Apparently sudo execution could be manipulated in memory via rowhammer-style attacks, potentially affected execution flow: "Our recent paper<https://arxiv.org/pdf/2309.02545.pdf> [AsiaCCS'24] describes a potential vulnerability where stack/register variables can be flipped via fault injection, affecting execution flow in security-sensitive code." There is a fix in upstream's 1.9.15: https://github.com/sudo-project/sudo/commit/7873f8334c8d31031f8cfa83bd97ac6029309e4f
commit 4d263e147ccd1a9b2e2d3366f1ce6d0fe4d8f9c7 Author: Sam James <sam@gentoo.org> Date: Thu Dec 28 04:57:42 2023 +0000 app-admin/sudo: drop 1.9.14_p3, 1.9.15_p3
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/data/glsa.git/commit/?id=8c2ac2c642d0add8a4a53de8486398a7e94c2a7e commit 8c2ac2c642d0add8a4a53de8486398a7e94c2a7e Author: GLSAMaker <glsamaker@gentoo.org> AuthorDate: 2024-01-24 04:05:24 +0000 Commit: John Helmert III <ajak@gentoo.org> CommitDate: 2024-01-24 04:06:50 +0000 [ GLSA 202401-29 ] sudo: Memory Manipulation Bug: https://bugs.gentoo.org/920510 Signed-off-by: GLSAMaker <glsamaker@gentoo.org> Signed-off-by: John Helmert III <ajak@gentoo.org> glsa-202401-29.xml | 42 ++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+)