CVE-2019-14287

Priority
Description
In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer
account can bypass certain policy blacklists and session PAM modules, and
can cause incorrect logging, by invoking sudo with a crafted user ID. For
example, this allows bypass of !root configuration, and USER= logging, for
a "sudo -u \#$((0xffffffff))" command.
Assigned-to
mdeslaur
Notes
Package
Source: sudo (LP Ubuntu Debian)
Upstream:released (1.8.28)
Ubuntu 12.04 ESM (Precise Pangolin):released (1.8.3p1-1ubuntu3.8)
Ubuntu 14.04 ESM (Trusty Tahr):released (1.8.9p5-1ubuntu1.5+esm2)
Ubuntu 16.04 LTS (Xenial Xerus):released (1.8.16-0ubuntu1.8)
Ubuntu 18.04 LTS (Bionic Beaver):released (1.8.21p2-3ubuntu1.1)
Ubuntu 19.04 (Disco Dingo):released (1.8.27-1ubuntu1.1)
Ubuntu 19.10 (Eoan Ermine):released (1.8.27-1ubuntu4)
More Information

Updated: 2019-12-05 21:09:55 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)