This might be proprietary software.
|2019-10-17||CVE-2019-14287||In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.||Ubuntu_linux, Debian_linux, Fedora, Element_software_management_node, Leap, Sudo||N/A|
|2019-11-04||CVE-2005-4890||There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.||Debian_linux, Shadow, Enterprise_linux, Sudo||N/A|