CVE-2019-14287 (retired)

Priority
Description
In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer
account can bypass certain policy blacklists and session PAM modules, and
can cause incorrect logging, by invoking sudo with a crafted user ID. For
example, this allows bypass of !root configuration, and USER= logging, for
a "sudo -u \#$((0xffffffff))" command.
Assigned-to
mdeslaur
Notes
Package
Source: sudo (LP Ubuntu Debian)
Upstream:released (1.8.28)
Ubuntu 12.04 ESM (Precise Pangolin):released (1.8.3p1-1ubuntu3.8)
Ubuntu 14.04 ESM (Trusty Tahr):released (1.8.9p5-1ubuntu1.5+esm2)
Ubuntu 16.04 LTS (Xenial Xerus):released (1.8.16-0ubuntu1.8)
Ubuntu 18.04 LTS (Bionic Beaver):released (1.8.21p2-3ubuntu1.1)
Ubuntu 19.04 (Disco Dingo):released (1.8.27-1ubuntu1.1)
Ubuntu 19.10 (Eoan Ermine):released (1.8.27-1ubuntu4)
More Information

Updated: 2019-10-24 00:14:50 UTC (commit 16e5c4d87c5f3788b618768306d692e77f84d251)