Package: sudo
Version: 1.9.13p3-1+deb12u3
Severity: important

Dear Maintainer,

I am writing regarding CVE-2023-42465, which remains unresolved for the sudo 
package in Debian bookworm (1.9.13p3-1+deb12u3), as reflected in the Debian 
security tracker [1].

The upstream fix [2] (included in sudo 1.9.15p1) hardens the codebase against 
rowhammer-based fault injection attacks.

The notes in the debian CVE tracker page for this CVE mentions that the code in 
the commit that fixes this is not part of the debian binary as debian uses PAM, 
but the source package would still remain vulnerable for any non-PAM builds.

Could you please clarify whether there is a technical blocker preventing a 
backport of the relevant changes from the upstream fix to the bookworm package?


[1] https://security-tracker.debian.org/tracker/CVE-2023-42465
[2] 
https://github.com/sudo-project/sudo/commit/7873f8334c8d31031f8cfa83bd97ac6029309e4f

Thanks and Regards,
Adithya Balakumar

Reply via email to