sudo vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://sudo.ws|sudo package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Privilege Context Switching Error

[1.8.24,1.8.28)
  • H
Privilege Escalation

[,1.9.15)
  • C
Improper Input Validation

[,1.9.13)
  • C
Improper Input Validation

[,1.9.13)
  • C
Double Free

[,1.9.13p2)
  • H
Improper Access Control

[1.8.0,1.9.12p2)
  • M
Heap-based Buffer Overflow

[1.8.0,)
  • H
Improper Input Validation

[1.6.8_p1,1.7.1]
  • M
Access Restriction Bypass

[,1.6.9p21)
  • M
Denial of Service (DoS)

[1.6.3_p1,1.6.8]
  • H
Symlink Attack

[,1.8.32)[1.9.0,1.9.5)
  • M
Arbitrary Code Execution

[,1.6.8]
  • H
CVE-2006-0151

[1.6.3_p1,1.6.8]
  • H
CVE-2002-0043

[1.6.3_p1,1.6.3]
  • H
Access Restriction Bypass

[1.6.3_p1,1.6.8]
  • M
Improper Input Validation

[,1.8.21)
  • H
Off-by-one Error

[1.8.2,1.8.32)[1.9.0,1.9.5)
  • H
CVE-2004-1051

[,1.6.8p2)
  • M
Symlink Attack

[,1.7.2]
  • M
Arbitrary Code Execution

[,1.6.8)
  • H
Access Restriction Bypass

[,1.6.9p21)[1.7.0,1.7.2p4)
  • H
Out-of-bounds Write

[,1.6.6)
  • H
CVE-2010-2956

[1.7.2p1,1.7.4]
  • H
Access Restriction Bypass

[,1.8.15)
  • H
Improper Handling of Exceptional Conditions

[,1.8.28)
  • M
Access Restriction Bypass

[1.6.3_p1,1.6.8]
  • H
Access Restriction Bypass

[,1.7.4p6)
  • M
Access Restriction Bypass

[,1.7.4p5)
  • H
Use of Externally-Controlled Format String

[1.8.1p1,1.8.3]
  • L
Symlink Attack

[,1.8.32)[1.9.0,1.9.5)
  • H
Out-of-bounds Write

[1.7.1,1.8.26)
  • H
Improper Input Validation

[0,1.8.5)
  • H
Race Condition

[1.8.8,1.8.15]
  • H
Improper Input Validation

[,1.8.21)
  • M
Access Restriction Bypass

[,1.7.10)[1.8.0,1.8.5)
  • L
Information Exposure

[,1.8.12)
  • M
Arbitrary Code Execution

[,1.5]
  • H
Access Restriction Bypass

[,1.7.9p1)[1.8.0,1.8.4p5)
  • H
Arbitrary Command Injection

[1.6.8,1.8.19)
  • H
Access Restriction Bypass

[,1.7.10p7)[1.8.67,1.8.6p7)
  • H
CVE-1999-0958

[1.5,1.5.3]
  • M
CVE-2005-1993

[1.6.3_p1,1.6.8]
  • H
Access Restriction Bypass

[1.6.2p1,1.7.2]
  • H
Improper Access Control

[0,1.8.15)
  • M
Access Restriction Bypass

[,1.7.10p5)
  • M
Access Restriction Bypass

[,1.7.10p6)[1.8.67,1.8.6p7)
  • H
Improper Input Validation

[1.3.0,1.7.5)