{"id":"USN-5811-1","summary":"sudo vulnerabilities","details":"Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly\nhandled user-specified editors when using the sudoedit command. A local\nattacker that has permission to use the sudoedit command could possibly use\nthis issue to edit arbitrary files. (CVE-2023-22809)\n\nIt was discovered that the Protobuf-c library, used by Sudo, incorrectly\nhandled certain arithmetic shifts. An attacker could possibly use this\nissue to cause Sudo to crash, resulting in a denial of service. This issue\nonly affected Ubuntu 22.04 LTS. (CVE-2022-33070)\n","modified":"2026-02-10T04:42:55Z","published":"2023-01-18T17:44:58Z","related":["UBUNTU-CVE-2022-33070","UBUNTU-CVE-2023-22809"],"upstream":["CVE-2022-33070","CVE-2023-22809","UBUNTU-CVE-2022-33070","UBUNTU-CVE-2023-22809"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5811-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-33070"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-22809"}],"affected":[{"package":{"name":"sudo","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/sudo@1.8.21p2-3ubuntu1.5?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.21p2-3ubuntu1.5"}]}],"versions":["1.8.20p2-1ubuntu1","1.8.21p2-2ubuntu1","1.8.21p2-3ubuntu1","1.8.21p2-3ubuntu1.1","1.8.21p2-3ubuntu1.2","1.8.21p2-3ubuntu1.3","1.8.21p2-3ubuntu1.4"],"ecosystem_specific":{"binaries":[{"binary_name":"sudo","binary_version":"1.8.21p2-3ubuntu1.5"},{"binary_name":"sudo-ldap","binary_version":"1.8.21p2-3ubuntu1.5"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-22809"}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5811-1.json"}},{"package":{"name":"sudo","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/sudo@1.8.31-1ubuntu1.4?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.31-1ubuntu1.4"}]}],"versions":["1.8.27-1ubuntu4","1.8.29-1ubuntu1","1.8.31-1ubuntu1","1.8.31-1ubuntu1.1","1.8.31-1ubuntu1.2"],"ecosystem_specific":{"binaries":[{"binary_name":"sudo","binary_version":"1.8.31-1ubuntu1.4"},{"binary_name":"sudo-ldap","binary_version":"1.8.31-1ubuntu1.4"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-22809"}],"ecosystem":"Ubuntu:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5811-1.json"}},{"package":{"name":"sudo","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/sudo@1.9.9-1ubuntu2.2?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.9.9-1ubuntu2.2"}]}],"versions":["1.9.5p2-3ubuntu2","1.9.9-1ubuntu2","1.9.9-1ubuntu2.1"],"ecosystem_specific":{"binaries":[{"binary_name":"sudo","binary_version":"1.9.9-1ubuntu2.2"},{"binary_name":"sudo-ldap","binary_version":"1.9.9-1ubuntu2.2"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-33070"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-22809"}],"ecosystem":"Ubuntu:22.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5811-1.json"}}],"schema_version":"1.7.3"}