Sudo 1.8.0 through 1.9.12, with the crypt() password...
High severity
Unreviewed
Published
Nov 2, 2022
to the GitHub Advisory Database
•
Updated May 5, 2025
Description
Published by the National Vulnerability Database
Nov 2, 2022
Published to the GitHub Advisory Database
Nov 2, 2022
Last updated
May 5, 2025
Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the compiler and processor architecture.
References