OESA-2022-1904

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-1904
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2022-1904.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2022-1904
Upstream
Published
2022-09-09T11:04:15Z
Modified
2025-08-12T05:14:09.949960Z
Summary
sudo security update
Details

Sudo is a program designed to allow a sysadmin to give limited root privileges to users and log root activity. The basic philosophy is to give as few privileges as possible but still allow people to get their work done.

Security Fix(es):

Protobuf-c v1.4.0 was discovered to contain an invalid arithmetic shift via the function parsetagand_wiretype in protobuf-c/protobuf-c.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors.(CVE-2022-33070)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:20.03-LTS-SP1 / sudo

Package

Name
sudo
Purl
pkg:rpm/openEuler/sudo&distro=openEuler-20.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.2-6.oe1

Ecosystem specific

{
    "src": [
        "sudo-1.9.2-6.oe1.src.rpm"
    ],
    "noarch": [
        "sudo-help-1.9.2-6.oe1.noarch.rpm"
    ],
    "aarch64": [
        "sudo-debuginfo-1.9.2-6.oe1.aarch64.rpm",
        "sudo-1.9.2-6.oe1.aarch64.rpm",
        "sudo-debugsource-1.9.2-6.oe1.aarch64.rpm",
        "sudo-devel-1.9.2-6.oe1.aarch64.rpm"
    ],
    "x86_64": [
        "sudo-debuginfo-1.9.2-6.oe1.x86_64.rpm",
        "sudo-debugsource-1.9.2-6.oe1.x86_64.rpm",
        "sudo-1.9.2-6.oe1.x86_64.rpm",
        "sudo-devel-1.9.2-6.oe1.x86_64.rpm"
    ]
}

openEuler:20.03-LTS-SP3 / sudo

Package

Name
sudo
Purl
pkg:rpm/openEuler/sudo&distro=openEuler-20.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.2-6.oe1

Ecosystem specific

{
    "src": [
        "sudo-1.9.2-6.oe1.src.rpm"
    ],
    "noarch": [
        "sudo-help-1.9.2-6.oe1.noarch.rpm"
    ],
    "aarch64": [
        "sudo-devel-1.9.2-6.oe1.aarch64.rpm",
        "sudo-1.9.2-6.oe1.aarch64.rpm",
        "sudo-debuginfo-1.9.2-6.oe1.aarch64.rpm",
        "sudo-debugsource-1.9.2-6.oe1.aarch64.rpm"
    ],
    "x86_64": [
        "sudo-debugsource-1.9.2-6.oe1.x86_64.rpm",
        "sudo-1.9.2-6.oe1.x86_64.rpm",
        "sudo-devel-1.9.2-6.oe1.x86_64.rpm",
        "sudo-debuginfo-1.9.2-6.oe1.x86_64.rpm"
    ]
}

openEuler:22.03-LTS / sudo

Package

Name
sudo
Purl
pkg:rpm/openEuler/sudo&distro=openEuler-22.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.8p2-3.oe2203

Ecosystem specific

{
    "src": [
        "sudo-1.9.8p2-3.oe2203.src.rpm"
    ],
    "noarch": [
        "sudo-help-1.9.8p2-3.oe2203.noarch.rpm"
    ],
    "aarch64": [
        "sudo-debuginfo-1.9.8p2-3.oe2203.aarch64.rpm",
        "sudo-debugsource-1.9.8p2-3.oe2203.aarch64.rpm",
        "sudo-devel-1.9.8p2-3.oe2203.aarch64.rpm",
        "sudo-1.9.8p2-3.oe2203.aarch64.rpm"
    ],
    "x86_64": [
        "sudo-debugsource-1.9.8p2-3.oe2203.x86_64.rpm",
        "sudo-devel-1.9.8p2-3.oe2203.x86_64.rpm",
        "sudo-1.9.8p2-3.oe2203.x86_64.rpm",
        "sudo-debuginfo-1.9.8p2-3.oe2203.x86_64.rpm"
    ]
}