Vulnerability Database
Blog
FAQ
Docs
SUSE-SU-2022:3886-1
See a problem?
Please try reporting it
to the source
first.
Source
https://www.suse.com/support/update/announcement/2022/suse-su-20223886-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2022:3886-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2022:3886-1
Related
CVE-2022-43995
Published
2022-11-07T11:20:00Z
Modified
2022-11-07T11:20:00Z
Summary
Security update for sudo
Details
This update for sudo fixes the following issues:
CVE-2022-43995: Fixed a potential heap-based buffer over-read when entering a password of seven characters or fewer and using the crypt() password backend (bsc#1204986).
References
https://www.suse.com/support/update/announcement/2022/suse-su-20223886-1/
https://bugzilla.suse.com/1204986
https://www.suse.com/security/cve/CVE-2022-43995
Affected packages
SUSE:Linux Enterprise Server 12 SP2-BCL
/
sudo
Package
Name
sudo
Purl
pkg:rpm/suse/sudo&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1.8.10p3-10.38.1
Ecosystem specific
{ "binaries": [ { "sudo": "1.8.10p3-10.38.1" } ] }
SUSE-SU-2022:3886-1 - OSV