DEBIAN-CVE-2017-1000368

Source
https://security-tracker.debian.org/tracker/CVE-2017-1000368
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2017-1000368.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2017-1000368
Upstream
Published
2017-06-05T16:29:00Z
Modified
2025-09-25T22:40:35Z
Severity
  • 8.2 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Todd Miller's sudo version 1.8.20p1 and earlier is vulnerable to an input validation (embedded newlines) in the getprocessttyname() function resulting in information disclosure and command execution.

References

Affected packages

Debian:11 / sudo

Package

Name
sudo
Purl
pkg:deb/debian/sudo?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.20p1-1.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / sudo

Package

Name
sudo
Purl
pkg:deb/debian/sudo?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.20p1-1.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / sudo

Package

Name
sudo
Purl
pkg:deb/debian/sudo?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.20p1-1.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / sudo

Package

Name
sudo
Purl
pkg:deb/debian/sudo?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.20p1-1.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}