CVE-2019-18634

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-18634
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-18634.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-18634
Downstream
Related
Published
2020-01-29T18:15:12Z
Modified
2025-10-13T08:37:24.009937Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.

References

Affected packages

Git / github.com/millert/sudo

Affected ranges

Type
GIT
Repo
https://github.com/millert/sudo
Events

Affected versions

Other

SUDO_1_7_1
SUDO_1_7_2
SUDO_1_8_0
SUDO_1_8_1
SUDO_1_8_10
SUDO_1_8_10p1
SUDO_1_8_10p2
SUDO_1_8_10p3
SUDO_1_8_11
SUDO_1_8_11p1
SUDO_1_8_11p2
SUDO_1_8_12
SUDO_1_8_13
SUDO_1_8_14
SUDO_1_8_14p1
SUDO_1_8_14p3
SUDO_1_8_15
SUDO_1_8_16
SUDO_1_8_17
SUDO_1_8_17p1
SUDO_1_8_18
SUDO_1_8_18p1
SUDO_1_8_19
SUDO_1_8_19p1
SUDO_1_8_19p2
SUDO_1_8_2
SUDO_1_8_20
SUDO_1_8_20p1
SUDO_1_8_20p2
SUDO_1_8_21
SUDO_1_8_21p1
SUDO_1_8_21p2
SUDO_1_8_22
SUDO_1_8_23
SUDO_1_8_24
SUDO_1_8_25
SUDO_1_8_25p1
SUDO_1_8_3
SUDO_1_8_4
SUDO_1_8_4p1
SUDO_1_8_4p2
SUDO_1_8_4p3
SUDO_1_8_4p4
SUDO_1_8_4p5
SUDO_1_8_5
SUDO_1_8_5p1
SUDO_1_8_5p2
SUDO_1_8_5p3
SUDO_1_8_6
SUDO_1_8_6p1
SUDO_1_8_6p2
SUDO_1_8_6p3
SUDO_1_8_6p4
SUDO_1_8_6p5
SUDO_1_8_6p6
SUDO_1_8_6p7
SUDO_1_8_6p8
SUDO_1_8_7
SUDO_1_8_8
SUDO_1_8_9
SUDO_1_8_9p1
SUDO_1_8_9p2
SUDO_1_8_9p3
SUDO_1_8_9p4
SUDO_1_8_9p5