Red Hat Security Advisory 2021-0226-01 - The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Issues addressed include a buffer overflow vulnerability.
ba4d17e359d3e138fc7112849819042848514df314ee5c6009bb43f256a05e03
Ubuntu Security Notice 4705-1 - It was discovered that Sudo incorrectly handled memory when parsing command lines. A local attacker could possibly use this issue to obtain unintended access to the administrator account. It was discovered that the Sudo sudoedit utility incorrectly handled checking directory permissions. A local attacker could possibly use this issue to bypass file permissions and determine if a directory exists or not. Various other issues were also addressed.
9b333695ccb46b8a45f17259c0a37c74e099cd2a9241d7e73c503ee60998ba30
Ubuntu Security Notice 4704-1 - It was discovered that libsndfile incorrectly handled certain malformed files. A remote attacker could use this issue to cause libsndfile to crash, resulting in a denial of service, or possibly execute arbitrary code. It was discovered that libsndfile incorrectly handled certain malformed files. A remote attacker could use this issue to cause libsndfile to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 ESM. Various other issues were also addressed.
d09d3b37af53a26e7f8ef4c64e0c9e9d6c0168c04ce69077f27ae6503606e817
Openlitespeed Web Server version 1.7.8 suffers from an authenticated command injection vulnerability.
6245ded7393648d6817b10e62fc6f6b93770c5c229af1eac1d2e7523eb97a85a