Sudo before 1.9.15 might allow row hammer attacks (for authentication bypass or privilege escalation) because application logic sometimes is based on not equaling an error value (instead of equaling a success value), and because the values do not resist flips of a single bit.
Link | Tags |
---|---|
https://www.sudo.ws/releases/changelog/ | release notes |
https://www.openwall.com/lists/oss-security/2023/12/21/9 | exploit mailing list |
https://github.com/sudo-project/sudo/commit/7873f8334c8d31031f8cfa83bd97ac6029309e4f | patch |
https://arxiv.org/abs/2309.02545 | third party advisory technical description |
https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_15 | release notes |
https://security.gentoo.org/glsa/202401-29 | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6XMRUJCPII4MPWG43HTYR76DGLEYEFZ/ | vendor advisory |
https://security.netapp.com/advisory/ntap-20240208-0002/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R4Q23NHCKCLFIHSNY6KJ27GM7FSCEVXM/ | vendor advisory |