Search for packages
| purl | pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie |
| Next non-vulnerable version | 1.9.5p2-3+deb11u2 |
| Latest non-vulnerable version | 1.9.17p2-5 |
| Risk | 3.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-e9ra-cfnz-m3hg
Aliases: CVE-2022-43995 |
A vulnerability has been discovered in sudo which could result in denial of service. |
Affected by 0 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 1 other vulnerability. Affected by 0 other vulnerabilities. |
|
VCID-m9xh-9ac2-eycq
Aliases: CVE-2023-42465 |
A vulnerability has been discovered in sudo which can lead to execution manipulation through rowhammer-style memory manipulation. |
Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. Affected by 0 other vulnerabilities. |
|
VCID-pwmy-f5qe-s3d1
Aliases: CVE-2026-35535 |
In Sudo through 1.9.17p2 before 3e474c2, a failure of a setuid, setgid, or setgroups call, during a privilege drop before running the mailer, is not a fatal error and can lead to privilege escalation. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1cuy-x9m9-p3c4 | Multiple vulnerabilities have been found in sudo, the worst of which could result in privilege escalation. |
CVE-2021-3156
|
| VCID-1h8m-m8kr-ruc6 | Sudo 1.6.8p7 on SuSE Linux 9.3, and possibly other Linux distributions, allows local users to gain privileges by using sudo to call su, then entering a blank password and hitting CTRL-C. NOTE: SuSE and multiple third-party researchers have not been able to replicate this issue, stating "Sudo catches SIGINT and returns an empty string for the password so I don't see how this could happen unless the user's actual password was empty. |
CVE-2005-1831
|
| VCID-1s26-jrut-puf4 | CVE-2004-1051 bash scripts run via Sudo can be subverted (CVE-2005-4158, CVE-2006-0151) |
CVE-2004-1051
|
| VCID-23ny-6yp8-ffan | Multiple vulnerabilities have been found in sudo, the worst of which can result in root privilege escalation. |
CVE-2023-27320
|
| VCID-2b4p-nehx-eyae | coreutils: tty hijacking possible in "su" via TIOCSTI ioctl |
CVE-2005-4890
|
| VCID-2jvq-feqm-rueb | A vulnerability has been found in sudo allowing a local attacker to gain elevated privileges. |
CVE-2014-0106
|
| VCID-2tfv-4w12-nbhy | sudo: Possible info leak via INPUTRC |
CVE-2016-7091
|
| VCID-3hfe-p6e3-tbe9 | Multiple vulnerabilities have been found in sudo, the worst of which can result in root privilege escalation. |
CVE-2023-28487
|
| VCID-49cf-c1kh-27cf | Two vulnerabilities have been discovered in sudo, allowing local attackers to possibly gain escalated privileges. |
CVE-2012-0809
|
| VCID-5h2a-syy6-67bn | Multiple vulnerabilities have been found in sudo which could result in privilege escalation. |
CVE-2013-1776
|
| VCID-71wy-ujxu-bbfj | sudo: noexec bypass via wordexp() |
CVE-2016-7076
|
| VCID-7duq-41ag-z7bk | Two vulnerabilities in sudo might allow local users to escalate privileges and execute arbitrary code with root privileges. |
CVE-2010-0427
|
| VCID-7w9w-4whw-9bgk | Multiple vulnerabilities have been found in sudo, the worst of which could result in privilege escalation. |
CVE-2021-23240
|
| VCID-8r7f-bt93-qqcq | sudo: Race condition when checking digests in sudoers |
CVE-2015-8239
|
| VCID-9a7y-2e2u-ebbf | sudo is vulnerable to an escalation of privileges via a symlink attack. |
CVE-2015-5602
|
| VCID-9fh6-mr57-wba8 | sudo: Improper handling of ipa_hostname leads to privilege mismanagement |
CVE-2023-7090
|
| VCID-9whc-9uum-sbfq | Two vulnerabilities have been discovered in sudo, allowing local attackers to possibly gain escalated privileges. |
CVE-2011-0010
|
| VCID-9x82-hwuz-kycf | Multiple vulnerabilities have been found in sudo which could result in privilege escalation. |
CVE-2013-2776
|
| VCID-9y5c-e765-tqgt | A vulnerability in sudo allows local users to gain root privileges. |
CVE-2017-1000368
|
| VCID-a4dr-ann4-hffe | CVE-2004-1051 bash scripts run via Sudo can be subverted (CVE-2005-4158, CVE-2006-0151) |
CVE-2005-4158
|
| VCID-buyq-ggky-qbhh | Two vulnerabilities in sudo might allow local users to escalate privileges and execute arbitrary code with root privileges. |
CVE-2010-0426
|
| VCID-c6n7-s42u-tqhm | Local authentication bypass in sudo |
CVE-2007-3149
|
| VCID-cc9y-weez-hkhu | security flaw |
CVE-2005-1993
|
| VCID-e6kf-aksq-ffbe | Multiple vulnerabilities have been found in sudo which could result in privilege escalation. |
CVE-2013-2777
|
| VCID-enw3-mnnx-myd5 | A vulnerability has been discovered in sudo which could result in root privilege escalation. |
CVE-2023-22809
|
| VCID-esf1-4zw7-5fcy | sudo: attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user |
CVE-2019-19232
|
| VCID-ethj-8jmj-5fdh | Multiple vulnerabilities have been found in sudo, the worst of which can result in root privilege escalation. |
CVE-2023-28486
|
| VCID-euh3-n21v-8yh3 | sudo: insecure temporary file use in RPM %postun script |
CVE-2012-3440
|
| VCID-fant-y91b-rubf | The secure path feature and group handling in sudo allow local attackers to escalate privileges. |
CVE-2010-2956
|
| VCID-hac2-bg9e-bfbr | Incomplete blacklist vulnerability in sudo 1.6.8 and earlier allows local users to gain privileges via the (1) SHELLOPTS and (2) PS4 environment variables before executing a bash script on behalf of another user, which are not cleared even though other variables are. |
CVE-2005-2959
|
| VCID-j63t-xqk3-p3dk | A vulnerability in sudo could allow a local attacker to read arbitrary files or bypass security restrictions. |
CVE-2014-9680
|
| VCID-j8m8-5uq3-a7a2 | The secure path feature and group handling in sudo allow local attackers to escalate privileges. |
CVE-2010-1646
|
| VCID-jf9c-5due-6feb | A vulnerability in sudo may allow for privilege escalation. |
CVE-2009-0034
|
| VCID-k42r-mk4h-mbbg | Multiple vulnerabilities have been found in sudo, the worst of which could result in privilege escalation. |
CVE-2021-23239
|
| VCID-kzje-6t7q-rudw | sudo: noexec bypass via system() and popen() |
CVE-2016-7032
|
| VCID-mfty-hg4q-x7hp | Multiple vulnerabilities have been found in sudo which could result in privilege escalation. |
CVE-2013-1775
|
| VCID-ngg5-bqw7-bbc4 | Multiple vulnerabilities have been discovered in sudo, the worst of which could result in privilege escalation. |
CVE-2025-32462
|
| VCID-p5yv-48ry-dfe7 | Multiple vulnerabilities have been found in sudo, the worst of which could result in privilege escalation. |
CVE-2019-18634
|
| VCID-pj45-2vrx-6fcv | Multiple vulnerabilities have been found in sudo, the worst of which could result in privilege escalation. |
CVE-2019-14287
|
| VCID-pyfy-88dw-9ba8 | sudo: by using ! character in the shadow file instead of a password hash can access to a run as all sudoer account |
CVE-2019-19234
|
| VCID-qrfs-x7be-u7dx | sudo: does not flush stdin buffer on password timeout |
CVE-2008-3067
|
| VCID-qs5z-f2ew-n7fv | A flaw in sudo's -e option may allow local attackers to execute arbitrary commands. |
CVE-2010-1163
|
| VCID-rm1k-u2gs-efbx | CVE-2004-1051 bash scripts run via Sudo can be subverted (CVE-2005-4158, CVE-2006-0151) |
CVE-2006-0151
|
| VCID-t9g1-j9ej-ufcq | A vulnerability has been found in sudo which may allow local users to gain escalated privileges. |
CVE-2012-2337
|
| VCID-xg63-xrvm-nkbr | sudoedit (aka sudo -e) in sudo 1.6.8 opens a temporary file with root privileges, which allows local users to read arbitrary files via a symlink attack on the temporary file before quitting sudoedit. |
CVE-2004-1689
|
| VCID-z1h6-sryr-u3ac | sudo in Fedora vulnerable to CVE-2009-0034 again due to improper patch rediff |
CVE-2011-0008
|
| VCID-zd6m-f7x1-kkaa | A vulnerability in sudo allows local users to gain root privileges. |
CVE-2017-1000367
|
| VCID-ztsc-935d-dbga | Multiple vulnerabilities have been discovered in sudo, the worst of which could result in privilege escalation. |
CVE-2025-32463
|