Описание
Security update for sudo
This update for sudo fixes the following issues:
- CVE-2022-43995: Fixed a potential heap-based buffer over-read when entering a password of seven characters or fewer and using the crypt() password backend (bsc#1204986).
Список пакетов
Container suse/sle-micro-rancher/5.3:latest
sudo-1.9.9-150400.4.6.1
Container suse/sle-micro-rancher/5.4:latest
sudo-1.9.9-150400.4.6.1
Container suse/sle-micro/5.3/toolbox:latest
sudo-1.9.9-150400.4.6.1
Container suse/sle-micro/5.4/toolbox:latest
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Azure-Basic
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Azure-Standard
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-BYOS
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-BYOS-Azure
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-BYOS-EC2
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-BYOS-GCE
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-CHOST-BYOS
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-CHOST-BYOS-Aliyun
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-CHOST-BYOS-Azure
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-CHOST-BYOS-EC2
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-CHOST-BYOS-GCE
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-CHOST-BYOS-SAP-CCloud
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-EC2
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-EC2-ECS-HVM
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-GCE
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-HPC
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-HPC-Azure
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-HPC-BYOS
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-HPC-BYOS-Azure
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-HPC-BYOS-EC2
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-HPC-BYOS-GCE
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-HPC-EC2
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-HPC-GCE
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Hardened-BYOS
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Hardened-BYOS-Azure
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Hardened-BYOS-EC2
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Hardened-BYOS-GCE
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Manager-Server-4-3
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Manager-Server-4-3-Azure-llc
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Manager-Server-4-3-Azure-ltd
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Manager-Server-4-3-BYOS
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Manager-Server-4-3-EC2-llc
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Manager-Server-4-3-EC2-ltd
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Micro-5-3
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Micro-5-3-Azure
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Micro-5-3-BYOS
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Micro-5-3-BYOS-Azure
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Micro-5-3-BYOS-EC2
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Micro-5-3-BYOS-GCE
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Micro-5-3-EC2
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Micro-5-3-GCE
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Micro-5-4
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Micro-5-4-Azure
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Micro-5-4-BYOS
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Micro-5-4-BYOS-Azure
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Micro-5-4-BYOS-EC2
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Micro-5-4-BYOS-GCE
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Micro-5-4-EC2
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-Micro-5-4-GCE
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SAP
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SAP-Azure
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SAP-Azure-LI-BYOS
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SAP-Azure-LI-BYOS-Production
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SAP-Azure-VLI-BYOS
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SAP-BYOS
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SAP-BYOS-Azure
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SAP-BYOS-EC2
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SAP-BYOS-GCE
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SAP-EC2
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SAP-GCE
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SAP-Hardened
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SAP-Hardened-Azure
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SAP-Hardened-BYOS
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SAP-Hardened-BYOS-Azure
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SAP-Hardened-BYOS-EC2
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SAP-Hardened-BYOS-GCE
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SAP-Hardened-EC2
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SAP-Hardened-GCE
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SAPCAL
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SAPCAL-Azure
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SAPCAL-EC2
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SAPCAL-GCE
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SUSE-Rancher-Setup-BYOS
sudo-1.9.9-150400.4.6.1
Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2
sudo-1.9.9-150400.4.6.1
SUSE Linux Enterprise Micro 5.3
sudo-1.9.9-150400.4.6.1
SUSE Linux Enterprise Module for Basesystem 15 SP4
sudo-1.9.9-150400.4.6.1
sudo-devel-1.9.9-150400.4.6.1
sudo-plugin-python-1.9.9-150400.4.6.1
openSUSE Leap 15.4
sudo-1.9.9-150400.4.6.1
sudo-devel-1.9.9-150400.4.6.1
sudo-plugin-python-1.9.9-150400.4.6.1
sudo-test-1.9.9-150400.4.6.1
Ссылки
- Link for SUSE-SU-2022:4001-1
- E-Mail link for SUSE-SU-2022:4001-1
- SUSE Security Ratings
- SUSE Bug 1204986
- SUSE CVE CVE-2022-43995 page
Описание
Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.
Затронутые продукты
Container suse/sle-micro-rancher/5.3:latest:sudo-1.9.9-150400.4.6.1
Container suse/sle-micro-rancher/5.4:latest:sudo-1.9.9-150400.4.6.1
Container suse/sle-micro/5.3/toolbox:latest:sudo-1.9.9-150400.4.6.1
Container suse/sle-micro/5.4/toolbox:latest:sudo-1.9.9-150400.4.6.1
Ссылки
- CVE-2022-43995
- SUSE Bug 1204986
- SUSE Bug 1205838
- SUSE Bug 1205969
- SUSE Bug 1206905