Vulnerability Database
Blog
FAQ
Docs
arrow_forward
search
CVE-2023-27320
See a problem?
Please try reporting it
to the source
first.
Source
https://nvd.nist.gov/vuln/detail/CVE-2023-27320
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-27320.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-27320
Downstream
DEBIAN-CVE-2023-27320
OESA-2023-1160
OESA-2023-1172
SUSE-SU-2023:1665-1
UBUNTU-CVE-2023-27320
USN-5908-1
openSUSE-SU-2024:12795-1
Related
SUSE-SU-2023:1665-1
openSUSE-SU-2024:12795-1
Published
2023-02-28T18:15:10Z
Modified
2025-10-15T04:33:38Z
Severity
7.2 (High)
CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS Calculator
Summary
[none]
Details
Sudo before 1.9.13p2 has a double free in the per-command chroot feature.
References
http://www.openwall.com/lists/oss-security/2023/03/01/8
https://security.gentoo.org/glsa/202309-12
https://security.netapp.com/advisory/ntap-20230413-0009/
https://www.openwall.com/lists/oss-security/2023/02/28/1
https://www.sudo.ws/releases/stable/#1.9.13p2
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/332KN4QI6QXB7NI7SWSJ2EQJKWIILFN6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPLXMRAMXC3BYL4DNKVTK3V6JDMUXZ7B/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6VW24YGXJYI4NZ5HZPQCF4MCE7766AU/
Affected packages
Git
/
github.com/millert/sudo
Affected ranges
Type
GIT
Repo
https://github.com/millert/sudo
Events
Introduced
affd3d06d6446a882df582618d5aeda6daa68eb3
Fixed
effed9ecbb54acedcbf32d53d9ebd571498867b4
CVE-2023-27320 - OSV