USN-5811-2

See a problem?
Source
https://ubuntu.com/security/notices/USN-5811-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-5811-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5811-2
Related
Published
2023-01-18T19:23:38.754318Z
Modified
2023-01-18T19:23:38.754318Z
Summary
sudo vulnerability
Details

USN-5811-1 fixed a vulnerability in Sudo. This update provides the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly handled user-specified editors when using the sudoedit command. A local attacker that has permission to use the sudoedit command could possibly use this issue to edit arbitrary files. (CVE-2023-22809)

References

Affected packages

Ubuntu:Pro:16.04:LTS / sudo

Package

Name
sudo

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.16-0ubuntu1.10+esm1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "sudo": "1.8.16-0ubuntu1.10+esm1",
            "sudo-ldap": "1.8.16-0ubuntu1.10+esm1"
        }
    ]
}