Ubuntu Security Notice 4263-2 - USN-4263-1 fixed a vulnerability in Sudo. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Joe Vennix discovered that Sudo incorrectly handled memory operations when the pwfeedback option is enabled. A local attacker could possibly use this issue to obtain unintended access to the administrator account. Various other issues were also addressed.
2e8986e72ddfa93d5be915aa5cdadfaa3bba5b67d5c5ef98260cdf49fce35fdc
==========================================================================
Ubuntu Security Notice USN-4263-2
February 05, 2020
sudo vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 ESM
- Ubuntu 12.04 ESM
Summary:
Sudo could allow unintended access to the administrator account.
Software Description:
- sudo: Provide limited super user privileges to specific users
Details:
USN-4263-1 fixed a vulnerability in Sudo. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
Original advisory details:
Joe Vennix discovered that Sudo incorrectly handled memory operations when
the pwfeedback option is enabled. A local attacker could possibly use this
issue to obtain unintended access to the administrator account.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 ESM:
sudo 1.8.9p5-1ubuntu1.5+esm3
sudo-ldap 1.8.9p5-1ubuntu1.5+esm3
Ubuntu 12.04 ESM:
sudo 1.8.3p1-1ubuntu3.9
sudo-ldap 1.8.3p1-1ubuntu3.9
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4263-2
https://usn.ubuntu.com/4263-1
CVE-2019-18634