VYPR

crates.io package

sudo-rs

pkg:cargo/sudo-rs

Vulnerabilities (5)

  • CVE-2025-64517MedNov 12, 2025
    affected >= 0.2.5, < 0.2.10fixed 0.2.10

    sudo-rs is a memory safe implementation of sudo and su written in Rust. With `Defaults targetpw` (or `Defaults rootpw`) enabled, the password of the target account (or root account) instead of the invoking user is used for authentication. sudo-rs starting in version 0.2.5 and pr

  • CVE-2025-64170LowNov 12, 2025
    affected >= 0.2.7, < 0.2.10fixed 0.2.10

    sudo-rs is a memory safe implementation of sudo and su written in Rust. Starting in version 0.2.7 and prior to version 0.2.10, if a user begins entering a password but does not press return for an extended period, a password timeout may occur. When this happens, the keystrokes th

  • CVE-2025-46718May 12, 2025
    affected < 0.2.6fixed 0.2.6

    sudo-rs is a memory safe implementation of sudo and su written in Rust. Prior to version 0.2.6, users with limited sudo privileges (e.g. execution of a single command) can list sudo privileges of other users using the `-U` flag. This vulnerability allows users with limited sudo p

  • CVE-2025-46717May 12, 2025
    affected < 0.2.6fixed 0.2.6

    sudo-rs is a memory safe implementation of sudo and su written in Rust. Prior to version 0.2.6, users with no (or very limited) sudo privileges can determine whether files exists in folders that they otherwise cannot access using `sudo --list `. Users with local access

  • CVE-2023-42456Sep 21, 2023
    affected < 0.2.1fixed 0.2.1

    Sudo-rs, a memory safe implementation of sudo and su, allows users to not have to enter authentication at every sudo attempt, but instead only requiring authentication every once in a while in every terminal or process group. Only once a configurable timeout has passed will the u