OESA-2022-1892

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-1892
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2022-1892.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2022-1892
Upstream
Published
2022-09-07T11:04:14Z
Modified
2025-08-12T05:14:38.556974Z
Summary
sudo security update
Details

Sudo is a program designed to allow a sysadmin to give limited root privileges to users and log root activity. The basic philosophy is to give as few privileges as possible but still allow people to get their work done.

Security Fix(es):

zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).(CVE-2022-37434)

Database specific
{
    "severity": "Critical"
}
References

Affected packages

openEuler:20.03-LTS-SP1 / sudo

Package

Name
sudo
Purl
pkg:rpm/openEuler/sudo&distro=openEuler-20.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.2-6.oe1

Ecosystem specific

{
    "src": [
        "sudo-1.9.2-6.oe1.src.rpm"
    ],
    "x86_64": [
        "sudo-debugsource-1.9.2-6.oe1.x86_64.rpm",
        "sudo-devel-1.9.2-6.oe1.x86_64.rpm",
        "sudo-debuginfo-1.9.2-6.oe1.x86_64.rpm",
        "sudo-1.9.2-6.oe1.x86_64.rpm"
    ],
    "aarch64": [
        "sudo-debuginfo-1.9.2-6.oe1.aarch64.rpm",
        "sudo-devel-1.9.2-6.oe1.aarch64.rpm",
        "sudo-debugsource-1.9.2-6.oe1.aarch64.rpm",
        "sudo-1.9.2-6.oe1.aarch64.rpm"
    ],
    "noarch": [
        "sudo-help-1.9.2-6.oe1.noarch.rpm"
    ]
}

openEuler:20.03-LTS-SP3 / sudo

Package

Name
sudo
Purl
pkg:rpm/openEuler/sudo&distro=openEuler-20.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.2-6.oe1

Ecosystem specific

{
    "src": [
        "sudo-1.9.2-6.oe1.src.rpm"
    ],
    "x86_64": [
        "sudo-1.9.2-6.oe1.x86_64.rpm",
        "sudo-debuginfo-1.9.2-6.oe1.x86_64.rpm",
        "sudo-debugsource-1.9.2-6.oe1.x86_64.rpm",
        "sudo-devel-1.9.2-6.oe1.x86_64.rpm"
    ],
    "aarch64": [
        "sudo-1.9.2-6.oe1.aarch64.rpm",
        "sudo-devel-1.9.2-6.oe1.aarch64.rpm",
        "sudo-debuginfo-1.9.2-6.oe1.aarch64.rpm",
        "sudo-debugsource-1.9.2-6.oe1.aarch64.rpm"
    ],
    "noarch": [
        "sudo-help-1.9.2-6.oe1.noarch.rpm"
    ]
}

openEuler:22.03-LTS / sudo

Package

Name
sudo
Purl
pkg:rpm/openEuler/sudo&distro=openEuler-22.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.8p2-3.oe2203

Ecosystem specific

{
    "src": [
        "sudo-1.9.8p2-3.oe2203.src.rpm"
    ],
    "x86_64": [
        "sudo-1.9.8p2-3.oe2203.x86_64.rpm",
        "sudo-debugsource-1.9.8p2-3.oe2203.x86_64.rpm",
        "sudo-devel-1.9.8p2-3.oe2203.x86_64.rpm",
        "sudo-debuginfo-1.9.8p2-3.oe2203.x86_64.rpm"
    ],
    "aarch64": [
        "sudo-devel-1.9.8p2-3.oe2203.aarch64.rpm",
        "sudo-debugsource-1.9.8p2-3.oe2203.aarch64.rpm",
        "sudo-debuginfo-1.9.8p2-3.oe2203.aarch64.rpm",
        "sudo-1.9.8p2-3.oe2203.aarch64.rpm"
    ],
    "noarch": [
        "sudo-help-1.9.8p2-3.oe2203.noarch.rpm"
    ]
}