Mageia 2022-0426: sudo security update
Summary
Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a
plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in
a heap-based buffer over-read. This can be triggered by arbitrary local
users with access to Sudo by entering a password of seven characters or
fewer. The impact could vary depending on the system libraries, compiler,
and processor architecture. (CVE-2022-43995)
References
- https://bugs.mageia.org/show_bug.cgi?id=31089
- https://lists.suse.com/pipermail/sle-security-updates/2022-November/012820.html
- - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43995
Resolution
MGASA-2022-0426 - Updated sudo packages fix security vulnerability
SRPMS
- 8/core/sudo-1.9.5p2-2.1.mga8