OESA-2022-2079

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-2079
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2022-2079.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2022-2079
Upstream
Published
2022-11-11T11:04:34Z
Modified
2025-08-12T05:15:42.032084Z
Summary
sudo security update
Details

Sudo is a program designed to allow a sysadmin to give limited root privileges to users and log root activity. The basic philosophy is to give as few privileges as possible but still allow people to get their work done.

Security Fix(es):

Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.(CVE-2022-43995)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:20.03-LTS-SP1 / sudo

Package

Name
sudo
Purl
pkg:rpm/openEuler/sudo&distro=openEuler-20.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.2-7.oe1

Ecosystem specific

{
    "src": [
        "sudo-1.9.2-7.oe1.src.rpm"
    ],
    "x86_64": [
        "sudo-1.9.2-7.oe1.x86_64.rpm",
        "sudo-devel-1.9.2-7.oe1.x86_64.rpm",
        "sudo-debuginfo-1.9.2-7.oe1.x86_64.rpm",
        "sudo-debugsource-1.9.2-7.oe1.x86_64.rpm"
    ],
    "noarch": [
        "sudo-help-1.9.2-7.oe1.noarch.rpm"
    ],
    "aarch64": [
        "sudo-debuginfo-1.9.2-7.oe1.aarch64.rpm",
        "sudo-1.9.2-7.oe1.aarch64.rpm",
        "sudo-debugsource-1.9.2-7.oe1.aarch64.rpm",
        "sudo-devel-1.9.2-7.oe1.aarch64.rpm"
    ]
}

openEuler:20.03-LTS-SP3 / sudo

Package

Name
sudo
Purl
pkg:rpm/openEuler/sudo&distro=openEuler-20.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.2-7.oe1

Ecosystem specific

{
    "src": [
        "sudo-1.9.2-7.oe1.src.rpm"
    ],
    "x86_64": [
        "sudo-debuginfo-1.9.2-7.oe1.x86_64.rpm",
        "sudo-debugsource-1.9.2-7.oe1.x86_64.rpm",
        "sudo-devel-1.9.2-7.oe1.x86_64.rpm",
        "sudo-1.9.2-7.oe1.x86_64.rpm"
    ],
    "noarch": [
        "sudo-help-1.9.2-7.oe1.noarch.rpm"
    ],
    "aarch64": [
        "sudo-1.9.2-7.oe1.aarch64.rpm",
        "sudo-debuginfo-1.9.2-7.oe1.aarch64.rpm",
        "sudo-debugsource-1.9.2-7.oe1.aarch64.rpm",
        "sudo-devel-1.9.2-7.oe1.aarch64.rpm"
    ]
}

openEuler:22.03-LTS / sudo

Package

Name
sudo
Purl
pkg:rpm/openEuler/sudo&distro=openEuler-22.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.8p2-4.oe2203

Ecosystem specific

{
    "src": [
        "sudo-1.9.8p2-4.oe2203.src.rpm"
    ],
    "x86_64": [
        "sudo-debuginfo-1.9.8p2-4.oe2203.x86_64.rpm",
        "sudo-debugsource-1.9.8p2-4.oe2203.x86_64.rpm",
        "sudo-1.9.8p2-4.oe2203.x86_64.rpm",
        "sudo-devel-1.9.8p2-4.oe2203.x86_64.rpm"
    ],
    "noarch": [
        "sudo-help-1.9.8p2-4.oe2203.noarch.rpm"
    ],
    "aarch64": [
        "sudo-1.9.8p2-4.oe2203.aarch64.rpm",
        "sudo-debugsource-1.9.8p2-4.oe2203.aarch64.rpm",
        "sudo-debuginfo-1.9.8p2-4.oe2203.aarch64.rpm",
        "sudo-devel-1.9.8p2-4.oe2203.aarch64.rpm"
    ]
}