From 13ec12ad28bc2ce6e2902be1d571befcca2b3f60 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Tue, 22 Nov 2022 07:05:54 +0000 Subject: gentoo auto-resync : 22:11:2022 - 07:05:54 --- metadata/glsa/glsa-202211-08.xml | 42 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+) create mode 100644 metadata/glsa/glsa-202211-08.xml (limited to 'metadata/glsa/glsa-202211-08.xml') diff --git a/metadata/glsa/glsa-202211-08.xml b/metadata/glsa/glsa-202211-08.xml new file mode 100644 index 000000000000..ef6062360272 --- /dev/null +++ b/metadata/glsa/glsa-202211-08.xml @@ -0,0 +1,42 @@ + + + + sudo: Heap-Based Buffer Overread + A vulnerability has been discovered in sudo which could result in denial of service. + sudo + 2022-11-22 + 2022-11-22 + 879209 + remote + + + 1.9.12-r1 + 1.9.12-r1 + + + +

sudo allows a system administrator to give users the ability to run commands as other users.

+
+ +

In certain password input handling, sudo incorrectly assumes the password input is at least nine bytes in size, leading to a heap buffer overread.

+
+ +

In the worst case, the heap buffer overread can result in the denial of service of the sudo process.

+
+ +

There is no known workaround at this time.

+
+ +

All sudo users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.9.12-r1" + +
+ + CVE-2022-43995 + + ajak + ajak +
\ No newline at end of file -- cgit v1.2.3