CVE-2019-18634

Priority
Description
In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can
trigger a stack-based buffer overflow in the privileged sudo process.
(pwfeedback is a default setting in Linux Mint and elementary OS; however,
it is NOT the default for upstream and many other packages, and would exist
only if enabled by an administrator.) The attacker needs to deliver a long
string to the stdin of getln() in tgetpass.c.
Assigned-to
mdeslaur
Notes
mdeslaurpwfeedback is not enabled in Ubuntu
affects 1.7.1 to 1.8.25p1 as it can't be exploited in 1.8.26 to
1.8.30
Package
Source: sudo (LP Ubuntu Debian)
Upstream:released (1.8.31)
Ubuntu 12.04 ESM (Precise Pangolin):released (1.8.3p1-1ubuntu3.9)
Ubuntu 14.04 ESM (Trusty Tahr):released (1.8.9p5-1ubuntu1.5+esm3)
Ubuntu 16.04 LTS (Xenial Xerus):released (1.8.16-0ubuntu1.9)
Ubuntu 18.04 LTS (Bionic Beaver):released (1.8.21p2-3ubuntu1.2)
Ubuntu 19.10 (Eoan Ermine):released (1.8.27-1ubuntu4.1)
Ubuntu 20.04 (Focal Fossa):released (1.8.31-1ubuntu1)
Patches:
Upstream:https://github.com/sudo-project/sudo/commit/fa8ffeb17523494f0e8bb49a25e53635f4509078
More Information

Updated: 2020-03-18 22:54:27 UTC (commit 2ea7df7bd1e69e1e489978d2724a936eb3faa1b8)