MGASA-2022-0426 - Updated sudo packages fix security vulnerability

Publication date: 17 Nov 2022
URL: https://advisories.mageia.org/MGASA-2022-0426.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2022-43995

Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a
plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in
a heap-based buffer over-read. This can be triggered by arbitrary local
users with access to Sudo by entering a password of seven characters or
fewer. The impact could vary depending on the system libraries, compiler,
and processor architecture. (CVE-2022-43995)

References:
- https://bugs.mageia.org/show_bug.cgi?id=31089
- https://lists.suse.com/pipermail/sle-security-updates/2022-November/012820.html
- - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43995

SRPMS:
- 8/core/sudo-1.9.5p2-2.1.mga8

Mageia 2022-0426: sudo security update

Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read

Summary

Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture. (CVE-2022-43995)

References

- https://bugs.mageia.org/show_bug.cgi?id=31089

- https://lists.suse.com/pipermail/sle-security-updates/2022-November/012820.html

- - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43995

Resolution

MGASA-2022-0426 - Updated sudo packages fix security vulnerability

SRPMS

- 8/core/sudo-1.9.5p2-2.1.mga8

Severity
Publication date: 17 Nov 2022
URL: https://advisories.mageia.org/MGASA-2022-0426.html
Type: security
CVE: CVE-2022-43995

Related News