Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-42465

Опубликовано: 22 дек. 2023
Источник: debian
EPSS Низкий

Описание

Sudo before 1.9.15 might allow row hammer attacks (for authentication bypass or privilege escalation) because application logic sometimes is based on not equaling an error value (instead of equaling a success value), and because the values do not resist flips of a single bit.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sudofixed1.9.15p2-2package

Примечания

  • https://www.openwall.com/lists/oss-security/2023/12/21/9

  • https://github.com/sudo-project/sudo/commit/7873f8334c8d31031f8cfa83bd97ac6029309e4f (SUDO_1_9_15p1)

  • Hardening against a hardware bug (rowhammer), not a security fix per se

  • part of the code in the fix commit are not built because debian use PAM: plugins/sudoers/auth/sudo_auth.[ch]

  • plugins/sudoers/lookup.c part was added in version 1.9.15

  • plugins/sudoers/match.c, part was added in 1.8.21

EPSS

Процентиль: 0%
0.00005
Низкий

Связанные уязвимости

CVSS3: 7
ubuntu
около 2 лет назад

Sudo before 1.9.15 might allow row hammer attacks (for authentication bypass or privilege escalation) because application logic sometimes is based on not equaling an error value (instead of equaling a success value), and because the values do not resist flips of a single bit.

CVSS3: 7
redhat
больше 2 лет назад

Sudo before 1.9.15 might allow row hammer attacks (for authentication bypass or privilege escalation) because application logic sometimes is based on not equaling an error value (instead of equaling a success value), and because the values do not resist flips of a single bit.

CVSS3: 7
nvd
около 2 лет назад

Sudo before 1.9.15 might allow row hammer attacks (for authentication bypass or privilege escalation) because application logic sometimes is based on not equaling an error value (instead of equaling a success value), and because the values do not resist flips of a single bit.

CVSS3: 7
msrc
около 2 лет назад

Sudo before 1.9.15 might allow row hammer attacks (for authentication bypass or privilege escalation) because application logic sometimes is based on not equaling an error value (instead of equaling a success value) and because the values do not resist flips of a single bit.

suse-cvrf
почти 2 года назад

Security update for sudo

EPSS

Процентиль: 0%
0.00005
Низкий