ubuntu2.2

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "sudo": "1.9.9-1ubuntu2.2",
            "sudo-ldap": "1.9.9-1ubuntu2.2"
        }
    ]
}

Ubuntu:18.04:LTS / sudo

Package

Name
sudo

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
1.8.21p2-3ubuntu1.5

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "sudo": "1.8.21p2-3ubuntu1.5",
            "sudo-ldap": "1.8.21p2-3ubuntu1.5"
        }
    ]
}

Ubuntu:20.04:LTS / sudo

Package

Name
sudo

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
1.8.31-1ubuntu1.4

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "sudo": "1.8.31-1ubuntu1.4",
            "sudo-ldap": "1.8.31-1ubuntu1.4"
        }
    ]
}