MGASA-2022-0426

Source
https://advisories.mageia.org/MGASA-2022-0426.html
Import Source
https://advisories.mageia.org/MGASA-2022-0426.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2022-0426
Related
Published
2022-11-17T15:45:52Z
Modified
2022-11-17T14:49:45Z
Summary
Updated sudo packages fix security vulnerability
Details

Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture. (CVE-2022-43995)

References
Credits

Affected packages

Mageia:8 / sudo

Package

Name
sudo
Purl
pkg:rpm/mageia/sudo?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.5p2-2.1.mga8

Ecosystem specific

{
    "section": "core"
}