Search for packages
| purl | pkg:deb/debian/sudo@0?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1h8m-m8kr-ruc6 | Sudo 1.6.8p7 on SuSE Linux 9.3, and possibly other Linux distributions, allows local users to gain privileges by using sudo to call su, then entering a blank password and hitting CTRL-C. NOTE: SuSE and multiple third-party researchers have not been able to replicate this issue, stating "Sudo catches SIGINT and returns an empty string for the password so I don't see how this could happen unless the user's actual password was empty. |
CVE-2005-1831
|
| VCID-23ny-6yp8-ffan | Multiple vulnerabilities have been found in sudo, the worst of which can result in root privilege escalation. |
CVE-2023-27320
|
| VCID-2tfv-4w12-nbhy | sudo: Possible info leak via INPUTRC |
CVE-2016-7091
|
| VCID-c6n7-s42u-tqhm | Local authentication bypass in sudo |
CVE-2007-3149
|
| VCID-euh3-n21v-8yh3 | sudo: insecure temporary file use in RPM %postun script |
CVE-2012-3440
|
| VCID-z1h6-sryr-u3ac | sudo in Fedora vulnerable to CVE-2009-0034 again due to improper patch rediff |
CVE-2011-0008
|
| VCID-ztsc-935d-dbga | Multiple vulnerabilities have been discovered in sudo, the worst of which could result in privilege escalation. |
CVE-2025-32463
|