Search for packages
Package details: pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
purl pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
Next non-vulnerable version 1.9.13p3-1+deb12u2
Latest non-vulnerable version 1.9.13p3-1+deb12u2
Risk 10.0
Vulnerabilities affecting this package (17)
Vulnerability Summary Fixed by
VCID-12md-ucwk-xfd5
Aliases:
CVE-2015-5602
security update
1.8.10p3-1+deb8u5
Affected by 17 other vulnerabilities.
1.8.19p1-2.1+deb9u2
Affected by 12 other vulnerabilities.
VCID-1xsy-7b37-w3dr
Aliases:
CVE-2025-32462
Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines.
1.9.13p3-1+deb12u1
Affected by 1 other vulnerability.
1.9.13p3-1+deb12u2
Affected by 0 other vulnerabilities.
VCID-24yb-z785-5qaj
Aliases:
CVE-2021-23240
selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.
1.9.5p2-3+deb11u1
Affected by 5 other vulnerabilities.
VCID-4s3h-r4vc-cyeh
Aliases:
CVE-2021-23239
The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.
1.9.5p2-3+deb11u1
Affected by 5 other vulnerabilities.
VCID-5jz4-7pcr-ebdd
Aliases:
CVE-2019-19232
In Sudo through 1.8.29, an attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user by invoking sudo with a numeric uid that is not associated with any user. NOTE: The software maintainer believes that this is not a vulnerability because running a command via sudo as a user not present in the local password database is an intentional feature. Because this behavior surprised some users, sudo 1.8.30 introduced an option to enable/disable this behavior with the default being disabled. However, this does not change the fact that sudo was behaving as intended, and as documented, in earlier versions
1.9.5p2-3+deb11u1
Affected by 5 other vulnerabilities.
VCID-5xpt-5e4h-f7c7
Aliases:
CVE-2021-3156
Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
1.8.27-1+deb10u3
Affected by 10 other vulnerabilities.
1.9.5p2-3+deb11u1
Affected by 5 other vulnerabilities.
VCID-92f4-vbjs-bfeq
Aliases:
CVE-2016-7076
sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges.
1.8.19p1-2.1+deb9u2
Affected by 12 other vulnerabilities.
VCID-gesg-srse-6bdf
Aliases:
CVE-2019-19234
In Sudo through 1.8.29, the fact that a user has been blocked (e.g., by using the ! character in the shadow file instead of a password hash) is not considered, allowing an attacker (who has access to a Runas ALL sudoer account) to impersonate any blocked user. NOTE: The software maintainer believes that this CVE is not valid. Disabling local password authentication for a user is not the same as disabling all access to that user--the user may still be able to login via other means (ssh key, kerberos, etc). Both the Linux shadow(5) and passwd(1) manuals are clear on this. Indeed it is a valid use case to have local accounts that are _only_ accessible via sudo and that cannot be logged into with a password. Sudo 1.8.30 added an optional setting to check the _shell_ of the target user (not the encrypted password!) against the contents of /etc/shells but that is not the same thing as preventing access to users with an invalid password hash
1.9.5p2-3+deb11u1
Affected by 5 other vulnerabilities.
VCID-htch-uzd7-13cf
Aliases:
CVE-2014-9680
1.8.19p1-2.1+deb9u2
Affected by 12 other vulnerabilities.
VCID-pk7g-22b7-hbf4
Aliases:
CVE-2017-1000368
1.8.27-1+deb10u3
Affected by 10 other vulnerabilities.
VCID-pu7e-sm7k-ukdt
Aliases:
CVE-2023-22809
In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.
1.9.5p2-3+deb11u1
Affected by 5 other vulnerabilities.
VCID-qkc7-gx2g-vkam
Aliases:
CVE-2019-14287
In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.
1.8.19p1-2.1+deb9u2
Affected by 12 other vulnerabilities.
1.8.27-1+deb10u3
Affected by 10 other vulnerabilities.
1.9.5p2-3+deb11u1
Affected by 5 other vulnerabilities.
VCID-rv1y-h785-zqcx
Aliases:
CVE-2023-7090
sudo: Improper handling of ipa_hostname leads to privilege mismanagement
1.9.5p2-3+deb11u1
Affected by 5 other vulnerabilities.
VCID-vh77-vczz-pkaj
Aliases:
CVE-2016-7032
1.8.19p1-2.1+deb9u2
Affected by 12 other vulnerabilities.
VCID-wyae-6zse-s7a9
Aliases:
CVE-2017-1000367
1.8.10p3-1+deb8u5
Affected by 17 other vulnerabilities.
1.8.27-1+deb10u3
Affected by 10 other vulnerabilities.
VCID-yg3r-kunk-uqam
Aliases:
CVE-2015-8239
sudo: Race condition when checking digests in sudoers
1.8.19p1-2.1+deb9u2
Affected by 12 other vulnerabilities.
VCID-yw4r-9jvd-w3gy
Aliases:
CVE-2019-18634
In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.
1.8.19p1-2.1+deb9u2
Affected by 12 other vulnerabilities.
1.9.5p2-3+deb11u1
Affected by 5 other vulnerabilities.
Vulnerabilities fixed by this package (10)
Vulnerability Summary Aliases
VCID-12md-ucwk-xfd5 security update CVE-2015-5602
VCID-8ab4-7g4v-nbhk sudo: bypass of tty_tickets constraints CVE-2013-2776
VCID-bzu3-rk76-gybt CVE-2013-1775
VCID-htch-uzd7-13cf CVE-2014-9680
VCID-jecg-uwm7-ykcp sudo: format string flaw in sudo_debug() CVE-2012-0809
VCID-jqmw-ffvu-3qfq CVE-2014-0106
VCID-kxzu-4p9s-bucg sudo: bypass of tty_tickets constraints CVE-2013-2777
VCID-qxks-bdvg-p7bj CVE-2011-0010
VCID-tezv-p7hr-2yc7 CVE-2012-2337
VCID-tue8-j2yc-t7f1 sudo: bypass of tty_tickets constraints CVE-2013-1776

Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-01T20:01:32.534532+00:00 Debian Oval Importer Affected by VCID-wyae-6zse-s7a9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:37:20.816612+00:00 Debian Oval Importer Affected by VCID-5xpt-5e4h-f7c7 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:12:22.906925+00:00 Debian Oval Importer Fixing VCID-tezv-p7hr-2yc7 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:06:53.535549+00:00 Debian Oval Importer Fixing VCID-kxzu-4p9s-bucg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:36:13.651078+00:00 Debian Oval Importer Fixing VCID-jqmw-ffvu-3qfq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:30:08.854855+00:00 Debian Oval Importer Affected by VCID-qkc7-gx2g-vkam https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:50:42.390579+00:00 Debian Oval Importer Fixing VCID-8ab4-7g4v-nbhk https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:43:27.025559+00:00 Debian Oval Importer Affected by VCID-24yb-z785-5qaj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:19:43.326242+00:00 Debian Oval Importer Affected by VCID-rv1y-h785-zqcx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:01:53.014603+00:00 Debian Oval Importer Affected by VCID-gesg-srse-6bdf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:24:17.368616+00:00 Debian Oval Importer Affected by VCID-pu7e-sm7k-ukdt https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:21:13.303123+00:00 Debian Oval Importer Affected by VCID-yg3r-kunk-uqam https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:55:34.387237+00:00 Debian Oval Importer Fixing VCID-tue8-j2yc-t7f1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:42:50.821788+00:00 Debian Oval Importer Affected by VCID-1xsy-7b37-w3dr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:19:26.688773+00:00 Debian Oval Importer Affected by VCID-htch-uzd7-13cf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:45:51.638391+00:00 Debian Oval Importer Fixing VCID-jecg-uwm7-ykcp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:25:04.203123+00:00 Debian Oval Importer Affected by VCID-12md-ucwk-xfd5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:18:21.963221+00:00 Debian Oval Importer Affected by VCID-pk7g-22b7-hbf4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:16:10.919974+00:00 Debian Oval Importer Affected by VCID-yw4r-9jvd-w3gy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:55:17.903648+00:00 Debian Oval Importer Affected by VCID-vh77-vczz-pkaj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:40:35.423731+00:00 Debian Oval Importer Affected by VCID-5jz4-7pcr-ebdd https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:22:58.293593+00:00 Debian Oval Importer Fixing VCID-bzu3-rk76-gybt https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:07:03.100582+00:00 Debian Oval Importer Fixing VCID-qxks-bdvg-p7bj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:24:03.616993+00:00 Debian Oval Importer Affected by VCID-92f4-vbjs-bfeq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:20:22.469655+00:00 Debian Oval Importer Affected by VCID-4s3h-r4vc-cyeh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T11:46:20.371368+00:00 Debian Oval Importer Affected by VCID-5xpt-5e4h-f7c7 https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:15:17.644682+00:00 Debian Oval Importer Affected by VCID-qkc7-gx2g-vkam https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 37.0.0
2025-08-01T11:09:16.455046+00:00 Debian Oval Importer Affected by VCID-qkc7-gx2g-vkam https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 37.0.0
2025-08-01T10:36:56.202009+00:00 Debian Oval Importer Affected by VCID-yw4r-9jvd-w3gy https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 37.0.0
2025-08-01T10:33:58.659918+00:00 Debian Oval Importer Affected by VCID-wyae-6zse-s7a9 https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T10:27:54.638898+00:00 Debian Oval Importer Affected by VCID-12md-ucwk-xfd5 https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T09:39:44.075275+00:00 Debian Oval Importer Fixing VCID-htch-uzd7-13cf https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:28:05.823006+00:00 Debian Oval Importer Fixing VCID-12md-ucwk-xfd5 https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0