Sudo Project Sudo 1.9.8

CPE Details

Sudo Project Sudo 1.9.8
1.9.8
2022-12-05 23:21 +00:00
2022-12-06 14:20 +00:00

Alerte pour un CPE

Stay informed of any changes for a specific CPE.
Alert management

CPE Name: cpe:2.3:a:sudo_project:sudo:1.9.8:-:*:*:*:*:*:*

Informations

Vendor

sudo_project

Product

sudo

Version

1.9.8

Update

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-42465 2023-12-21 23:00 +00:00 Sudo before 1.9.15 might allow row hammer attacks (for authentication bypass or privilege escalation) because application logic sometimes is based on not equaling an error value (instead of equaling a success value), and because the values do not resist flips of a single bit.
7
HIGH
CVE-2023-28486 2023-03-15 23:00 +00:00 Sudo before 1.9.13 does not escape control characters in log messages.
5.3
MEDIUM
CVE-2023-28487 2023-03-15 23:00 +00:00 Sudo before 1.9.13 does not escape control characters in sudoreplay output.
5.3
MEDIUM
CVE-2023-27320 2023-02-27 23:00 +00:00 Sudo before 1.9.13p2 has a double free in the per-command chroot feature.
7.2
HIGH
CVE-2023-22809 2023-01-17 23:00 +00:00 In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.
7.8
HIGH
CVE-2022-43995 2022-11-01 23:00 +00:00 Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.
7.1
HIGH
Click on the button to the left (OFF), to authorize the inscription of cookie improving the functionalities of the site. Click on the button to the left (Accept all), to unauthorize the inscription of cookie improving the functionalities of the site.